CN110046491B - Method and device for verifying security problem, electronic equipment and storage medium - Google Patents

Method and device for verifying security problem, electronic equipment and storage medium Download PDF

Info

Publication number
CN110046491B
CN110046491B CN201910165354.4A CN201910165354A CN110046491B CN 110046491 B CN110046491 B CN 110046491B CN 201910165354 A CN201910165354 A CN 201910165354A CN 110046491 B CN110046491 B CN 110046491B
Authority
CN
China
Prior art keywords
answer
semantic
verification
stored
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910165354.4A
Other languages
Chinese (zh)
Other versions
CN110046491A (en
Inventor
刘铮铮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201910165354.4A priority Critical patent/CN110046491B/en
Publication of CN110046491A publication Critical patent/CN110046491A/en
Application granted granted Critical
Publication of CN110046491B publication Critical patent/CN110046491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/284Lexical analysis, e.g. tokenisation or collocates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Electrically Operated Instructional Devices (AREA)

Abstract

The disclosure relates to a verification method, a device, an electronic device and a storage medium for secret protection problem, wherein the method comprises the following steps: after entering a password protection function, receiving an answer to be verified input based on a secret protection question under the condition of starting a semantic verification mode, and acquiring a pre-stored answer corresponding to the secret protection question; detecting semantic similarity between the answer to be checked and the pre-stored answer; and if the semantic similarity is larger than or equal to a threshold value, determining that the answer to be verified passes verification. According to the method and the device, the answer to be verified and the pre-stored answer are not completely consistent but have the same meaning, verification can be passed, the verification efficiency is improved, and the user experience is improved.

Description

Method and device for verifying security problem, electronic equipment and storage medium
Technical Field
The present disclosure relates to internet technologies, and in particular, to a method and an apparatus for verifying a privacy problem, an electronic device, and a storage medium.
Background
In the internet era, when a user logs in a website, an account and a password need to be registered, and the password format requirements of different websites are different, so that when each user logs in different websites, different passwords can be used, and the website and the password are difficult to be remembered in a one-to-one correspondence manner, and the situation that the password is forgotten is very common. In order to solve the problem, a website usually sets a password retrieving function, and specifically, when a user forgets a password, the user can reset/acquire account password information of the user by correctly answering a preset secret problem through the password retrieving function.
In the related art, when the answer to the secret protection question is checked, the check is performed based on the complete matching of the character strings, that is, the check can be passed only if the answer is completely consistent with the preset answer. However, it is difficult for the user to accurately remember the secret information of the user, so that the answer given by the user is not completely consistent with the preset answer, and the user needs to input the answer many times to complete the verification, which is inefficient.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a method and an apparatus for verifying a privacy security problem, an electronic device, and a storage medium.
According to a first aspect of the embodiments of the present disclosure, a method for verifying a privacy problem is provided, including:
after entering a password protection function, receiving an answer to be verified input based on a secret protection question under the condition of starting a semantic verification mode, and acquiring a pre-stored answer corresponding to the secret protection question;
detecting semantic similarity between the answer to be checked and the pre-stored answer;
and if the semantic similarity is larger than or equal to a threshold value, determining that the answer to be verified passes verification.
Optionally, before receiving the answer to be verified input based on the secret protection question, the method further includes:
and detecting whether the user authorizes the semantic verification, and if so, determining to start the semantic verification mode.
Optionally, before detecting whether the user authorizes to perform semantic verification, the method further includes:
displaying authorization information to a user in the process of setting a secret protection question and pre-storing an answer by the user, wherein the authorization information is used for indicating the user authorization to be verified in a semantic verification mode or a character string verification mode;
and receiving the verification mode selected by the user and storing the record of the verification mode authorized by the user.
Optionally, after displaying the authorization information to the user, the method further includes:
displaying synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for the user to select;
and recording the synonym selected by the user and the answer input by the user as the pre-stored answer.
Optionally, in a case that a semantic verification mode is started, before receiving an answer to be verified input based on a privacy protection question, after entering a password protection function, the method further includes:
if the number of times of inputting answers to be verified by a user exceeds the set number of times, generating prompt information for prompting the user to authorize the semantic verification;
and confirming to start the semantic verification mode under the condition of receiving authorization information authorized by the user to perform semantic verification.
Optionally, the detecting the semantic similarity between the answer to be checked and the pre-stored answer includes:
if the semantic checking mode is partial semantic checking, acquiring first checking information for performing partial semantic checking in the pre-stored answer and second checking information for performing partial semantic checking in the answer to be checked;
detecting semantic similarity of the second check information and the first check information;
if the semantic similarity is greater than or equal to a threshold value, determining that the answer to be checked passes the check, including:
and if the semantic similarity is larger than or equal to a threshold value, determining that the second check information passes the check.
Optionally, the detecting the semantic similarity between the answer to be checked and the pre-stored answer includes:
performing word segmentation processing on the answer to be checked and the pre-stored answer respectively;
according to the word segmentation result of the answer to be verified and the word segmentation result of the pre-stored answer, constructing a verification vector corresponding to the answer to be verified and a pre-stored vector corresponding to the pre-stored answer;
and calculating a cosine value of an included angle between the pre-stored vector and the check vector, and taking the cosine value as the semantic similarity between the pre-stored answer and the answer to be checked.
Optionally, the constructing a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer includes:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
According to a second aspect of the embodiments of the present disclosure, there is provided a verification apparatus for a secret protection problem, including:
the password protection device comprises an answer obtaining module, a password protection module and a verification module, wherein the answer obtaining module is configured to receive an answer to be verified input based on a secret protection question under the condition of starting a semantic verification mode after entering a password protection function, and obtain a pre-stored answer corresponding to the secret protection question;
the similarity detection module is configured to detect semantic similarity between the answer to be checked and the pre-stored answer;
and the verification pass determining module is configured to determine that the answer to be verified passes verification if the semantic similarity detected by the similarity detecting module is greater than or equal to a threshold value.
Optionally, the apparatus further comprises:
and the semantic verification detection module is configured to detect whether the user authorizes semantic verification, and if so, the semantic verification mode is determined to be started.
Optionally, the apparatus further comprises:
the system comprises an authorization information display module, a password verification module and a verification module, wherein the authorization information display module is configured to display authorization information to a user in the process that the user sets a password protection question and a pre-stored answer, and the authorization information is used for indicating that the user authorization is verified in a semantic verification mode or a character string verification mode;
and the verification mode recording module is configured to record the verification mode authorized by the user.
Optionally, the apparatus further comprises:
the synonym display module is configured to display synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for being selected by the user;
and the pre-stored answer recording module is configured to record the synonym selected by the user and the answer input by the user as the pre-stored answer.
Optionally, the apparatus further comprises:
the authorization prompting module is configured to generate prompting information for prompting the user to authorize to carry out semantic verification if the number of times of inputting answers to be verified by the user exceeds the set number of times after entering the password protection function;
and the semantic verification starting module is configured to confirm to start the semantic verification mode under the condition of receiving authorization information authorized by the user to perform semantic verification.
Optionally, the similarity detection module includes:
the answer dividing unit is configured to acquire first check information for performing partial semantic check in the pre-stored answer and second check information for performing partial semantic check in the answer to be checked if the semantic check mode is partial semantic check;
a checking unit configured to detect semantic similarity of the second checking information and the first checking information;
the verification pass determination module is specifically configured to:
and if the semantic similarity is larger than or equal to a threshold value, determining that the second check information passes the check.
Optionally, the similarity detection module includes:
the word segmentation processing unit is configured to perform word segmentation processing on the answer to be checked and the pre-stored answer respectively;
the vector construction unit is configured to construct a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer by the word segmentation processing unit;
and the similarity calculation unit is configured to calculate a cosine value of an included angle between the pre-stored vector constructed by the vector construction unit and the check vector, and the cosine value is used as the semantic similarity between the pre-stored answer and the answer to be checked.
Optionally, the vector constructing unit is specifically configured to:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of verifying a privacy problem as described in the first aspect.
According to a fourth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium, wherein instructions of the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a method for verifying a privacy problem as described in the first aspect.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program, the method of which includes the step of the method for verifying a privacy problem of the first aspect.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the password protection method and device, after the password protection function is started, under the condition that the semantic verification mode is started, the answer to be verified input based on the password protection problem is received, the pre-stored answer corresponding to the password protection problem is obtained, the semantic similarity between the answer to be verified and the pre-stored answer is detected, and the answer to be verified is confirmed to pass verification when the semantic similarity is larger than or equal to the threshold value, so that the verification can be passed when the answer to be verified and the pre-stored answer are not completely consistent but have the same meaning, the verification efficiency is improved, and the user experience is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a method for verification of a privacy problem in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a method for verification of a privacy problem in accordance with an exemplary embodiment;
FIG. 3 is a flow diagram illustrating a method for verification of a privacy problem in accordance with an exemplary embodiment;
FIG. 4 is a flow diagram illustrating a method of verifying a privacy problem in accordance with an exemplary embodiment;
FIG. 5 is a block diagram illustrating the structure of a verification device for privacy concerns in accordance with an exemplary embodiment;
fig. 6 is a block diagram illustrating a structure of an electronic device according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
In the related art, the answer to the secret key question is checked based on the complete matching of the character strings, so that the answer given by the user cannot pass the check if the answer is not identical to the preset answer and has the same meaning. For example, the privacy issue is: "the year, month and day of birth? "and the answer is" 1990-1-1 ", when password protection is needed to retrieve the password or other information, if the answer is" 1 month and 1 day 1990 "or" 1990-01-01 ", the verification is not verified through character string matching, so that the user needs to input the answer for many times to complete the verification, and the verification efficiency is low and the user experience is poor. In order to solve the technical problem, the present disclosure provides the following technical solutions.
Fig. 1 is a flowchart illustrating a method for verifying a privacy question according to an exemplary embodiment, where the method for verifying a privacy question is used in an electronic device as illustrated in fig. 1, and includes the following steps.
In step S11, after entering the password protection function, in the case of starting the semantic verification mode, receiving an answer to be verified input based on the secret protection question, and acquiring a pre-stored answer corresponding to the secret protection question.
When a user needs to retrieve a password through password protection, the password protection function needs to be entered, the user is verified through a password protection question, the password protection question is displayed, a to-be-verified answer input by the user based on the password protection question is received, a prestored pre-stored answer corresponding to the password protection question is obtained, and the prestored answer is used for verifying the to-be-verified answer. It should be noted that the pre-stored answer may include multiple answers, and when performing the subsequent verification, the verification is considered to be passed only if the semantic similarity between the answer to be verified and one of the pre-stored answers meets the requirement.
In step S12, semantic similarity between the answer to be checked and the pre-stored answer is detected.
When the answer to be verified is verified, in order to avoid the situation that the verification fails when the answer to be verified and the pre-stored answer have the same meaning but are not completely consistent by adopting a character string verification mode in the related technology, the verification can be performed by adopting a semantic verification mode, and the semantic similarity between the answer to be verified and the pre-stored answer is mainly detected by adopting the semantic verification mode. When determining the semantic similarity between the answer to be checked and the pre-stored answer, the calculation may be performed by using a conventional method for calculating the semantic similarity, such as a vector space model-based calculation method, a semantic understanding-based calculation method, a hamming distance-based calculation method, and the like.
In step S13, if the semantic similarity is greater than or equal to the threshold, it is determined that the answer to be verified passes the verification.
The threshold is a preset standard for judging whether the answer to be verified passes the verification.
If the semantic similarity between the answer to be verified and the pre-stored answer is smaller than a threshold value, the answer to be verified is far different from the pre-stored answer, and the meanings are different, and the answer to be verified is determined not to pass the verification; if the semantic similarity between the answer to be verified and the pre-stored answer is greater than or equal to the threshold value, the meaning of the answer to be verified and the pre-stored answer is the same, and the answer to be verified is determined to pass verification.
After entering the password protection function, in the case of starting a semantic verification mode, receiving an answer to be verified input based on the secret protection question and acquiring a pre-stored answer corresponding to the secret protection question, determining semantic similarity between the answer to be verified and the pre-stored answer, and determining that the answer to be verified passes verification when the semantic similarity is greater than or equal to a threshold value, so that the answer to be verified and the pre-stored answer can pass verification when the answer to be verified is not completely consistent but has the same meaning, thereby improving verification efficiency and improving user experience.
On the basis of the technical scheme, before receiving the answer to be verified input based on the secret protection question, the method further comprises the following steps:
and detecting whether the user authorizes the semantic verification, and if so, determining to start the semantic verification mode.
The user authorization mode can be that the user authorizes to carry out semantic verification in the process of setting the secret protection question and pre-storing the answer, and at the moment, the user authorization verification mode is detected to be whether the semantic verification is carried out or not. Or, the user authorization mode may also be to prompt the user to authorize the semantic verification when the number of times of inputting the answer to be verified by the user exceeds a set number of times.
On the basis of the above technical solution, in the case of starting a semantic verification mode, before receiving an answer to be verified input based on a secret protection question, after entering a password protection function, the method may further optionally include:
if the number of times that the user inputs the answer to be checked exceeds the set number of times, generating prompt information for prompting the user to authorize the semantic checking;
and confirming to start the semantic verification mode under the condition of receiving authorization information authorized by the user to perform semantic verification.
After entering the password protection function, if the current verification mode is not the semantic verification (if the current verification mode is the character string verification), when the number of times of inputting the answer to be verified by the user exceeds the set number of times and the answer cannot pass the verification, prompt information for prompting the user to authorize the semantic verification can be generated so as to prompt the user to authorize the semantic verification, and the start of the semantic verification mode is confirmed under the condition that the authorization information for authorizing the user to perform the semantic verification is received. When detecting whether the user authorizes to perform semantic verification, after generating prompt information for prompting the user to authorize to perform semantic verification, determining whether the user is authorized to perform semantic verification by judging whether an agreement instruction of the user is received, and determining that the user is authorized to perform semantic verification if the agreement instruction of the user is received. The security of the secret protection question is high through the character string check, so that the security of the secret protection question can be guaranteed through the character string check generally, but in order to avoid the situation that the character string check cannot pass when the answer to be checked is not completely consistent with the pre-stored answer but has the same meaning, when the number of errors of the check of the answer to be checked through the character string check reaches the set number, a user is prompted to authorize to carry out semantic check, and therefore the problem that the check cannot be passed all the time when the user forgets the correct form of the answer is avoided.
FIG. 2 is a flow chart illustrating a method for verifying a privacy problem, according to an example embodiment, as shown in FIG. 2, including the following steps.
In step S21, after entering the password protection function, in the case of starting the semantic verification mode, receiving an answer to be verified input based on the secret protection question, and acquiring a pre-stored answer corresponding to the secret protection question.
The specific content of this step is the same as that of step S11 in the above exemplary embodiment, and is not described here again.
In step S22, word segmentation is performed on the answer to be checked and the pre-stored answer, respectively.
The word segmentation process is to segment a continuous word sequence into individual words.
The word Segmentation processing may be performed by using a word Segmentation tool, for example, the word Segmentation processing may be performed by using a Simple Chinese word Segmentation system (SCWS), and stop Words may be removed first when performing the word Segmentation processing. And performing word segmentation processing on the answer to be verified to obtain a word segmentation result of the answer to be verified, wherein the word segmentation result comprises at least one word. And performing word segmentation processing on the pre-stored answer to obtain a word segmentation result of the pre-stored answer, wherein the word segmentation result comprises at least one word.
In step S23, according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer, a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer are constructed.
The word meaning similarity between one word in the word segmentation result of the answer to be checked and one word in the word segmentation result of the pre-stored answer can be calculated, and the word meaning similarity is used as weight to construct a check vector and a pre-stored vector.
Optionally, the constructing a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer includes:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
The word sense similarity between two words can be calculated based on synonym forest (for chinese), WordNet (for english), and personal extended common thesaurus (e.g., similarity for numbers: 1 and 01, 001 similarity is 1). In order to improve the accuracy of the verification of the privacy problem, related words on the same row in the synonym dictionary are considered to have the similarity of 1, and related words on different rows are considered to have the similarity of 0.
And calculating the word meaning similarity of each word in the word segmentation result of the answer to be checked and each word in the word segmentation result of the pre-stored answer, and correspondingly constructing a similarity matrix. Assuming that the answer to be checked is D, the pre-stored answer is R. After the answer to be checked D is subjected to word segmentation processing, the obtained word segmentation result includes n words, and the answer to be checked is represented as D ═ W1 ', W2', …, Wn '], where W1', W2 ', …, Wn' are the n words in the word segmentation result of the answer to be checked. After the pre-stored answer R is subjected to word segmentation processing, the obtained word segmentation result includes n words, and the pre-stored answer is represented as R ═ W1, W2, …, Wn ], where W1, W2, …, Wn are n words in the word segmentation result of the pre-stored answer. Then, a similarity matrix can be constructed as shown in table 1, that is, the word sense similarity between W1 and W1 'is calculated and recorded at the position where W1 is related to W1', the word sense similarity between W1 and W2 'is calculated and recorded at the position where W1 is related to W2', and so on, the word sense similarity between other words of the answer to be checked and other words of the pre-stored answer is calculated and recorded at the position where the two words are related, so as to obtain the similarity matrix. In table 1, it is assumed that the word sense similarity between W1 and W1 'is α 11', the word sense similarity between W1 and W2 'is α 12', and other word sense similarities are similar thereto and will not be described again.
Table 1 similarity matrix construction
W1’ W2’ Wn’
W1 α11’ α12’ α1n’
W2 α21’ α22’ α2n’
Wn αn1’ αn2’ αnn’
When the check vector is constructed, the similarity in the similarity matrix is used as weight, and each word in the pre-stored answers is used for representing the answer to be checked, so that the check vector and the pre-stored vector are obtained. That is, the answer to be verified D ═ W1 '+ W2' + … + Wn ═ (α 11 '+ α 12' + … + α 1n ') W1+ (α 21' + α 22 '+ … α 2 n') W2+ … + (α n1 '+ α n 2' + … α nn ') Wn, and the prestored answer R ═ W1+ W2+ … + Wn, so that a prestored vector R ═ 1,1, …,1] can be constructed, and the verification vector D ═ [ (α 11' + α 12 '+ … + α 1 n'), (α 21 '+ α 22' + … α 2n '), …, (α n 1' + α n2 '+ … α') ].
In step S24, a cosine value of an included angle between the pre-stored vector and the check vector is calculated, and the cosine value is used as a semantic similarity between the pre-stored answer and the answer to be checked.
The larger the included angle between the pre-stored vector and the check vector is, the smaller the semantic similarity between the pre-stored answer and the answer to be checked is, and the smaller the included angle between the pre-stored vector and the check vector is, the larger the semantic similarity between the pre-stored answer and the answer to be checked is, so that for convenience in processing, the cosine value of the included angle between the pre-stored vector and the check vector can be simply used as the semantic similarity between the pre-stored answer and the answer to be checked. The cosine value of the included angle between the pre-stored vector and the check vector can be calculated according to a cosine formula.
In step S25, if the semantic similarity is greater than or equal to the threshold, it is determined that the answer to be verified passes the verification.
The specific content of this step is the same as the specific content of step S13 in the above exemplary embodiment, and is not described here again.
For example, the privacy question is "your year, month and day of birth? ", the correct pre-stored answer R is" 1990-1-1 ". Assume that the received answer to be checked D is "1990, 01/01". Performing word segmentation operation on the pre-stored answer R and the answer D to be checked respectively to obtain R ═ 1990,1,1], D ═ 1990,01,01 ]; constructing a similarity matrix by using word segmentation results of the pre-stored answer R and the answer D to be checked, and calculating the word meaning similarity by using a method based on synonym forest (aiming at Chinese), WordNet (aiming at English) and personal expansion common lexicon (for example, similarity of numbers is 1, and similarity of numbers is 01 and similarity of 001 is 1), so as to calculate the similarity matrix as shown in table 2; constructing a prestored vector R and a check vector D by taking the similarity in the similarity matrix as a weight, and obtaining R (1990 +1+ 1) and D (1990 +1+ 1), wherein 1990,1 and 1 are basic elements, then R (1, 1, 1) and D (1, 1, 1); and calculating a cosine value of an included angle theta of the R and D vectors according to a cosine formula cos theta ═ R x D/| R | | | D |, wherein the smaller the included angle is, namely the larger the cosine value is, the higher the semantic similarity between the answer to be verified and the pre-stored answer is, and the semantic similarity is greater than a threshold value, then obtaining cos theta ═ 1 according to the formula through verification, namely the similarity between the answer to be verified and the pre-stored answer is one hundred percent, and thus passing the security verification. The setting of the threshold value can be defined according to the check rigor.
Table 2 example similarity matrix construction
1990 01 01
1990 1 0 0
1 0 1 0
1 0 0 1
As another example, the privacy question is "what is your li mingming? "the correct pre-stored answer is" teacher brother ", and the answer to be verified of the user is assumed to be" teacher brother ". Respectively performing word segmentation on the pre-stored answer and the answer to be verified, wherein the pre-stored answer is represented as R ═ Meer, and the answer to be verified is represented as D ═ Mesoer ]; a similarity matrix is constructed by word segmentation results of pre-stored answers and answers to be checked, the synonym word forest has Ah09B05 as teacher brother, namely, teacher brother and teacher brother are in the same row and are synonyms, so that the similarity is 1, and the obtained similarity matrix is shown in a table 3; constructing a pre-stored vector and a check vector by taking the similarity in the similarity matrix as weight, and obtaining the pre-stored vector R (Mesogen) and the check vector D (Mesogen) according to the similarity matrix shown in the table 3; and (4) obtaining cos theta as 1 according to a cosine formula, namely, the semantic similarity between the answer to be verified and the pre-stored answer is one hundred percent, so that the secret protection verification is passed.
TABLE 3 example of similarity matrix construction
Master and brother
Teacher's brother 1
As another example, the privacy question is "what is your li will be? "correct pre-stored answer is" teacher "and the answer to be verified of the user is" classmate ". Respectively performing word segmentation on the pre-stored answer and the answer to be verified, wherein the pre-stored answer is represented as R ═ teacher, and the answer to be verified is represented as D ═ classmate; constructing a similarity matrix by using the pre-stored answers and the segmentation results of the answers to be checked, wherein the similarity is 0 because the classmates and the chesses are not in the same row of the synonym forest, and the obtained similarity matrix is shown in a table 4; constructing a pre-stored vector and a check vector by taking the similarity in the similarity matrix as weight, and obtaining the pre-stored vector R (Mesogen) and the check vector D (0) according to the similarity matrix shown in the table 4; if cos θ is 0 according to the cosine formula, that is, the semantic similarity between the answer to be verified and the pre-stored answer is 0, so that the secret protection verification cannot be passed.
Table 4 example similarity matrix construction
College student
Teacher's brother 0
According to the exemplary embodiment, word segmentation processing is performed on the answer to be verified and the pre-stored answer respectively, the check vector corresponding to the answer to be verified and the pre-stored vector corresponding to the pre-stored answer are constructed according to word segmentation results, the cosine value of the included angle between the check vector and the pre-stored vector is calculated, the cosine value is used as the semantic similarity between the pre-stored answer and the answer to be verified, the calculated semantic similarity is accurate, and the accuracy of verification of the password protection question can be improved.
FIG. 3 is a flow chart illustrating a method for verifying a privacy problem, according to an example embodiment, as shown in FIG. 3, including the following steps.
In step S31, in the process of setting a secret protection question and a pre-stored answer by a user, authorization information is displayed to the user, where the authorization information is used to indicate that the user authorization is verified by a semantic verification method or a character string verification method.
The character string checking mode is that the answer to be checked and the pre-stored answer are subjected to character string matching during checking, and the checking is passed only if the answer to be checked and the pre-stored answer are completely matched. The semantic checking mode comprises complete semantic checking or partial semantic checking, the partial semantic checking can be mixed checking composed of the semantic checking mode and other checking modes, for example, mixed checking composed of character string checking and semantic checking, when the partial semantic checking mode is adopted, part of the pre-stored answers are checked by adopting the character string checking mode, and the other part of the pre-stored answers are checked by adopting the semantic checking mode.
After a user sets a secret protection problem and a corresponding pre-stored answer, authorization information is displayed for the user, specifically, a verification mode is provided for the user to authorize, and if the user authorizes a character string verification mode, the verification is carried out in a mode of completely matching character strings during subsequent verification of the secret protection problem; if the user authorizes the semantic verification mode, verifying according to the semantic similarity when verifying the secret protection problem in the follow-up process; if the user authorizes the semantic checking mode, and the semantic checking mode is partial semantic checking, partial pre-stored answers corresponding to the partial semantic checking authorized by the user need to be determined, corresponding semantic checking is adopted for partial pre-stored answers in the pre-stored answers to check during subsequent checking of the secret keeping question, and other checking modes (such as character string checking) selected by the user are adopted for the other part of the pre-stored answers in the pre-stored answers to check.
Optionally, after displaying the authorization information to the user, the method further includes:
displaying synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for the user to select;
and recording the synonym selected by the user and the answer input by the user as the pre-stored answer.
Synonyms refer to a group of words having the same meaning.
When the user sets the secret protection question and the pre-stored answer, a plurality of secret protection questions can be provided for the user to select, the secret protection question selected by the user is received, the interface is provided for receiving the answer input by the user aiming at the secret protection question, and the answer input by the user can also be a plurality of answers with the same meaning. When an answer input by a user is received, displaying a synonym corresponding to the answer for the user to select, and taking the synonym selected by the user and the answer input by the user as a pre-stored answer. For example, if the answer input by the user is "1990-1/1", synonyms "1990-01-01" and "1990-1-1" may be displayed, and if the user selects "1990-01-01" and "1990-1-1" at the same time, the "1990-1/1", "1990-01-01" and "1990-1-1" are collectively used as the pre-stored answer.
When an answer input by a user is received, synonyms corresponding to words in the answer can be displayed, the user selects, the synonyms selected by the user are determined, the synonyms are combined with other components in the answer set by the user or synonyms corresponding to other components according to the position of the words in the answer, the synonyms selected by the user, the answer input by the user and the determined synonyms are used as pre-stored answers corresponding to the secret protection question, and when verification is performed subsequently, the verification is performed on the answer to be verified according to one of the pre-stored answers, and the verification of the answer to be verified can be determined. Therefore, a plurality of pre-stored answers are provided, and the efficiency and the accuracy of verification are improved.
In step S32, the verification of the user' S authorization is recorded.
And when the verification mode authorized by the user is obtained, recording and storing the verification mode, so that the recorded verification mode is obtained and verification is carried out according to the verification mode during subsequent verification. The verification mode of the user authorization can be a character string verification mode or a semantic verification mode.
In step S33, after entering the password protection function, it is detected whether the stored verification mode is a semantic verification mode, and if so, it is determined that the user authorizes the semantic verification and the semantic verification mode is started.
In step S34, in the case of starting the semantic verification mode, receiving an answer to be verified input based on the security question, and obtaining a pre-stored answer corresponding to the security question.
The specific content of this step is the same as that of step S11 in the above exemplary embodiment, and is not described here again.
In step S35, semantic similarity between the answer to be checked and the pre-stored answer is detected.
If the recorded verification mode is a semantic verification mode, it is determined that the user selects to verify the secret protection question by using semantic verification, and verification is performed according to semantic similarity between the answer to be verified and the pre-stored answer.
In step S36, if the semantic similarity is greater than or equal to the threshold, it is determined that the answer to be verified passes the verification.
The specific content of this step is the same as the specific content of step S13 in the above exemplary embodiment, and is not described here again.
In the process of setting the secret protection question and the pre-stored answer by the user, the embodiment displays the authorization information to the user and records the verification mode of the authorization of the user, and if the verification mode recorded by the user is the semantic verification mode, the verification of the secret protection question can be completed through the semantic similarity, so that the verification can be passed when the answer to be verified is not completely consistent with the pre-stored answer but has the same meaning, the verification efficiency is improved, and the user experience is improved.
Fig. 4 is a flowchart illustrating a method for checking a privacy problem according to an exemplary embodiment, where the exemplary embodiment performs checking in a partial semantic checking manner based on the foregoing embodiments. As shown in fig. 4, the following steps are included.
In step S41, after entering the password protection function, in the case of starting the semantic verification mode, receiving an answer to be verified input based on the secret protection question, and acquiring a pre-stored answer corresponding to the secret protection question.
The semantic checking mode comprises complete semantic checking or partial semantic checking, and when partial semantic checking is performed, mixed checking can be performed with other checking modes (such as character string checking).
In step S42, if the semantic checking mode is partial semantic checking, first checking information for performing partial semantic checking in the pre-stored answer and second checking information for performing partial semantic checking in the answer to be checked are obtained.
If the recorded checking mode is partial semantic checking, namely part of pre-stored answers in the pre-stored answers (the part of pre-stored answers are the first checking information) are checked by adopting semantic checking, and the other part of pre-stored answers are checked by adopting other checking modes (such as character string checking), at this time, a user already specifies the first checking information to be subjected to semantic checking and the other part of pre-stored answers to be subjected to checking by adopting other checking modes for the pre-stored answers, the other checking modes are exemplified here by adopting character string checking, the first checking information to be subjected to semantic checking in the pre-stored answers and the other part of pre-stored answers to be subjected to character string checking can be determined according to the stored checking modes, and the other part of answers to be checked to be subjected to character string checking in the answers to be checked can be determined according to the occupied byte positions of the other part of pre-stored answers to be subjected to character string checking in the pre-stored answers, and the part of the answers to be checked except the other part of the answers to be checked is second checking information for performing semantic checking.
For example, the pre-stored answer is "person catching the kite", the "catching the kite" in the pre-stored answer may be configured to be checked in a character string check manner, and the "person" in the pre-stored answer may be configured to be checked in a semantic check manner. When the answers to be verified are divided, the first 6 bytes in the answers to be verified are determined to be the other part of answers to be verified according to the first 6 bytes occupied by the pre-stored answers of the kite, verification is performed by adopting a character string verification mode, the part except the first 6 bytes in the answers to be verified is second verification information, and verification is performed by adopting a semantic verification mode.
In step S43, semantic similarity between the second check information and the first check information is detected.
When the semantic verification mode is partial semantic verification and mixed verification is only carried out with another verification mode, the answer to be verified is divided into two parts to be verified respectively for verification, and the answer to be verified passes verification only when the two parts both accord with the verification condition. Another verification method is exemplified as a character string verification method, semantic verification is performed on second verification information according to first verification information, semantic similarity between the second verification information and the first verification information is detected, and meanwhile, character string matching is performed on the other part of answers to be verified according to the other part of pre-stored answers, so that character string verification is performed.
In step S44, if the semantic similarity is greater than or equal to the threshold, it is determined that the second verification information passes verification.
When the semantic similarity between the second check information and the first check information is larger than or equal to a threshold value, determining that the second check information passes the check; if the other part of answers to be checked are checked in a character string checking mode, when the other part of answers to be checked are matched with the other part of pre-stored answers in a character string mode and can be completely matched, it is determined that the other part of answers to be checked pass the checking. And when the second check information and the other part of answers to be checked are checked to pass, determining that the answers to be checked pass the check.
In the exemplary embodiment, if the semantic verification mode is partial semantic verification, first verification information for performing partial semantic verification in the pre-stored answer and second verification information for performing partial semantic verification in the answer to be verified are obtained, semantic similarity between the second verification information and the first verification information is detected, and if the semantic similarity is greater than or equal to a threshold value, verification of the second verification information is determined to be passed, so that hybrid verification of semantic verification and other verification modes is realized, and the security problem can be improved while the verification efficiency is improved.
Fig. 5 is a block diagram illustrating a configuration of a verification apparatus for a privacy problem according to an exemplary embodiment. Referring to fig. 5, the apparatus includes an answer obtaining module 51, a similarity detecting module 52, and a verification pass determining module 53.
The answer obtaining module 51 is configured to receive an answer to be verified input based on a secret protection question and obtain a pre-stored answer corresponding to the secret protection question when a semantic verification mode is started after a password protection function is entered;
the similarity detection module 52 is configured to detect semantic similarity between the answer to be checked and the pre-stored answer;
the verification pass determination module 53 is configured to determine that the answer to be verified passes the verification if the semantic similarity detected by the similarity detection module 52 is greater than or equal to a threshold.
Optionally, the apparatus further comprises:
and the semantic verification detection module is configured to detect whether the user authorizes semantic verification, and if so, the semantic verification mode is determined to be started.
Optionally, the apparatus further comprises:
the authorization information display module is configured to display authorization information to a user in the process of setting a secret protection question and pre-storing an answer by the user, wherein the authorization information is used for indicating that the user authorization is verified in a semantic verification mode or a character string verification mode;
and the verification mode recording module is configured to record the verification mode of the user authorization.
Optionally, the apparatus further comprises:
the synonym display module is configured to display synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for being selected by the user;
and the pre-stored answer recording module is configured to record the synonym selected by the user and the answer input by the user as the pre-stored answer.
Optionally, the apparatus further comprises:
the authorization prompting module is configured to generate prompting information for prompting the user to authorize the semantic verification if the number of times of inputting answers to be verified by the user exceeds the set number of times after entering the password protection function;
and the semantic verification starting module is configured to confirm to start the semantic verification mode under the condition of receiving the authorization information authorized by the user to perform semantic verification.
Optionally, the similarity detection module includes:
the answer dividing unit is configured to acquire first check information for performing partial semantic check in the pre-stored answer and second check information for performing partial semantic check in the answer to be checked if the semantic check mode is partial semantic check;
a checking unit configured to detect semantic similarity of the second checking information and the first checking information;
the verification pass determination module is specifically configured to:
and if the semantic similarity is larger than or equal to a threshold value, determining that the second check information passes the check.
Optionally, the similarity detection module includes:
the word segmentation processing unit is configured to perform word segmentation processing on the answer to be checked and the pre-stored answer respectively;
the vector construction unit is configured to construct a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer by the word segmentation processing unit;
and the similarity calculation unit is configured to calculate a cosine value of an included angle between the pre-stored vector constructed by the vector construction unit and the check vector, and the cosine value is used as the semantic similarity between the pre-stored answer and the answer to be checked.
Optionally, the vector constructing unit is specifically configured to:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 6 is a block diagram illustrating a structure of an electronic device according to an example embodiment. For example, the electronic device 600 may be provided as a server. Referring to fig. 6, electronic device 600 includes a processing component 622 that further includes one or more processors, and memory resources, represented by memory 632, for storing instructions, such as applications, that are executable by processing component 622. The application programs stored in memory 632 may include one or more modules that each correspond to a set of instructions. Further, the processing component 622 is configured to execute instructions to perform the verification method of the privacy concerns described above.
The electronic device 600 may also include a power component 626 configured to perform power management for the electronic device 600, a wired or wireless network interface 650 configured to connect the electronic device 600 to a network, and an input/output (I/O) interface 658. The electronic device 600 may operate based on an operating system stored in the memory 632, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 632 comprising instructions, executable by the processing component 622 of the electronic device 600 to perform the above described verification method of the privacy issue is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present application also provides a computer program which, when executed by a processor, implements the above-described method of verifying a privacy problem.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (16)

1. A method for verifying a privacy question, comprising:
after entering a password protection function, receiving an answer to be verified input based on a secret protection question under the condition of starting a semantic verification mode, and acquiring a pre-stored answer corresponding to the secret protection question;
detecting semantic similarity between the answer to be checked and the pre-stored answer;
if the semantic similarity is larger than or equal to a threshold value, determining that the answer to be verified passes verification;
if the semantic verification mode is partial semantic verification, part of prestored answers in the prestored answers are verified by adopting semantic verification, and the other part of prestored answers are verified by adopting character string verification; the detecting the semantic similarity between the answer to be checked and the pre-stored answer includes:
if the semantic checking mode is partial semantic checking, acquiring first checking information for performing partial semantic checking in the pre-stored answer and second checking information for performing partial semantic checking in the answer to be checked; determining another part of answers to be checked for carrying out character string check in the answers to be checked according to the occupied byte positions of the other part of prestored answers for carrying out character string check in the prestored answers;
detecting semantic similarity of the second check information and the first check information; performing character string matching on the other part of answers to be checked according to the other part of pre-stored answers;
if the semantic similarity is greater than or equal to a threshold value, determining that the answer to be verified passes verification, including:
if the semantic similarity is larger than or equal to a threshold value, determining that the second check information passes the check; if the other part of answers to be verified are matched with the other part of pre-stored answers in the character string mode and are completely matched, the other part of answers to be verified are determined to be verified; and when the second checking information and the other part of answers to be checked are checked to pass, determining that the answers to be checked pass the checking.
2. The method of claim 1, further comprising, prior to receiving the answer to be verified based on the secret key question input:
and detecting whether the user authorizes to carry out semantic verification, and if so, determining to start the semantic verification mode.
3. The method of claim 2, prior to detecting whether the user authorizes the semantic check, further comprising:
displaying authorization information to a user in the process of setting a secret protection question and pre-storing an answer by the user, wherein the authorization information is used for indicating the user authorization to be verified in a semantic verification mode or a character string verification mode;
and recording the verification mode of the user authorization.
4. The method of claim 3, wherein after displaying authorization information to the user, the method further comprises:
displaying synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for the user to select;
and recording the synonym selected by the user and the answer input by the user as the pre-stored answer.
5. The method of claim 2, wherein in case of initiating the semantic check mode, before receiving the answer to be checked input based on the privacy question, after entering the password protection function, the method further comprises:
if the number of times of inputting answers to be verified by a user exceeds the set number of times, generating prompt information for prompting the user to authorize the semantic verification;
and confirming to start the semantic verification mode under the condition of receiving authorization information authorized by the user to perform semantic verification.
6. The method according to claim 1, wherein the detecting semantic similarity between the answer to be checked and the pre-stored answer comprises:
performing word segmentation processing on the answer to be checked and the pre-stored answer respectively;
according to the word segmentation result of the answer to be verified and the word segmentation result of the pre-stored answer, constructing a verification vector corresponding to the answer to be verified and a pre-stored vector corresponding to the pre-stored answer;
and calculating a cosine value of an included angle between the pre-stored vector and the check vector, and taking the cosine value as the semantic similarity between the pre-stored answer and the answer to be checked.
7. The method according to claim 6, wherein the constructing a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the segmentation result of the answer to be checked and the segmentation result of the pre-stored answer comprises:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
8. A verification device for security issues, comprising:
the password protection device comprises an answer acquisition module, a password protection function and a verification module, wherein the answer acquisition module is configured to receive an answer to be verified input based on a password protection question and acquire a pre-stored answer corresponding to the password protection question under the condition that a semantic verification mode is started after the password protection function is entered;
the similarity detection module is configured to detect semantic similarity between the answer to be checked and the pre-stored answer;
the verification passing determination module is configured to determine that the answer to be verified passes verification if the semantic similarity detected by the similarity detection module is greater than or equal to a threshold value;
the device is also used for verifying a part of prestored answers in the prestored answers by adopting semantic verification if the semantic verification mode is partial semantic verification, and verifying the other part of prestored answers by adopting character string verification; the similarity detection module includes:
the answer dividing unit is configured to acquire first check information for performing partial semantic check in the pre-stored answer and second check information for performing partial semantic check in the answer to be checked if the semantic check mode is partial semantic check; determining another part of answers to be checked for carrying out character string check in the answers to be checked according to the occupied byte position of the another part of prestored answers for carrying out character string check in the prestored answers;
a checking unit configured to detect semantic similarity of the second checking information and the first checking information; performing character string matching on the other part of answers to be checked according to the other part of pre-stored answers;
the check pass determination module is specifically configured to:
if the semantic similarity is larger than or equal to a threshold value, determining that the second check information passes the check; if the other part of answers to be verified are matched with the other part of pre-stored answers in the character string mode and are completely matched, the other part of answers to be verified are determined to be verified; and when the second check information and the other part of answers to be checked are checked to pass, determining that the answers to be checked pass the check.
9. The apparatus of claim 8, further comprising:
and the semantic verification detection module is configured to detect whether the user authorizes semantic verification, and if so, the semantic verification mode is determined to be started.
10. The apparatus of claim 9, further comprising:
the authorization information display module is configured to display authorization information to a user in the process of setting a secret protection question and pre-storing an answer by the user, wherein the authorization information is used for indicating that the user authorization is verified in a semantic verification mode or a character string verification mode;
and the verification mode recording module is configured to record the verification mode authorized by the user.
11. The apparatus of claim 10, further comprising:
the synonym display module is configured to display synonyms corresponding to answers input by the user under the condition that the verification mode authorized by the user is a semantic verification mode, wherein the synonyms are used for being selected by the user;
and the pre-stored answer recording module is configured to record the synonym selected by the user and the answer input by the user as the pre-stored answer.
12. The apparatus of claim 9, further comprising:
the authorization prompting module is configured to generate prompting information for prompting the user to authorize to carry out semantic verification if the number of times of inputting answers to be verified by the user exceeds the set number of times after entering the password protection function;
and the semantic verification starting module is configured to confirm to start the semantic verification mode under the condition of receiving the authorization information authorized by the user to perform semantic verification.
13. The apparatus of claim 8, wherein the similarity detection module comprises:
the word segmentation processing unit is configured to perform word segmentation processing on the answer to be checked and the pre-stored answer respectively;
the vector construction unit is configured to construct a check vector corresponding to the answer to be checked and a pre-stored vector corresponding to the pre-stored answer according to the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer by the word segmentation processing unit;
and the similarity calculation unit is configured to calculate a cosine value of an included angle between the pre-stored vector constructed by the vector construction unit and the check vector, and the cosine value is used as the semantic similarity between the pre-stored answer and the answer to be checked.
14. The apparatus according to claim 13, wherein the vector construction unit is specifically configured to:
calculating word meaning similarity of the word segmentation result of the answer to be checked and the word segmentation result of the pre-stored answer to construct a similarity matrix;
and constructing the pre-stored vector and the check vector according to the pre-stored answer and the similarity matrix.
15. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform a method of checking a privacy question as claimed in any one of claims 1 to 7.
16. A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of a mobile terminal, enable the mobile terminal to perform the method of verifying a privacy question as claimed in any one of claims 1 to 7.
CN201910165354.4A 2019-03-05 2019-03-05 Method and device for verifying security problem, electronic equipment and storage medium Active CN110046491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910165354.4A CN110046491B (en) 2019-03-05 2019-03-05 Method and device for verifying security problem, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910165354.4A CN110046491B (en) 2019-03-05 2019-03-05 Method and device for verifying security problem, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110046491A CN110046491A (en) 2019-07-23
CN110046491B true CN110046491B (en) 2022-09-09

Family

ID=67274369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910165354.4A Active CN110046491B (en) 2019-03-05 2019-03-05 Method and device for verifying security problem, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110046491B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112699348A (en) * 2020-12-25 2021-04-23 中国平安人寿保险股份有限公司 Method and device for verifying nuclear body information, computer equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516133A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 User identity verification method, server and client

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3363552B2 (en) * 1993-11-30 2003-01-08 キヤノン株式会社 Document processing method and apparatus
JP2012248142A (en) * 2011-05-31 2012-12-13 Shimon Ando Sentence creation support natural sentence processing method for displaying meaning in detail of input sentence
CN104317909B (en) * 2014-10-27 2018-09-28 百度在线网络技术(北京)有限公司 The method of calibration and device of interest point data

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516133A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 User identity verification method, server and client

Also Published As

Publication number Publication date
CN110046491A (en) 2019-07-23

Similar Documents

Publication Publication Date Title
US11847199B2 (en) Remote usage of locally stored biometric authentication data
CN110825910B (en) Video course recommendation method and related device based on big data
TWI700632B (en) User intention recognition method and device
CN111611908B (en) System and method for real-time user authentication in online education
CN106453209B (en) Identity verification method and device
US20180308107A1 (en) Living-body detection based anti-cheating online research method, device and system
US9325687B2 (en) Remote authentication using mobile single sign on credentials
WO2019153982A1 (en) Payment processing method and device, computer apparatus, and storage medium
TW201322158A (en) Providing verification of user identification information
CN106485261B (en) Image recognition method and device
CN108875404B (en) Data desensitization method and device based on machine learning and storage medium
US10079687B2 (en) System and method for password recovery using fuzzy logic
CN102867025A (en) Method and device for acquiring picture marking data
CN109766072A (en) Information checking input method, device, computer equipment and storage medium
CN107517180B (en) Login method and device
CN111582405A (en) Data labeling method and device
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN110046491B (en) Method and device for verifying security problem, electronic equipment and storage medium
CN109857634A (en) Interface testing parameter verification method, apparatus, electronic equipment and storage medium
CN111125656B (en) Service processing method and device and electronic equipment
US10764301B2 (en) Method and system for user authentication based on a visual representation of user location
CN106599312B (en) Knowledge base inspection method and device and terminal
CN111260512B (en) Background course autonomous distribution method and device
CA3183205A1 (en) Systems and methods for determining knowledge-based authentication questions
CN112055013A (en) Automatic authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant