CN109618342A - It is a kind of for determining the method and apparatus of the operation permission information of user - Google Patents

It is a kind of for determining the method and apparatus of the operation permission information of user Download PDF

Info

Publication number
CN109618342A
CN109618342A CN201811610638.1A CN201811610638A CN109618342A CN 109618342 A CN109618342 A CN 109618342A CN 201811610638 A CN201811610638 A CN 201811610638A CN 109618342 A CN109618342 A CN 109618342A
Authority
CN
China
Prior art keywords
user
equipment
information
model
user equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811610638.1A
Other languages
Chinese (zh)
Inventor
徐学东
杨创彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Carbon Blue Network Technology Co Ltd
Original Assignee
Shanghai Carbon Blue Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Carbon Blue Network Technology Co Ltd filed Critical Shanghai Carbon Blue Network Technology Co Ltd
Priority to CN201811610638.1A priority Critical patent/CN109618342A/en
Publication of CN109618342A publication Critical patent/CN109618342A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The purpose of the application is to provide a kind of method and apparatus for determining the operation permission information of user, based on the operation of user to user equipment, determines the equipment operation data of the user;According to the equipment operation data, the equipment operation model about the user equipment is determined;The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, and determines the operation permission information of the user based on the comparison result for comparing operation.The application judges that the user of current operation user equipment is original subscriber or illegal user, can be actively to protect to privacy of user in the case where user's not sent dependent instruction.

Description

It is a kind of for determining the method and apparatus of the operation permission information of user
Technical field
This application involves the communications fields more particularly to a kind of for determining the technology of the operation permission information of user.
Background technique
With the development of mobile communication technology, mobile communication equipment (including but not limited to cellular mobile telephone, plate electricity Brain, wearable device with mobile communication function etc.) it is used widely and increasingly closer with contacting for user.For example, The privacy informations such as address list, private photos, all kinds of software accounts of user are bound or save sometimes to mobile communication equipment, or The client applications such as mobile payment client, Web bank's client are installed.Once mobile communication equipment is lost, the privacy of user Information is exposed under the risk utilized by criminal.
In order to avoid the mobile communication equipment of loss threatens the personal information security of user, the way of part manufacturer is, first First personal account information and mobile communication equipment are bound by user, user acknowledges a debt according to this after mobile communication equipment loss Number information sends dependent instruction to mobile communication equipment;Mobile communication equipment returns to the movement according to the dependent instruction that user sends The locating geographical location of communication equipment, or erased the privacy information of user according to the dependent instruction that user sends, to protect The privacy information of user.
However, the implementation of above-mentioned privacy information protection, is realized based on instruction transmitted by user.Therefore, if By mobile communication equipment and communication network after the not sent dependent instruction of user or the mobile communication equipment of criminal acquisition user Network disconnects, and the privacy information of user is it is possible to exposure.
Summary of the invention
The purpose of the application is to provide a kind of method and apparatus for determining the operation permission information of user.
According to the one aspect of the application, a kind of method for determining the operation permission information of user, the party are provided Method includes:
Based on the operation of user to user equipment, the equipment operation data of the user are determined;
According to the equipment operation data, the equipment operation model about the user equipment is determined;
The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, and is based on the ratio The operation permission information of the user is determined to the comparison result of operation.
According to further aspect of the application, a kind of operating right letter for being used to determine user at network equipment end is provided The method of breath, this method comprises:
Based on equipment operation data transmitted by corresponding user equipment, the equipment operation about the user equipment is determined Model;
The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, and is based on the ratio The operation permission information of the user is determined to the comparison result of operation;
The operation permission information is sent to the user equipment.
According to the another aspect of the application, a kind of operating right letter for being used to determine user at user equipment end is provided The method of breath, this method comprises:
Based on the operation of user to user equipment, the equipment operation data of the user are determined;
The equipment operation data are sent to the corresponding network equipment;
Receive the operation permission information of the user transmitted by the network equipment.
According to the one aspect of the application, provide it is a kind of for determining the user equipment of the operation permission information of user, The user equipment includes:
One one module determines the equipment operation data of the user for the operation based on user to user equipment;
One or two module, for determining the equipment operation mould about the user equipment according to the equipment operation data Type;
One or three module compares behaviour for executing to the equipment operation model and pre-generated predetermined registration operation model Make, and determines the operation permission information of the user based on the comparison result for comparing operation.
According to further aspect of the application, provides a kind of network for determining the operation permission information of user and set Standby, which includes:
2nd 1 module, for determining about the use based on equipment operation data transmitted by corresponding user equipment The equipment operation model of family equipment;
Two or two module compares behaviour for executing to the equipment operation model and pre-generated predetermined registration operation model Make, and determines the operation permission information of the user based on the comparison result for comparing operation;
Two or three module, for the operation permission information to be sent to the user equipment.
According to the another aspect of the application, provide a kind of for determining that the user of the operation permission information of user sets Standby, which includes:
3rd 1 module determines the equipment operation data of the user for the operation based on user to user equipment;
Three or two module, for the equipment operation data to be sent to the corresponding network equipment;
Three or three module, for receiving the operation permission information of the user transmitted by the network equipment.
According to the one aspect of the application, a kind of method for determining the operation permission information of user, the party are provided Method includes:
User equipment determines the equipment operation data of the user based on the operation of user to user equipment, and sets described Standby operation data is sent to the corresponding network equipment;
The network equipment determines the equipment operation model about the user equipment based on the equipment operation data;
The network equipment executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, And the operation permission information of the user is determined based on the comparison result for comparing operation;
The operation permission information is sent to the user equipment by the network equipment;
The user equipment receives the operation permission information.
According to the one aspect of the application, a kind of equipment for determining the operation permission information of user is provided, this sets It is standby to include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage the operation that device executes any of the above item the method.
A kind of computer-readable medium including instruction, described instruction make system execute any of the above item when executed The operation of the method.
Compared with prior art, one embodiment of the application is determined based on the equipment operation data of user to user equipment The equipment operation model of user, and according to the equipment operation model judge current operation user equipment user be original subscriber or Illegal user can be actively to protect to privacy of user in the case where user's not sent dependent instruction;In addition, in this Shen In one embodiment please, above equipment operation model is stored in user equipment local, it is achieved that independently of PERCOM peripheral communication The privacy of user of connection is protected.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is according to a kind of for determining the method flow of the operation permission information of user of the application one embodiment Figure;
Fig. 2 is according to a kind of for determining the method flow of the operation permission information of user of the application another embodiment Figure;
Fig. 3 is a kind of operation permission information for being used to determine user at network equipment end according to the application one embodiment Method flow diagram;
Fig. 4 is a kind of operation permission information for being used to determine user at user equipment end according to the application one embodiment Method flow diagram;
Fig. 5 is according to a kind of for determining the user equipment of the operation permission information of user of the application one embodiment Functional block diagram;
Fig. 6 is according to a kind of for determining the network equipment of the operation permission information of user of the application one embodiment Functional block diagram;
Fig. 7 is according to a kind of for determining the user equipment of the operation permission information of user of the application another embodiment Functional block diagram;
Fig. 8 is the functional block diagram according to a kind of exemplary system of the application one embodiment.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (for example, central processing unit (Central Processing Unit, CPU)), input/output interface, network interface and Memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (Random Access Memory, RAM) and/or the forms such as Nonvolatile memory, such as read-only memory (Read Only Memory, ROM) Or flash memory (Flash Memory).Memory is the example of computer-readable medium.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer include, but are not limited to phase change memory (Phase-Change Memory, PCM), it is programmable with Machine accesses memory (Programmable Random Access Memory, PRAM), static random access memory (Static Random-Access Memory, SRAM), dynamic random access memory (Dynamic Random Access Memory, DRAM), other kinds of random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), electrically erasable programmable read-only memory (Electrically-Erasable Programmable Read-Only Memory, EEPROM), flash memory (Flash Memory) or other memory techniques, Read-only disc read only memory (CD-ROM) (Compact Disc Read-Only Memory, CD-ROM), digital versatile disc (Digital Versatile Disc, DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetism Equipment or any other non-transmission medium are stored, can be used for storage can be accessed by a computing device information.
The application meaning equipment includes but is not limited to that user equipment, the network equipment or user equipment and the network equipment pass through Network is integrated constituted equipment.The user equipment includes but is not limited to that any one can carry out human-computer interaction with user The mobile electronic product, such as smart phone, tablet computer etc. of (such as human-computer interaction is carried out by touch tablet), the mobile electricity Sub- product can use any operating system, such as Android operation system, iOS operating system.Wherein, the network equipment The electronic equipment of numerical value calculating and information processing can be carried out automatically according to the instruction for being previously set or storing including a kind of, Hardware includes but is not limited to microprocessor, specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field Programmable Gate Array, FPGA), digital signal processor (Digital Signal Processor, DSP), embedded device etc..The network equipment includes but is not limited to computer, network host, single network server, multiple The cloud that network server collection or multiple servers are constituted;Here, cloud is by the big meter based on cloud computing (Cloud Computing) Calculation machine or network server are constituted, wherein cloud computing is one kind of distributed computing, by the computer set group of a group loose couplings At a virtual supercomputer.The network includes but is not limited to internet, wide area network, Metropolitan Area Network (MAN), local area network, VPN net Network, wireless self-organization network (Ad Hoc Network) etc..Preferably, the equipment can also be that running on the user sets The standby, network equipment or user equipment and the network equipment, the network equipment, touch terminal or the network equipment and touch terminal pass through net Network is integrated the program in constituted equipment.
Certainly, those skilled in the art will be understood that above equipment is only for example, other are existing or are likely to occur from now on Equipment be such as applicable to the application, should also be included within the application protection scope, and be incorporated herein by reference.
In the description of the present application, the meaning of " plurality " is two or more, unless otherwise specifically defined.
This application provides a kind of methods for determining the operation permission information of user.One in the application is typical real It applies in example, this method is executed by user equipment.Below based on a user equipment, the application is described in detail.
According to the one aspect of the application, a kind of method for determining the operating right of user is provided.With reference to Fig. 1, The method comprising the steps of S110, step S120 and step S130.Wherein, in step s 110, user equipment be based on user to The operation of family equipment determines the equipment operation data of the user;In the step s 120, user equipment is according to the equipment operation Data determine the equipment operation model about the user equipment;In step s 130, user equipment is to the equipment operation mould Type and pre-generated predetermined registration operation model, which execute, compares operation, and described in being determined based on the comparison result for comparing operation The operation permission information of user.
Specifically, in step s 110, operation of the user equipment based on user to user equipment determines the user's Equipment operation data.Wherein, the equipment operation data, the including but not limited to action type of the operation of user to user equipment (e.g., including but be not limited to touching and touch screen, by pressing entity or virtual key, voice input etc.), user are operated Concrete operations data (e.g., including but it is not limited to, when user's touch position on the touch screen, user press physical button The operating time of the operation of duration, user to user equipment that key is pressed, user operate twice between interval time), User carry out relevant operation statistical data (e.g., including but be not limited to, user is accumulative time of concrete operations within certain time Number, user use certain function (such as making a phone call) of user equipment or run the cumulative number or time duration of certain application) etc.. Those skilled in the art should understand that the apparatus described above operation data is only for example, it is not construed as specific to the application The limitation of embodiment, other equipment operation data that are existing or being likely to occur from now on, such as can be suitably used for the application, also wraps Containing within the scope of protection of this application, and it is incorporated herein by reference.
In some embodiments, the operation of user to user equipment, including but not limited to touch operation, button operation, language Sound input operation etc..For example, when user equipment has, when touching screen, user can touch in the touch screen surface, point It presses, finger sliding etc., to realize operation to user equipment;When user equipment has physical button, such as the user equipment Equipped with a physical keyboard, then user's pressable physical button, to realize the operation to user equipment;When user equipment has language Sound input unit, for example, the user equipment be equipped with for acquire acoustic information microphone (Microphone, including but not limited to Capacitance microphone and electret microphone) and voice knowledge is carried out to the acoustic information that microphone acquires by the voice-input unit Not to obtain corresponding user instruction, then user can realize the operation to user equipment by phonetic order.In addition, user to The operation of family equipment is not limited in being realized based on touch screen, the keyboard etc. built in user equipment, can also be based on external equipment It realizes.In some embodiments, user equipment with one or more external input device is wired or wireless connects and communicates, user It is inputted and is instructed by the external input device, to realize the operation to user equipment.Those skilled in the art should understand that with The upper mode for realizing the operation to user equipment is only for example, and is not construed as to the application specific embodiment Limitation, other modes for realizing the operation to user equipment that are existing or being likely to occur from now on such as can be suitably used for this Application, is also contained in the protection scope of the application, and be incorporated herein by reference.
In the step s 120, user equipment determines the equipment about the user equipment according to the equipment operation data Operation model.Wherein, the equipment operation model of user equipment is determined based on above equipment operation data;In some embodiments In, the equipment operation model be based on above equipment operation data handle it is resulting.For example, user equipment is set according to above-mentioned Standby operation data carries out data processing and exports the equipment operation model of user, which includes each of the user Kind of equipment use habit (for example, the user determined according to statistical data within certain period to user equipment carry out certain operation can Can property), using preference (such as user runs a possibility that certain application within certain period) etc., reflect that user uses the user The use habit of equipment;Even for same user equipment, individual character, use habit of different user etc. all can be variant, These differences can be used for distinguishing different users, therefore can be used for judging whether the user of the currently used user equipment is conjunction Method user.
In step s 130, user equipment executes the equipment operation model and pre-generated predetermined registration operation model Operation is compared, and determines the operation permission information of the user based on the comparison result for comparing operation.For example, in generation Before stating equipment operation model, the predetermined registration operation model is generated, which is also based on relative users The operation data of user equipment is generated, and can also reflect that relative users use the use habit of the user equipment.It will be above-mentioned Equipment operation model is compared with the predetermined registration operation model, such as calculates the matching degree of the two;If the matching degree of the two is higher, Such as the matching degree is higher than a preset threshold, the corresponding user of both judgements is same user, otherwise determines that the two is different User can further determine that user corresponding to above equipment operation model is illegal user in some embodiments.
In some embodiments, the equipment operation model includes with the next item down or several items:
Gesture habits information, such as user's habit is with left hand/right hand-held set probability, or the general length of sliding finger Degree;
Using preference information, such as user is most common a or the Apply Names of several money applications, user use The probability occurred using sequence of certain (several) money application applied using time (section), successively using several moneys;
Customer attribute information, such as the information such as interest, hobby, age, gender of user, can pass through other information meter It calculates and obtains;
There are certain between a certain or certain several contact person in contact relationship information, such as user and contacts list A possibility that relationship (such as conjugal relation or friends) or user and a certain or certain several contact person in contacts list Cohesion information or user frequent contact information;
User activity information, such as the work and rest habit or the business address of user, home address, frequent activity of user Range, mode of transportation information etc..
Above- mentioned information can acquire during user's normal operating user equipment, user to information gathering process without Sense, therefore user experience is also preferable;On the other hand, due to the operating habit based on user, above- mentioned information are for distinguishing user's Accuracy rate is higher.
Certainly, those skilled in the art will be understood that the every terms of information in the apparatus described above operation model is only to lift Example, and it is not construed as any restrictions to the application;Information that is any existing or being likely to occur from now on such as can apply to It states equipment operation model and is suitable for the application, be also contained in the protection scope of the application, and be contained in by reference This.
In addition, above-described every terms of information optionally includes probabilistic information in the case where not generating contradictory situation, this is general Rate information is determined based on the statistical data in statistical database Mr. Yu's section time.For example, but without limitation, when the equipment is grasped As model include customer attribute information and the customer attribute information include the gender of user when, in some embodiments, the user Attribute information includes the probability that user is male user or female user;In another example but without limitation, when the equipment operation Model includes the time that certain money should be used to apply comprising user using preference information using preference information of user Duan Shi should include in some embodiments the probability that user uses the application within certain period using preference information.
In some embodiments, the user equipment includes touching screen, needed for which is used to present to user Information, such as text or graphic user interface, virtual key etc., and pass through the operation inputs such as pressing, touching, sliding for user Corresponding operation instruction.In step s 110, the touch operation of touch screen of the user equipment based on user to user equipment, really The equipment operation data of the fixed user.Wherein, the equipment operation model includes the gesture habits information of the user.Example Such as, which includes user's habit with left hand/right hand-held set probability, or the approximate size of sliding finger.By For user specific for one, gesture habits information is more difficult or can not change, therefore is distinguished by gesture habits information The confidence level of other user is higher, can deposit in the gesture habit of two users and accurately differentiate the two use in different situations Family, the case where being also not susceptible to report by mistake legitimate user as illegal user.
In some embodiments, above-mentioned steps S110 includes that sub-step S111 (not shown) and sub-step S112 (do not show Out).In sub-step S111, operation of the user equipment based on user to user equipment, determine the user using inclined Good information.For example, should include but is not limited to that user opens certain a or certain several money application time using preference information Number, period, frequency etc., or certain is kept to apply the duration etc. in the screen front end of user equipment.Due to using inclined Good information is acquired during user is using application, and user is noninductive to collection process, is not easy to cause the dislike of user, It is avoided that illegal user's deliberately identification of the avoidance system to its illegal identity.
In some embodiments, above-mentioned steps S110 further includes sub-step S113 (not shown).In sub-step S113, use Family equipment, using preference information, determines the customer attribute information of the user based on described;Then in sub-step S112, User equipment, using preference information and the customer attribute information, determines the equipment operation of the user based on described Data, and determine according to the equipment operation data equipment operation data of the user.Wherein, by being further processed to obtain Customer attribute information identify user identity, can greatly reduce complete identification needed for data volume, the processing of lifting system Efficiency.For example, in some embodiments, duration, the class of application that system is applied according to user using certain a or certain several money Type, using period of application etc., judge the customer attribute informations such as interest, hobby, age, the gender of user.Optionally, described Customer attribute information may include probabilistic information, such as probability of the age in some age bracket of corresponding user.
In some embodiments, in step s 110, communication operation of the user equipment based on user to user equipment determines The equipment operation data of the user.Wherein, the communication operation of user, including but not limited to the next item down or several items: user It dials or receives calls, user collects or sends Email, user passes through instant message applications or social software and communication pair As communication, and those skilled in the art will be understood that these communication operations are only for example, and be not construed as the limit to the application System, other communication operations that are existing or being likely to occur from now on such as can be suitably used for the application, are also contained in the protection of the application In range, and it is incorporated herein by reference.Wherein, it is based on the communication operation, above equipment operation data includes, but not It is limited to, communication object, communication time or the period of user, communication duration etc..Then, in the step s 120, user equipment according to The equipment operation data determine equipment operation model about the user equipment, wherein the equipment operation model includes The contact relationship information;Without limitation, the contact relationship information includes following one or several items:
Connection frequency information about at least one contact person;
Connection period information about at least one contact person;
Connection duration information about at least one contact person;
Contact person's cohesion information about at least one contact person.
Wherein, in some embodiments, above-mentioned contact person's cohesion information is determined based on other contact relationship information, example Such as determined based on connection frequency information, connection period information, connection duration information.
For user specific for one, contact person be usually it is relatively stable and with a high credibility, for example, often with The contact person of user connection, should be able to differentiate rapidly that current that communicated with it is the user or jactitator. Therefore, user identity is recognized by contact relationship information, stability, timeliness and reliability with higher.
In some embodiments, the equipment operation data include the user activity information, the user activity information Including with the next item down or several items:
The business address information of the user;
The home address information of the user;
The common scope of activities information of the user;
The common mode of transportation information of the user.
Wherein, in some embodiments, above-mentioned common mode of transportation information, can be true based on other user activity informations Determine, such as common scope of activities, inactivity period or duration in conjunction with user, activity are determined with speed etc..In some embodiments, on It states one or several user activity informations is based on a data model (for example, the data model is based on including but is not limited to depth Neural network, decision tree, random forest, support vector machines, the exploitation of nonlinear regression scheduling algorithm) it determines.By being further processed Obtained mode of transportation information identifies user identity, can greatly reduce data volume needed for completing identification, lifting system Treatment effeciency.
As described above, user equipment is by by above equipment operation model, the predetermined registration operation model being generated in advance with one into Row compares, to judge the legitimacy of active user (for example, the user for corresponding to above equipment operation model), such as user equipment Obtain the authorization message that the user uses the user equipment.In some embodiments, above-mentioned steps S130 includes sub-step S131 (not shown), sub-step S132 (not shown) and sub-step S133 (not shown).In sub-step S131, user equipment pair The equipment operation model and pre-generated predetermined registration operation model, which execute, compares operation, with the determination equipment operation model With the distortion of the predetermined registration operation model;In sub-step S132, user equipment is greater than in advance when the distortion If when similarity threshold, determining that the operation permission information of the user includes being authorized to;Otherwise, it in sub-step S133, uses Family equipment determines that the operation permission information of the user includes uncommitted.The process betides the mistake that user uses user equipment Cheng Zhong, and carry out additional operation without user and can be completed, therefore above-mentioned identity discrimination process will not influence the normal of user Operation, will not cause the dislike of user, especially legitimate user.And for illegal user, in some embodiments, when When the operation permission information includes uncommitted, the user equipment is locked.
In some embodiments, to the comparison of two data models (such as predetermined registration operation model and equipment operation model), It is determination to be calculated based on the deviation to parameter (or each parameter and its respective weights) each in two data models, such as distinguish The deviation for calculating each corresponding parameter in two data models, as deviation within the allowable range if think two parameter phases one It causes, and determines the similarity of two models according to the quantity of parameter consistent in two models.For example, system-computed two Accounting of the quantity of consistent parameter in number of parameters in model;And in some embodiments, which can also add on demand Power calculates, and to embody the difference that different parameters are influenced by user operation habits in model, keeps judging result more accurate.
After user equipment is locked, in order to make legitimate user reacquire the access right of user equipment, it may be verified that use The validity at family.In some embodiments, the above method further includes step S150 (not shown) and step S160.In step S150 In, equipment unlock instruction of the user equipment based on user carries out authentication operation to user.Wherein, the equipment unlock instruction It can be generated based on the relevant operation that user to user equipment carries out, it may for example comprise but be not limited to press some key or pressing Certain key combination presses one or several keys according to particular order, is touched or slided, inputted on the touch screen Phonetic order etc..In step S160, if the operating result of the user equipment authentication operation includes being verified, unlock The user equipment.For example, but without limitation, user equipment is based on the authentication informations such as password, fingerprint, vocal print, verifying The identity of user.
In some embodiments, above-mentioned authentication information is providing a user corresponding prompt information by user equipment It is acquired after (for prompting user to provide authentication information).And in further embodiments, above-mentioned authentication information It is collected simultaneously in user input equipment unlock instruction, to improve the efficiency that user carries out authentication, promoting user makes With experience;For example, but without limitation, the specific region progress pressing operation of user on a user device, and the specific region Finger print acquisition module equipped with the finger print information for acquiring user.
Although same user is difficult to be mutated in a short time for the use habit of a user equipment, when longer Between under scale, the use habit of a user is it can also happen that slowly variation.In order to adapt to this variation to promote user Usage experience, in some embodiments, the above method further includes step S170 (not shown).In step S170, Yong Hushe It is standby to execute following at least any one operation:
When the operation permission information includes being authorized to, the default behaviour is updated based on the equipment operation data Make model;
When the operation permission information includes be authorized to and when the user equipment is under network connection state, general The corresponding network equipment is sent to based on the updated predetermined registration operation model of the equipment operation data;
When the operation permission information includes be authorized to and when the user equipment is under network connection state, general The equipment operation data are sent to the corresponding network equipment.
In other words, user equipment is grasped in the case where active user is identified as legitimate user according to the correlation of user Make, updates pre-set predetermined registration operation model.Subsequent, user equipment will identify user based on updated predetermined registration operation model Identity.
In order to avoid the equipment operation data of user cause excessive interference to predetermined registration operation model, and it is pre- to save system update If the system resource overhead of operation model, in some embodiments, the frequency of the above-mentioned pre-set predetermined registration operation model of update, Well below the frequency according to the equipment operation data generating apparatus operation model of user.
It is described in detail above a kind of being executed by user equipment, operating right for determining user to user equipment The specific embodiment of method.Wherein, the operation of user to user equipment, the equipment operation data for determining user, determination are obtained Equipment operation model, the comparison equipment operation model and pre-generated predetermined registration operation mould of the user about user equipment Type determines that the step of operation permission information of user is completed by user equipment.
According to further aspect of the application, a kind of method for determining the operating right of user is provided, by user Equipment and the cooperation of the corresponding network equipment are completed.With reference to Fig. 2, the above method the following steps are included:
User equipment determines the equipment operation data of the user based on the operation of user to user equipment, and sets described Standby operation data is sent to the corresponding network equipment;
The network equipment determines the equipment operation model about the user equipment based on the equipment operation data;
The network equipment executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, And the operation permission information of the user is determined based on the comparison result for comparing operation;
The operation permission information is sent to the user equipment by the network equipment;
The user equipment receives the operation permission information.
Compared with the method for above-described operating right being executed by user equipment, for determining user, being based on should Method, the operation of acquisition user to user equipment determine that the operation of the equipment operation data of user is still completed by user equipment, and Determine equipment operation model, the comparison equipment operation model and pre-generated predetermined registration operation of the user about user equipment Model determines that the operation of the operation permission information of user is then completed by the network equipment.In addition to this, the specific reality of this method Mode is applied, the specific embodiment party with the method for above-described operating right being executed by user equipment, for determining user Formula, identical or essentially identical, details are not described herein, and is incorporated herein by reference.
According to the one aspect of the application, a kind of operation permission information for being used to determine user at network equipment end is provided Method.With reference to Fig. 3, the method comprising the steps of S210, step S220 and step S230.In step S210, network equipment base The equipment operation data transmitted by corresponding user equipment determine the equipment operation model about the user equipment;In step In rapid S220, the network equipment executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, and The operation permission information of the user is determined based on the comparison result for comparing operation;In step S230, the network equipment will The operation permission information is sent to the user equipment.
Specifically, in step S210, the network equipment based on equipment operation data transmitted by corresponding user equipment, Determine the equipment operation model about the user equipment.Wherein, the equipment operation model of user equipment is based on above equipment What operation data determined;In some embodiments, which is to carry out processing institute based on above equipment operation data ?.For example, the network equipment according to above equipment operation data, carries out data processing and exports the equipment operation model of user, The equipment operation model includes the various equipment use habits of the user (for example, the user determined according to statistical data is in some time A possibility that certain operation is carried out to user equipment in section), using preference, (such as user runs certain application within certain period Possibility) etc., reflection user uses the use habit of the user equipment;Even for same user equipment, different user Individual character, use habit etc. all can be variant, these differences can be used for distinguishing different users, therefore can be used for judging current It the use of the user of the user equipment whether is legitimate user.
In step S220, the network equipment executes the equipment operation model and pre-generated predetermined registration operation model Operation is compared, and determines the operation permission information of the user based on the comparison result for comparing operation.For example, in generation Before stating equipment operation model, the predetermined registration operation model is generated, which is also based on relative users The operation data of user equipment is generated, and can also reflect that relative users use the use habit of the user equipment.It will be above-mentioned Equipment operation model is compared with the predetermined registration operation model, such as calculates the matching degree of the two;If the matching degree of the two is higher, Such as the matching degree is higher than a preset threshold, the corresponding user of both judgements is same user, otherwise determines that the two is different User can further determine that user corresponding to above equipment operation model is illegal user in some embodiments.
In some embodiments, the equipment operation model includes with the next item down or several items:
Gesture habits information, such as user's habit is with left hand/right hand-held set probability, or the general length of sliding finger Degree;
Using preference information, such as user is most common a or the Apply Names of several money applications, user use The probability occurred using sequence of certain (several) money application applied using time (section), successively using several moneys;
Customer attribute information, such as the information such as interest, hobby, age, gender of user, can pass through other information meter It calculates and obtains;
There are certain between a certain or certain several contact person in contact relationship information, such as user and contacts list A possibility that relationship (such as conjugal relation or friends) or user and a certain or certain several contact person in contacts list Cohesion information or user frequent contact information;
User activity information, such as the work and rest habit or the business address of user, home address, frequent activity of user Range, mode of transportation information etc..
Above- mentioned information can acquire during user's normal operating user equipment, user to information mobile phone process without Sense, therefore user experience is also preferable;On the other hand, due to the operating habit based on user, above- mentioned information are for distinguishing user's Accuracy rate is higher.
Certainly, those skilled in the art will be understood that the every terms of information in the apparatus described above operation model is only to lift Example, and it is not construed as any restrictions to the application;Information that is any existing or being likely to occur from now on such as can apply to It states equipment operation model and is suitable for the application, be also contained in the protection scope of the application, and be contained in by reference This.
In addition, above-described every terms of information optionally includes probabilistic information in the case where not generating contradictory situation, this is general Rate information is determined based on the statistical data in statistical database Mr. Yu's section time.For example, but without limitation, when the equipment is grasped As model include customer attribute information and the customer attribute information include the gender of user when, in some embodiments, the user Attribute information includes the probability that user is male user or female user;In another example but without limitation, when the equipment operation Model includes the time that certain money should be used to apply comprising user using preference information using preference information of user Duan Shi should include in some embodiments the probability that user uses the application within certain period using preference information.
In step S230, the operation permission information is sent to the user equipment by the network equipment, so that user sets Standby identification user identity, such as identify whether active user has the operating right of user equipment for user equipment.
Although same user is difficult to be mutated in a short time for the use habit of a user equipment, when longer Between under scale, the use habit of a user is it can also happen that slowly variation.In order to adapt to this variation to promote user Usage experience, in some embodiments, the above method further includes step S240 (not shown).In step S240, network is set For when the operation permission information includes being authorized to, the predetermined registration operation model is updated based on the equipment operation data. In other words, the network equipment, according to the relevant operation of user, updates pre- in the case where active user is identified as legitimate user The predetermined registration operation model being first arranged.Subsequent, system will identify user identity based on updated predetermined registration operation model.
According to further aspect of the application, a kind of operating right letter for being used to determine user at user equipment end is provided The method of breath.With reference to Fig. 4, the method comprising the steps of S310, step S320 and step S330.In step s310, user equipment Based on the operation of user to user equipment, the equipment operation data of the user are determined;In step s 320, user equipment is by institute It states equipment operation data and is sent to the corresponding network equipment;In step S330, user equipment receives the network equipment and is sent out The operation permission information of the user sent.
Specifically, in step s310, operation of the user equipment based on user to user equipment determines the user's Equipment operation data.Wherein, the equipment operation data, the including but not limited to action type of the operation of user to user equipment (e.g., including but be not limited to touching and touch screen, by pressing entity or virtual key, voice input etc.), user are operated Concrete operations data (e.g., including but it is not limited to, when user's touch position on the touch screen, user press physical button The operating time of the operation of duration, user to user equipment that key is pressed, user operate twice between interval time), User carry out relevant operation statistical data (e.g., including but be not limited to, user is accumulative time of concrete operations within certain time Number, user use certain function (such as making a phone call) of user equipment or run the cumulative number or time duration of certain application) etc.. Those skilled in the art should understand that the apparatus described above operation data is only for example, it is not construed as specific to the application The limitation of embodiment, other equipment operation data that are existing or being likely to occur from now on, such as can be suitably used for the application, also wraps Containing within the scope of protection of this application, and it is incorporated herein by reference.
In some embodiments, the operation of user to user equipment, including but not limited to touch operation, button operation, language Sound input operation etc..For example, when user equipment has, when touching screen, user can touch in the touch screen surface, point It presses, finger sliding etc., to realize operation to user equipment;When user equipment has physical button, such as the user equipment Equipped with a physical keyboard, then user's pressable physical button, to realize the operation to user equipment;When user equipment has language Sound input unit, for example, the user equipment be equipped with for acquire acoustic information microphone (Microphone, including but not limited to Capacitance microphone and electret microphone) and voice knowledge is carried out to the acoustic information that microphone acquires by the voice-input unit Not to obtain corresponding user instruction, then user can realize the operation to user equipment by phonetic order.In addition, user to The operation of family equipment is not limited in being realized based on touch screen, the keyboard etc. built in user equipment, can also be based on external equipment It realizes.In some embodiments, user equipment with one or more external input device is wired or wireless connects and communicates, user It is inputted and is instructed by the external input device, to realize the operation to user equipment.Those skilled in the art should understand that with The upper mode for realizing the operation to user equipment is only for example, and is not construed as to the application specific embodiment Limitation, other modes for realizing the operation to user equipment that are existing or being likely to occur from now on such as can be suitably used for this Application, is also contained in the protection scope of the application, and be incorporated herein by reference.
Then, in step s 320, the equipment operation data are sent to the corresponding network equipment by user equipment;In step In rapid S330, user equipment receives the operation permission information of the user transmitted by the network equipment.
In some embodiments, the above method further includes step S340.In step S340, user equipment works as the operation When authority information includes uncommitted, the user equipment is locked.
According to the one aspect of the application, provide a kind of for determining the user equipment of the operating right of user.With reference to Fig. 5, the user equipment include the one one module 110, the one or two module 120 and the one or three module 130.Wherein, the one one module 110 operations based on user to user equipment determine the equipment operation data of the user;One or two module 120 is according to described Equipment operation data determine the equipment operation model about the user equipment;One or three module 130 is to the equipment operation mould Type and pre-generated predetermined registration operation model, which execute, compares operation, and described in being determined based on the comparison result for comparing operation The operation permission information of user.
Specifically, the one one operation of the module 110 based on user to user equipment, determines the equipment operation of the user Data.Wherein, the equipment operation data, the action type of the including but not limited to operation of user to user equipment is (for example, packet Include but be not limited to touching and touch screen, by pressing entity or virtual key, voice input etc.), the concrete operations that are operated of user Data (e.g., including but it is not limited to, key is pressed when user's touch position on the touch screen, user press physical button Under duration, operating time of operation of user to user equipment, user operate twice between interval time), user carries out Relevant operation statistical data (e.g., including but be not limited to, user cumulative number of concrete operations, user within certain time Using user equipment certain function (such as making a phone call) or run certain application cumulative number or time duration) etc..This field Technical staff will be understood that the apparatus described above operation data is only for example, be not construed as to the application specific embodiment party The limitation of formula, other equipment operation data that are existing or being likely to occur from now on, such as can be suitably used for the application, be also contained in this In the protection scope of application, and it is incorporated herein by reference.
In some embodiments, the operation of user to user equipment, including but not limited to touch operation, button operation, language Sound input operation etc..For example, when user equipment has, when touching screen, user can touch in the touch screen surface, point It presses, finger sliding etc., to realize operation to user equipment;When user equipment has physical button, such as the user equipment Equipped with a physical keyboard, then user's pressable physical button, to realize the operation to user equipment;When user equipment has language Sound input unit, for example, the user equipment be equipped with for acquire acoustic information microphone (Microphone, including but not limited to Capacitance microphone and electret microphone) and voice knowledge is carried out to the acoustic information that microphone acquires by the voice-input unit Not to obtain corresponding user instruction, then user can realize the operation to user equipment by phonetic order.In addition, user to The operation of family equipment is not limited in being realized based on touch screen, the keyboard etc. built in user equipment, can also be based on external equipment It realizes.In some embodiments, user equipment with one or more external input device is wired or wireless connects and communicates, user It is inputted and is instructed by the external input device, to realize the operation to user equipment.Those skilled in the art should understand that with The upper mode for realizing the operation to user equipment is only for example, and is not construed as to the application specific embodiment Limitation, other modes for realizing the operation to user equipment that are existing or being likely to occur from now on such as can be suitably used for this Application, is also contained in the protection scope of the application, and be incorporated herein by reference.
One or two module 120 determines the equipment operation model about the user equipment according to the equipment operation data. Wherein, the equipment operation model of user equipment is determined based on above equipment operation data;In some embodiments, the equipment Operation model be based on above equipment operation data handle it is resulting.For example, user equipment is according to above equipment operand According to progress data processing and the equipment operation model for exporting user, the equipment operation model include that the various equipment of the user make With habit (for example, a possibility that carrying out certain operation to user equipment within certain period according to the user that statistical data determines), answer With preference (such as user runs a possibility that certain application within certain period) etc. is used, reflection user is made using the user equipment With habit;Even for same user equipment, individual character, use habit of different user etc. all can be variant, these differences It can be used for distinguishing different users, therefore can be used for judging whether the user of the currently used user equipment is legitimate user.
One or three module 130 executes the equipment operation model and pre-generated predetermined registration operation model and compares behaviour Make, and determines the operation permission information of the user based on the comparison result for comparing operation.For example, generating above equipment Before operation model, the predetermined registration operation model is generated, which is also based on relative users to user What the operation data of equipment generated, and can also reflect that relative users use the use habit of the user equipment.Above equipment is grasped Make model to be compared with the predetermined registration operation model, such as calculates the matching degree of the two;If the matching degree of the two is higher, such as should Matching degree determines that the corresponding user of the two is same user higher than a preset threshold, otherwise both judgements are different users, It can further determine that user corresponding to above equipment operation model is illegal user in some embodiments.
In some embodiments, the equipment operation model includes with the next item down or several items:
Gesture habits information, such as user's habit is with left hand/right hand-held set probability, or the general length of sliding finger Degree;
Using preference information, such as user is most common a or the Apply Names of several money applications, user use The probability occurred using sequence of certain (several) money application applied using time (section), successively using several moneys;
Customer attribute information, such as the information such as interest, hobby, age, gender of user, can pass through other information meter It calculates and obtains;
There are certain between a certain or certain several contact person in contact relationship information, such as user and contacts list A possibility that relationship (such as conjugal relation or friends) or user and a certain or certain several contact person in contacts list Cohesion information or user frequent contact information;
User activity information, such as the work and rest habit or the business address of user, home address, frequent activity of user Range, mode of transportation information etc..
Above- mentioned information can acquire during user's normal operating user equipment, user to information gathering process without Sense, therefore user experience is also preferable;On the other hand, due to the operating habit based on user, above- mentioned information are for distinguishing user's Accuracy rate is higher.
Certainly, those skilled in the art will be understood that the every terms of information in the apparatus described above operation model is only to lift Example, and it is not construed as any restrictions to the application;Information that is any existing or being likely to occur from now on such as can apply to It states equipment operation model and is suitable for the application, be also contained in the protection scope of the application, and be contained in by reference This.
In addition, above-described every terms of information optionally includes probabilistic information in the case where not generating contradictory situation, this is general Rate information is determined based on the statistical data in statistical database Mr. Yu's section time.For example, but without limitation, when the equipment is grasped As model include customer attribute information and the customer attribute information include the gender of user when, in some embodiments, the user Attribute information includes the probability that user is male user or female user;In another example but without limitation, when the equipment operation Model includes the time that certain money should be used to apply comprising user using preference information using preference information of user Duan Shi should include in some embodiments the probability that user uses the application within certain period using preference information.
In some embodiments, the user equipment includes touching screen, needed for which is used to present to user Information, such as text or graphic user interface, virtual key etc., and pass through the operation inputs such as pressing, touching, sliding for user Corresponding operation instruction.The touch operation of touch screen of one one module 110 based on user to user equipment, determines the use The equipment operation data at family.Wherein, the equipment operation model includes the gesture habits information of the user.For example, the gesture Habits information includes user's habit with left hand/right hand-held set probability, or the approximate size of sliding finger.Due to for one For specific user, gesture habits information is more difficult or can not change, thus by gesture habits information distinguish user can Reliability is higher, can deposit in the gesture habit of two users and accurately differentiate the two users in different situations, also be not easy to send out Raw report legitimate user for illegal user by mistake the case where.
In some embodiments, above-mentioned one one module 110 includes the first 111 (not shown) of unit and the 1st one by one 112 (not shown) of unit.First operation of the unit 111 based on user to user equipment one by one determines that the application of the user makes Use preference information.For example, should include but is not limited to that user opens certain a or certain several money application using preference information Number, period, frequency etc., or certain is kept to apply the duration etc. in the screen front end of user equipment.Since application makes It with preference information is acquired during user is using application, user is noninductive to collection process, is not easy to cause the anti-of user Sense, is also avoided that illegal user's deliberately identification of the avoidance system to its illegal identity.
In some embodiments, above-mentioned one one module 110 further includes 113 (not shown) of Unit the 1st.One one Three units 113, using preference information, determine the customer attribute information of the user based on described;Subsequent Unit the 1st 112 determine the equipment operation data of the user using preference information and the customer attribute information based on described, And the equipment operation data of the user are determined according to the equipment operation data.Wherein, the use by being further processed Family attribute information identifies user identity, can greatly reduce data volume needed for completing identification, the treatment effeciency of lifting system. For example, in some embodiments, system according to user using certain a or certain several moneys application duration, the type of application, make With the period etc. of application, the customer attribute informations such as interest, hobby, age, the gender of user are judged.Optionally, the user Attribute information may include probabilistic information, such as probability of the age in some age bracket of corresponding user.
In some embodiments, the one one communication operation of the module 110 based on user to user equipment determines the user Equipment operation data.Wherein, the communication operation of user, including but not limited to the next item down or several items: user dials or connects Answer a call, user collects or sends Email, user by instant message applications or social software and communication object communication, and Those skilled in the art will be understood that these communication operations are only for example, and be not construed as the limitation to the application, other are existing Or the communication operation that is likely to occur from now on such as can be suitably used for the application, be also contained in the protection scope of the application, and with The mode of reference is incorporated herein.Wherein, it is based on the communication operation, above equipment operation data includes, but are not limited to user's Communication object, communication time or period, communication duration etc..Then, the one or two module 120 is according to the equipment operation data, really The fixed equipment operation model about the user equipment, wherein the equipment operation model includes the contact relationship information; Without limitation, the contact relationship information includes following one or several items:
Connection frequency information about at least one contact person;
Connection period information about at least one contact person;
Connection duration information about at least one contact person;
Contact person's cohesion information about at least one contact person.
Wherein, in some embodiments, above-mentioned contact person's cohesion information is determined based on other contact relationship information, example Such as determined based on connection frequency information, connection period information, connection duration information.
For user specific for one, contact person be usually it is relatively stable and with a high credibility, for example, often with The contact person of user connection, should be able to differentiate rapidly that current that communicated with it is the user or jactitator. Therefore, user identity is recognized by contact relationship information, stability, timeliness and reliability with higher.
In some embodiments, the equipment operation data include the user activity information, the user activity information Including with the next item down or several items:
The business address information of the user;
The home address information of the user;
The common scope of activities information of the user;
The common mode of transportation information of the user.
Wherein, in some embodiments, above-mentioned common mode of transportation information, can be true based on other user activity informations Determine, such as common scope of activities, inactivity period or duration in conjunction with user, activity are determined with speed etc..In some embodiments, on It states one or several user activity informations is based on a data model (for example, the data model is based on including but is not limited to depth Neural network, decision tree, random forest, support vector machines, the exploitation of nonlinear regression scheduling algorithm) it determines.By being further processed Obtained mode of transportation information identifies user identity, can greatly reduce data volume needed for completing identification, lifting system Treatment effeciency.
As described above, user equipment is by by above equipment operation model, the predetermined registration operation model being generated in advance with one into Row compares, to judge the legitimacy of active user (for example, the user for corresponding to above equipment operation model), such as user equipment Obtain the authorization message that the user uses the user equipment.In some embodiments, above-mentioned one or three module 130 includes first 131 (not shown) of Unit 31,132 (not shown) of Unit the 1st and 133 (not shown) of Unit the 1st.One three one Unit 131 executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, to set described in determination The distortion of standby operation model and the predetermined registration operation model;One three two unit 132 is greater than when the distortion When default similarity threshold, determine that the operation permission information of the user includes being authorized to;Otherwise the one three three unit 133 is true The operation permission information of the fixed user includes uncommitted.The process betides user using during user equipment, and Carrying out additional operation without user can be completed, therefore above-mentioned identity discrimination process will not influence the normal operating of user, The dislike of user, especially legitimate user are not will cause.And for illegal user, in some embodiments, as the behaviour When as authority information including uncommitted, the user equipment is locked.
In some embodiments, to the comparison of two data models (such as predetermined registration operation model and equipment operation model), It is determination to be calculated based on the deviation to parameter (or each parameter and its respective weights) each in two data models, such as distinguish The deviation for calculating each corresponding parameter in two data models, as deviation within the allowable range if think two parameter phases one It causes, and determines the similarity of two models according to the quantity of parameter consistent in two models.For example, system-computed two Accounting of the quantity of consistent parameter in number of parameters in model;And in some embodiments, which can also add on demand Power calculates, and to embody the difference that different parameters are influenced by user operation habits in model, keeps judging result more accurate.
After user equipment is locked, in order to make legitimate user reacquire the access right of user equipment, it may be verified that use The validity at family.In some embodiments, the above method further includes 150 (not shown) of the one or five module and the one or six module 160. Equipment unlock instruction of one or five module 150 based on user carries out authentication operation to user.Wherein, equipment unlock refers to Enabling can be generated based on the relevant operation that user to user equipment carries out, it may for example comprise but be not limited to press some key or by Certain key combination is pressed, one or several keys are pressed according to particular order, is touched or is slided on the touch screen, is defeated Enter phonetic order etc..If the operating result of the authentication operation of the one or six module 160 includes being verified, the use is unlocked Family equipment.For example, but without limitation, user equipment is based on the authentication informations such as password, fingerprint, vocal print, verifies user's Identity.
In some embodiments, above-mentioned authentication information is providing a user corresponding prompt information by user equipment It is acquired after (for prompting user to provide authentication information).And in further embodiments, above-mentioned authentication information It is collected simultaneously in user input equipment unlock instruction, to improve the efficiency that user carries out authentication, promoting user makes With experience;For example, but without limitation, the specific region progress pressing operation of user on a user device, and the specific region Finger print acquisition module equipped with the finger print information for acquiring user.
Although same user is difficult to be mutated in a short time for the use habit of a user equipment, when longer Between under scale, the use habit of a user is it can also happen that slowly variation.In order to adapt to this variation to promote user Usage experience, in some embodiments, above-mentioned user equipment further includes 170 (not shown) of the one or seven module.One or seven module 170 execute following at least any one operation:
When the operation permission information includes being authorized to, the default behaviour is updated based on the equipment operation data Make model;
When the operation permission information includes be authorized to and when the user equipment is under network connection state, general The corresponding network equipment is sent to based on the updated predetermined registration operation model of the equipment operation data;
When the operation permission information includes be authorized to and when the user equipment is under network connection state, general The equipment operation data are sent to the corresponding network equipment.
In other words, user equipment is grasped in the case where active user is identified as legitimate user according to the correlation of user Make, updates pre-set predetermined registration operation model.Subsequent, user equipment will identify user based on updated predetermined registration operation model Identity.
In order to avoid the equipment operation data of user cause excessive interference to predetermined registration operation model, and it is pre- to save system update If the system resource overhead of operation model, in some embodiments, the frequency of the above-mentioned pre-set predetermined registration operation model of update, Well below the frequency according to the equipment operation data generating apparatus operation model of user.
It is described in detail above a kind of being executed by user equipment, operating right for determining user to user equipment The specific embodiment of method.Wherein, the operation of user to user equipment, the equipment operation data for determining user, determination are obtained Equipment operation model, the comparison equipment operation model and pre-generated predetermined registration operation mould of the user about user equipment Type determines that the step of operation permission information of user is completed by user equipment.
According to the one aspect of the application, provide a kind of for determining the network equipment of the operation permission information of user. With reference to Fig. 6, which includes the 2nd 1 module 210, the two or two module 220 and the two or three module 230.2nd 1 module 210, based on equipment operation data transmitted by corresponding user equipment, determine the equipment operation model about the user equipment; Two or two module 220 executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, and is based on The comparison result for comparing operation determines the operation permission information of the user;Two or three module 230 is by the operating right Information is sent to the user equipment.
Specifically, the 2nd 1 module 210 based on equipment operation data transmitted by corresponding user equipment, determine about The equipment operation model of the user equipment.Wherein, the equipment operation model of user equipment is based on above equipment operation data Determining;In some embodiments, the equipment operation model be based on above equipment operation data handle it is resulting.Example Such as, the network equipment carries out data processing and exports the equipment operation model of user according to above equipment operation data, equipment behaviour Be used as model include the user various equipment use habits (for example, according to statistical data determine user within certain period to Family equipment carries out a possibility that certain operation), using preference (such as user runs a possibility that certain application within certain period) Deng, reflection user use the user equipment use habit;Even for same user equipment, the individual character of different user, Use habit etc. all can be variant, these differences can be used for distinguishing different users, therefore can be used for judging currently used be somebody's turn to do Whether the user of user equipment is legitimate user.
Two or two module 220 executes the equipment operation model and pre-generated predetermined registration operation model and compares behaviour Make, and determines the operation permission information of the user based on the comparison result for comparing operation.For example, generating above equipment Before operation model, the predetermined registration operation model is generated, which is also based on relative users to user What the operation data of equipment generated, and can also reflect that relative users use the use habit of the user equipment.Above equipment is grasped Make model to be compared with the predetermined registration operation model, such as calculates the matching degree of the two;If the matching degree of the two is higher, such as should Matching degree determines that the corresponding user of the two is same user higher than a preset threshold, otherwise both judgements are different users, It can further determine that user corresponding to above equipment operation model is illegal user in some embodiments.
In some embodiments, the equipment operation model includes with the next item down or several items:
Gesture habits information, such as user's habit is with left hand/right hand-held set probability, or the general length of sliding finger Degree;
Using preference information, such as user is most common a or the Apply Names of several money applications, user use The probability occurred using sequence of certain (several) money application applied using time (section), successively using several moneys;
Customer attribute information, such as the information such as interest, hobby, age, gender of user, can pass through other information meter It calculates and obtains;
There are certain between a certain or certain several contact person in contact relationship information, such as user and contacts list A possibility that relationship (such as conjugal relation or friends) or user and a certain or certain several contact person in contacts list Cohesion information or user frequent contact information;
User activity information, such as the work and rest habit or the business address of user, home address, frequent activity of user Range, mode of transportation information etc..
Above- mentioned information can acquire during user's normal operating user equipment, user to information mobile phone process without Sense, therefore user experience is also preferable;On the other hand, due to the operating habit based on user, above- mentioned information are for distinguishing user's Accuracy rate is higher.
Certainly, those skilled in the art will be understood that the every terms of information in the apparatus described above operation model is only to lift Example, and it is not construed as any restrictions to the application;Information that is any existing or being likely to occur from now on such as can apply to It states equipment operation model and is suitable for the application, be also contained in the protection scope of the application, and be contained in by reference This.
In addition, above-described every terms of information optionally includes probabilistic information in the case where not generating contradictory situation, this is general Rate information is determined based on the statistical data in statistical database Mr. Yu's section time.For example, but without limitation, when the equipment is grasped As model include customer attribute information and the customer attribute information include the gender of user when, in some embodiments, the user Attribute information includes the probability that user is male user or female user;In another example but without limitation, when the equipment operation Model includes the time that certain money should be used to apply comprising user using preference information using preference information of user Duan Shi should include in some embodiments the probability that user uses the application within certain period using preference information.
The operation permission information is sent to the user equipment by the two or three module 230, is used so that user equipment identifies Family identity, such as identify whether active user has the operating right of user equipment for user equipment.
Although same user is difficult to be mutated in a short time for the use habit of a user equipment, when longer Between under scale, the use habit of a user is it can also happen that slowly variation.In order to adapt to this variation to promote user Usage experience, in some embodiments, above equipment further includes 240 (not shown) of the two or four module.Two or four module 240 is worked as The operation permission information includes updating the predetermined registration operation model based on the equipment operation data when being authorized to.Change sentence It talks about, in the case where active user is identified as legitimate user, according to the relevant operation of user, update is set the network equipment in advance The predetermined registration operation model set.Subsequent, system will identify user identity based on updated predetermined registration operation model.
According to further aspect of the application, provide a kind of for determining that the user of the operation permission information of user sets It is standby.With reference to Fig. 7, which includes the 3rd 1 module 310, the three or two module 320 and the three or three module 330.3rd 1 mould Operation of the block 310 based on user to user equipment determines the equipment operation data of the user;Three or two module 320 will be described Equipment operation data are sent to the corresponding network equipment;Three or three module 330 receives the use transmitted by the network equipment The operation permission information at family.
Specifically, the 3rd 1 operation of the module 310 based on user to user equipment, determines the equipment operation of the user Data.Wherein, the equipment operation data, the action type of the including but not limited to operation of user to user equipment is (for example, packet Include but be not limited to touching and touch screen, by pressing entity or virtual key, voice input etc.), the concrete operations that are operated of user Data (e.g., including but it is not limited to, key is pressed when user's touch position on the touch screen, user press physical button Under duration, operating time of operation of user to user equipment, user operate twice between interval time), user carries out Relevant operation statistical data (e.g., including but be not limited to, user cumulative number of concrete operations, user within certain time Using user equipment certain function (such as making a phone call) or run certain application cumulative number or time duration) etc..This field Technical staff will be understood that the apparatus described above operation data is only for example, be not construed as to the application specific embodiment party The limitation of formula, other equipment operation data that are existing or being likely to occur from now on, such as can be suitably used for the application, be also contained in this In the protection scope of application, and it is incorporated herein by reference.
In some embodiments, the operation of user to user equipment, including but not limited to touch operation, button operation, language Sound input operation etc..For example, when user equipment has, when touching screen, user can touch in the touch screen surface, point It presses, finger sliding etc., to realize operation to user equipment;When user equipment has physical button, such as the user equipment Equipped with a physical keyboard, then user's pressable physical button, to realize the operation to user equipment;When user equipment has language Sound input unit, for example, the user equipment be equipped with for acquire acoustic information microphone (Microphone, including but not limited to Capacitance microphone and electret microphone) and voice knowledge is carried out to the acoustic information that microphone acquires by the voice-input unit Not to obtain corresponding user instruction, then user can realize the operation to user equipment by phonetic order.In addition, user to The operation of family equipment is not limited in being realized based on touch screen, the keyboard etc. built in user equipment, can also be based on external equipment It realizes.In some embodiments, user equipment with one or more external input device is wired or wireless connects and communicates, user It is inputted and is instructed by the external input device, to realize the operation to user equipment.Those skilled in the art should understand that with The upper mode for realizing the operation to user equipment is only for example, and is not construed as to the application specific embodiment Limitation, other modes for realizing the operation to user equipment that are existing or being likely to occur from now on such as can be suitably used for this Application, is also contained in the protection scope of the application, and be incorporated herein by reference.
Then, the equipment operation data are sent to the corresponding network equipment by the three or two module 320;Three or three module 330 receive the operation permission information of the user transmitted by the network equipment.
In some embodiments, above-mentioned user equipment further includes the three or four module 340.Three or four module 340 works as the behaviour When as authority information including uncommitted, the user equipment is locked.
In some embodiments of the present application, in the equipment operation mould of the model that user equipment locally generates, such as user Type is written into the hardware cache of user equipment and sets up protection mechanism;Erasing hardware cache needs to verify the effective of user Property, such as verified by modes such as password, fingerprints, to improve the safety of system, illegal user is avoided to pass through brush The mode of firmware is write around Authentication mechanism.In addition, above-described be used to determine user by what user equipment was implemented separately Operating right mode, and with user equipment and the network equipment realize for determine user operating right side Formula can combine realization, such as when user equipment cannot connect to the network equipment, the use of user is individually verified by user equipment Permission to can not only carry out dynamic update to the relevant information at network equipment end, but also can pass through suspension to avoid illegal user Mode bypasses Authentication mechanism.
Present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has calculating Machine code, when the computer code is performed, such as preceding described in any item methods are performed.
Present invention also provides a kind of computer program products, when the computer program product is executed by computer equipment When, such as preceding described in any item methods are performed.
Present invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Memory, for storing one or more computer programs;
When one or more of computer programs are executed by one or more of processors so that it is one or Multiple processors realize such as preceding described in any item methods.
Fig. 8 shows the exemplary system that can be used for implementing each embodiment described herein.
As shown in figure 8, in some embodiments, system 400 can be as any one user in each embodiment Equipment or the network equipment.In some embodiments, system 400 may include computer-readable Jie of one or more with instruction Matter (for example, system storage or NVM/ store equipment 420) and simultaneously quilt is coupled with the one or more computer-readable medium Be configured to execute instruction with realize module thereby executing movement described herein one or more processors (for example, (one It is a or multiple) processor 405).
For one embodiment, system control module 410 may include any suitable interface controller, with to (one or It is multiple) at least one of processor 405 and/or any suitable equipment or component that communicate with system control module 410 mentions For any suitable interface.
System control module 410 may include Memory Controller module 430, to provide interface to system storage 415.It deposits Memory controller module 430 can be hardware module, software module and/or firmware module.
System storage 415 can be used for for example, load of system 400 and storing data and/or instruction.For a reality Example is applied, system storage 415 may include any suitable volatile memory, for example, DRAM appropriate.In some embodiments In, system storage 415 may include four Synchronous Dynamic Random Access Memory of Double Data Rate type (DDR4SDRAM).
For one embodiment, system control module 410 may include one or more input/output (I/O) controller, with Equipment 420 is stored to NVM/ and (one or more) communication interface 425 provides interface.
For example, NVM/ storage equipment 420 can be used for storing data and/or instruction.NVM/ storage equipment 420 may include appointing It anticipates nonvolatile memory appropriate (for example, flash memory) and/or to may include that any suitable (one or more) is non-volatile deposit Equipment is stored up (for example, one or more hard disk drives (HDD), one or more CD (CD) drivers and/or one or more Digital versatile disc (DVD) driver).
NVM/ storage equipment 420 may include a part for the equipment being physically mounted on as system 400 Storage resource or its can by the equipment access without a part as the equipment.For example, NVM/ storage equipment 420 can It is accessed by network via (one or more) communication interface 425.
(one or more) communication interface 425 can be provided for system 400 interface with by one or more networks and/or with Other any equipment communications appropriate.System 400 can be according to any mark in one or more wireless network standards and/or agreement Quasi- and/or agreement is carried out wireless communication with the one or more components of wireless network.
For one embodiment, at least one of (one or more) processor 405 can be with system control module 410 The logic of one or more controllers (for example, Memory Controller module 430) is packaged together.For one embodiment, (one It is a or multiple) at least one of processor 405 can encapsulate with the logic of one or more controllers of system control module 410 Together to form system in package (SiP).For one embodiment, at least one of (one or more) processor 405 It can be integrated on same mold with the logic of one or more controllers of system control module 410.For one embodiment, At least one of (one or more) processor 405 can be with the logic of one or more controllers of system control module 410 It is integrated on same mold to form system on chip (SoC).
In various embodiments, system 400 can be, but not limited to be: server, work station, desk-top calculating equipment or movement It calculates equipment (for example, lap-top computing devices, handheld computing device, tablet computer, net book etc.).In various embodiments, System 400 can have more or fewer components and/or different frameworks.For example, in some embodiments, system 400 includes One or more video cameras, keyboard, liquid crystal display (LCD) screen (including touch screen displays), nonvolatile memory port, Mutiple antennas, graphic chips, specific integrated circuit (ASIC) and loudspeaker.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed to implement the above steps or functions by processor.Similarly, the application Software program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, Magnetic or optical driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, example Such as, as the circuit cooperated with processor thereby executing each step or function.
In addition, a part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. Those skilled in the art will be understood that the existence form of computer program instructions in computer-readable medium includes but is not limited to Source file, executable file, installation package file etc., correspondingly, the mode that computer program instructions are computer-executed include but Be not limited to: the computer directly execute the instruction or the computer compile the instruction after execute program after corresponding compiling again, Perhaps the computer reads and executes the instruction or after the computer reads and install and execute corresponding installation again after the instruction Program.Here, computer-readable medium can be for computer access any available computer readable storage medium or Communication media.
Communication media includes whereby including, for example, computer readable instructions, data structure, program module or other data Signal of communication is transmitted to the medium of another system from a system.Communication media may include having the transmission medium led (such as electric Cable and line (for example, optical fiber, coaxial etc.)) and can propagate wireless (not having the transmission the led) medium of energy wave, such as sound, electricity Magnetic, RF, microwave and infrared.Computer readable instructions, data structure, program module or other data can be embodied as example wireless Medium (such as carrier wave or be such as embodied as spread spectrum technique a part similar mechanism) in modulated message signal. Term " modulated message signal " refers to that one or more feature is modified or is set in a manner of encoded information in the signal Fixed signal.Modulation can be simulation, digital or Hybrid Modulation Technology.
As an example, not a limit, computer readable storage medium may include such as computer-readable finger for storage Enable, the volatile and non-volatile that any method or technique of the information of data structure, program module or other data is realized, can Mobile and immovable medium.For example, computer readable storage medium includes, but are not limited to volatile memory, such as with Machine memory (RAM, DRAM, SRAM);And nonvolatile memory, such as flash memory, various read-only memory (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM);And magnetic and optical storage apparatus (hard disk, Tape, CD, DVD);Or other currently known media or Future Development can store the computer used for computer system Readable information/data.
Here, including a device according to one embodiment of the application, which includes for storing computer program The memory of instruction and processor for executing program instructions, wherein when the computer program instructions are executed by the processor When, trigger method and/or technology scheme of the device operation based on aforementioned multiple embodiments according to the application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (19)

1. a kind of method for determining the operation permission information of user, wherein this method comprises:
Based on the operation of user to user equipment, the equipment operation data of the user are determined;
According to the equipment operation data, the equipment operation model about the user equipment is determined;
The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, and is grasped based on the comparison The comparison result of work determines the operation permission information of the user.
2. according to the method described in claim 1, wherein, the equipment operation model includes following at least any one:
Gesture habits information;
Using preference information;
Customer attribute information;
Contact relationship information;
User activity information.
3. the user equipment includes touching screen according to the method described in claim 2, wherein, it is described based on user to The operation of family equipment determines the equipment operation data of the user, comprising:
The touch operation of touch screen based on user to user equipment, determines the equipment operation data of the user;
Wherein the equipment operation model includes the gesture habits information of the user.
4. according to the method described in claim 2, wherein, the touch of the touch screen based on user to user equipment is grasped Make, determine the equipment operation data of the user, comprising:
Based on the operation of user to user equipment, determine the user using preference information;
Based on the equipment operation data for determining the user using preference information.
5. according to the method described in claim 4, wherein, the step a further include:
Based on described using preference information, the customer attribute information of the user is determined;
It is described based on the equipment operation data for determining the user using preference information, comprising:
Based at least one using in preference information and the customer attribute information, setting for the user is determined Standby operation data, and determine according to the equipment operation data equipment operation data of the user.
6. according to the method described in claim 2, wherein, the operation based on user to user equipment determines the user Equipment operation data, comprising:
Based on the communication operation of user to user equipment, the equipment operation data of the user are determined;
It is described according to the equipment operation data, determine the equipment operation model about the user equipment, comprising:
According to the equipment operation data, the equipment operation model about the user equipment is determined, wherein the equipment operation Model includes the contact relationship information, and the contact relationship information includes following at least any one:
Connection frequency information about at least one contact person;
Connection period information about at least one contact person;
Connection duration information about at least one contact person;
Contact person's cohesion information about at least one contact person.
7. according to the method described in claim 2, wherein, the equipment operation model includes the User Activity letter of the user Breath, the user activity information include following at least any one:
The business address information of the user;
The home address information of the user;
The common scope of activities information of the user;
The common mode of transportation information of the user.
It is described to the equipment operation model and pre-generated default behaviour 8. according to the method described in claim 1, wherein Make model and executes the operation permission information that the comparison result for comparing operation, and operating based on the comparison determines the user, packet It includes:
The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, with the determination equipment behaviour Make the distortion of model and the predetermined registration operation model;
When the distortion is greater than default similarity threshold, determine that the operation permission information of the user includes being awarded Power;Otherwise
Determine that the operation permission information of the user includes uncommitted.
9. according to the method described in claim 8, wherein, the method also includes:
When the operation permission information includes uncommitted, the user equipment is locked.
10. according to the method described in claim 9, wherein, the method also includes:
Equipment unlock instruction based on user carries out authentication operation to user;
If the operating result of the authentication operation includes being verified, the user equipment is unlocked.
11. according to the method described in claim 1, wherein, the method also includes following at least any one:
When the operation permission information includes being authorized to, the predetermined registration operation mould is updated based on the equipment operation data Type;
When the operation permission information includes being authorized to and when the user equipment is under network connection state, will be based on The updated predetermined registration operation model of equipment operation data is sent to the corresponding network equipment;
When the operation permission information includes be authorized to and when the user equipment is under network connection state, will described in Equipment operation data are sent to the corresponding network equipment.
12. according to the method described in claim 1, wherein, the equipment operation model is stored in the hard of the user equipment Part caching.
13. a kind of method for the operation permission information for being used to determine user at network equipment end, wherein this method comprises:
Based on equipment operation data transmitted by corresponding user equipment, the equipment operation mould about the user equipment is determined Type;
The equipment operation model and pre-generated predetermined registration operation model are executed and compare operation, and is grasped based on the comparison The comparison result of work determines the operation permission information of the user;
The operation permission information is sent to the user equipment.
14. according to the method for claim 13, wherein the method also includes:
When the operation permission information includes being authorized to, the predetermined registration operation mould is updated based on the equipment operation data Type.
15. a kind of method for the operation permission information for being used to determine user at user equipment end, wherein this method comprises:
Based on the operation of user to user equipment, the equipment operation data of the user are determined;
The equipment operation data are sent to the corresponding network equipment;
Receive the operation permission information of the user transmitted by the network equipment.
16. according to the method for claim 15, wherein the method also includes:
When the operation permission information includes uncommitted, the user equipment is locked.
17. a kind of method for determining the operation permission information of user, wherein this method comprises:
User equipment determines the equipment operation data of the user based on the operation of user to user equipment, and the equipment is grasped The corresponding network equipment is sent to as data;
The network equipment determines the equipment operation model about the user equipment based on the equipment operation data;
The network equipment executes the equipment operation model and pre-generated predetermined registration operation model and compares operation, and base The operation permission information of the user is determined in the comparison result for comparing operation;
The operation permission information is sent to the user equipment by the network equipment;
The user equipment receives the operation permission information.
18. a kind of equipment for determining the operation permission information of user, wherein the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed It executes according to claim 1 to the operation of any one of 16 the methods.
19. a kind of computer-readable medium of store instruction, described instruction wants system execution according to right Ask the operation of any one of 1 to 16 the method.
CN201811610638.1A 2018-12-27 2018-12-27 It is a kind of for determining the method and apparatus of the operation permission information of user Pending CN109618342A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811610638.1A CN109618342A (en) 2018-12-27 2018-12-27 It is a kind of for determining the method and apparatus of the operation permission information of user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811610638.1A CN109618342A (en) 2018-12-27 2018-12-27 It is a kind of for determining the method and apparatus of the operation permission information of user

Publications (1)

Publication Number Publication Date
CN109618342A true CN109618342A (en) 2019-04-12

Family

ID=66012735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811610638.1A Pending CN109618342A (en) 2018-12-27 2018-12-27 It is a kind of for determining the method and apparatus of the operation permission information of user

Country Status (1)

Country Link
CN (1) CN109618342A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971608A (en) * 2019-12-06 2020-04-07 成都卫士通信息产业股份有限公司 Information processing method, device and system and server

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141721A (en) * 2006-09-05 2008-03-12 北京三星通信技术研究有限公司 Safety mobile telephone based communication custom
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
CN103034429A (en) * 2011-10-10 2013-04-10 北京千橡网景科技发展有限公司 Identity authentication method and device for touch screen
CN103955637A (en) * 2014-04-09 2014-07-30 可牛网络技术(北京)有限公司 Identification method and device for user identity of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104881594A (en) * 2015-05-06 2015-09-02 镇江乐游网络科技有限公司 Smartphone ownership detection method based on accurate figure
CN105591743A (en) * 2014-10-23 2016-05-18 腾讯科技(深圳)有限公司 Method and device for carrying out identity authentication through equipment operation features of user terminal
CN106301778A (en) * 2015-05-19 2017-01-04 中兴通讯股份有限公司 Auth method, device, system and user terminal
CN106372488A (en) * 2016-08-23 2017-02-01 华为技术有限公司 Device control method and apparatus

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141721A (en) * 2006-09-05 2008-03-12 北京三星通信技术研究有限公司 Safety mobile telephone based communication custom
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN103034429A (en) * 2011-10-10 2013-04-10 北京千橡网景科技发展有限公司 Identity authentication method and device for touch screen
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
CN103955637A (en) * 2014-04-09 2014-07-30 可牛网络技术(北京)有限公司 Identification method and device for user identity of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN105591743A (en) * 2014-10-23 2016-05-18 腾讯科技(深圳)有限公司 Method and device for carrying out identity authentication through equipment operation features of user terminal
CN104881594A (en) * 2015-05-06 2015-09-02 镇江乐游网络科技有限公司 Smartphone ownership detection method based on accurate figure
CN106301778A (en) * 2015-05-19 2017-01-04 中兴通讯股份有限公司 Auth method, device, system and user terminal
CN106372488A (en) * 2016-08-23 2017-02-01 华为技术有限公司 Device control method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971608A (en) * 2019-12-06 2020-04-07 成都卫士通信息产业股份有限公司 Information processing method, device and system and server

Similar Documents

Publication Publication Date Title
CN108780475B (en) Personalized inference authentication for virtual assistance
US10313882B2 (en) Dynamic unlock mechanisms for mobile devices
KR102601279B1 (en) Remote usage of locally stored biometric authentication data
CN110768968B (en) Authorization method, device, equipment and system based on verifiable statement
US9529987B2 (en) Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior
US20210076212A1 (en) Recognizing users with mobile application access patterns learned from dynamic data
US11277421B2 (en) Systems and methods for detecting and thwarting attacks on an IT environment
CN105262779B (en) Identity authentication method, device and system
CN110011954B (en) Homomorphic encryption-based biological identification method, device, terminal and business server
US10432622B2 (en) Securing biometric data through template distribution
CN108509786A (en) Utilize the certification of two level ratifier
CN107818258A (en) Indirect certification
US20130159217A1 (en) Environmentally-responsive behavioral fingerprinting
CN112200949B (en) Entrance guard starting method and device and identity verification system
CN108886469A (en) For providing the methods, devices and systems of holding account information
TW201631507A (en) Method and apparatus for dynamic modification of authentication requirements of a processing system
CN104954132A (en) Information processing apparatus, information processing method, and recording medium
WO2019010669A1 (en) Method, apparatus and system for identity validity verification
CN109684839A (en) Self-definition model tamper resistant method, device, terminal device and storage medium
CN108475304A (en) A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic
EP3937040A1 (en) Systems and methods for securing login access
CN106464502A (en) Methods and systems for authentication of a communication device
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
WO2018140172A1 (en) Determining computer ownership
CN109254661A (en) Image display method, device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412