CN110474911A - Trusted end-user recognition methods, device, equipment and computer readable storage medium - Google Patents
Trusted end-user recognition methods, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110474911A CN110474911A CN201910762819.4A CN201910762819A CN110474911A CN 110474911 A CN110474911 A CN 110474911A CN 201910762819 A CN201910762819 A CN 201910762819A CN 110474911 A CN110474911 A CN 110474911A
- Authority
- CN
- China
- Prior art keywords
- parameter
- target terminal
- confidence level
- user
- logging state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of trusted end-user recognition methods, comprising: obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains the second parameter of the target terminal;Determine the first confidence level of first parameter and the second confidence level of second parameter;Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and calculate the confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.The invention also discloses a kind of trusted end-user identification device, equipment and computer readable storage mediums.The present invention is identified by the logging state of terminal using credibility of the multiple parameters to terminal, single parameter bring resultant error is avoided, so that recognition result is more accurate.
Description
Technical field
The present invention relates to financial technology (Fintech) technical field more particularly to trusted end-user recognition methods, device,
Equipment and computer readable storage medium.
Background technique
In recent years, with financial technology (Fintech), the especially continuous development of internet finance, terminal detection technique
It is introduced into the daily service of bank and other financial mechanism.In the daily service process of bank and other financial mechanism, often encounter
Fraud guarantees that the safety of business procedure carries out, bank and other financial mechanism can be to when advance for the generation for preventing such event
The terminal of row business operation carries out risk monitoring and control, and risk monitoring and control mode tends to reinforce the credibility of terminal mostly.
However, the prior art often only carries out credible identification by the single hardware equipment information of terminal, identification is accurate
Spend it is poor, be easy influenced by facility environment, such as with the address mac (Media Access Control, physical address) for, although
The address mac generally has uniqueness, but undeniably, it may appear that the case where more terminals are all the identical addresses mac, such as production line
Failure, leading to the terminal of factory is all same address mac etc., at this point, can not be obtained end using the mac of terminal as identification parameter
The uniqueness at end, therefore, the obtained recognition result of identification parameter using single hardware equipment information as terminal are inaccurate.
Summary of the invention
It is a primary object of the present invention to propose a kind of trusted end-user recognition methods, device, equipment with it is computer-readable
Storage medium, it is intended to improve the accuracy of identification of trusted end-user.
To achieve the above object, the present invention provides a kind of trusted end-user recognition methods, the trusted end-user identification side
Method includes the following steps:
The first parameter of target terminal, and the logging state current based on the target terminal are obtained, the target is obtained
Second parameter of terminal;
Determine the first confidence level of first parameter and the second confidence level of second parameter;
Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined,
And calculate the confidence level of the target terminal;
Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
Preferably, first parameter for obtaining target terminal, and the logging state based on the target terminal, obtain institute
The step of stating the second parameter of target terminal include:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained,
And it is based on the user information and the logging state, generate the second parameter.
Preferably, the hardware information for obtaining target terminal, and it is based on the hardware information, generate the target terminal
The first parameter the step of include:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter
Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined
Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Preferably, first parameter for obtaining target terminal, and the logging state based on the target terminal, obtain institute
The step of stating the second parameter of target terminal include:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh
It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Preferably, first parameter is obtained the hardware information of the target terminal by the target terminal, and by described
Target terminal is generated according to the hardware information and preset algorithm;Second parameter determines that the target is whole by the server
Current logging state is held, and obtains the user information of the target terminal by the server, by the server according to institute
Logging state, the user information and the preset algorithm is stated to generate and be issued to the target terminal.
Preferably, it whether there is first parameter in the detection target terminal, and be based on the logging state,
After the step of detecting in the target terminal with the presence or absence of second parameter, the method also includes:
If first parameter and/or second parameter are not present, read in preset at least two buffer zone
Corresponding first cached parameters of the target terminal and the second cached parameters are taken, and first in determining each buffer zone is slow
Whether the second cached parameters deposited in parameter and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal
First parameter and the second parameter.
Preferably, the second confidence level step of the first confidence level of the determination first parameter and second parameter
Include:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second
History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result
The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result
The second confidence level.
In addition, to achieve the above object, the present invention also provides a kind of trusted end-user identification device, the trusted end-users
Identification device includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal,
Obtain the second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for being based on the logging state, the weighted value and described second for determining first confidence level can
The weighted value of reliability, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can
Letter.
Preferably, the acquisition module is also used to:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained,
And it is based on the user information and the logging state, generate the second parameter.
Preferably, the acquisition module is also used to:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter
Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined
Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Preferably, the acquisition module is also used to:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh
It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Preferably, first parameter is obtained the hardware information of the target terminal by the target terminal, and by described
Target terminal is generated according to the hardware information and preset algorithm;Second parameter determines that the target is whole by the server
Current logging state is held, and obtains the user information of the target terminal by the server, by the server according to institute
Logging state, the user information and the preset algorithm is stated to generate and be issued to the target terminal.
Preferably, the trusted end-user identification device further includes read module, and the read module is used for:
If if first parameter and/or second parameter are not present, in preset at least two buffer zone
Read corresponding first cached parameters of the target terminal and the second cached parameters, and first in determining each buffer zone
Whether the second cached parameters in cached parameters and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal
First parameter and the second parameter.
Preferably, the determining module is used for:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second
History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result
The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result
The second confidence level.
In addition, to achieve the above object, the present invention also provides a kind of trusted end-users to identify equipment, the trusted end-user
Identification equipment include: memory, processor and be stored in the terminal that can be run on the memory and on the processor can
Letter property recognizer, the trusted end-user recognizer realize trusted end-user as described above when being executed by the processor
The step of recognition methods.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
It is stored with trusted end-user recognizer on storage medium, is realized such as when the trusted end-user recognizer is executed by processor
Above the step of trusted end-user recognition methods.
Trusted end-user recognition methods proposed by the present invention obtains the first parameter of target terminal, and is based on the target
The current logging state of terminal obtains the second parameter of the target terminal;Determine first parameter the first confidence level and
Second confidence level of second parameter;Based on the logging state, the weighted value and described of first confidence level is determined
The weighted value of two confidence levels, and calculate the confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if
It is no, it is determined that the target terminal is credible.The present invention is by the logging state of terminal, using multiple parameters to the credibility of terminal
It is identified, single parameter bring resultant error is avoided, so that recognition result is more accurate.
Detailed description of the invention
Fig. 1 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of trusted end-user recognition methods first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, Fig. 1 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
Equipment of the embodiment of the present invention can be PC machine or server apparatus.
As shown in Figure 1, the equipment may include: processor 1001, such as CPU, network interface 1004, user interface
1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components.
User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface
1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects
Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that device structure shown in Fig. 1 does not constitute the restriction to equipment, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe module, Subscriber Interface Module SIM and trusted end-user recognizer.
Wherein, operating system is to manage and control the program of trusted end-user identification equipment and software resource, supports network
The operation of communication module, Subscriber Interface Module SIM, trusted end-user recognizer and other programs or software;Network communication module
For managing and controlling network interface 1002;Subscriber Interface Module SIM is for managing and controlling user interface 1003.
In trusted end-user identification equipment shown in Fig. 1, the trusted end-user identification equipment passes through processor 1001
The trusted end-user recognizer stored in memory 1005 is called, and executes following each implementations of trusted end-user recognition methods
Operation in example.
Based on above-mentioned hardware configuration, trusted end-user recognition methods embodiment of the present invention is proposed.
It is the flow diagram of trusted end-user recognition methods first embodiment of the present invention, the method referring to Fig. 2, Fig. 2
Include:
Step S10 obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains
Second parameter of the target terminal;
Step S20 determines the first confidence level of first parameter and the second confidence level of second parameter;
Step S30 is based on the logging state, determine first confidence level weighted value and second confidence level
Weighted value, and calculate the confidence level of the target terminal;
Step S40, determines whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
The present embodiment trusted end-user recognition methods applies to the terminal of the financing financial institutions such as mechanism or banking system
In credibility identification equipment, trusted end-user identification equipment can be terminal or PC equipment, for convenience of description, trusted end-user
Identification equipment is described for identifying equipment.Business transaction is carried out by mesh terminal in user, when such as money transfer transactions, identification
Equipment needs the terminal to current progress business transaction to identify, to determine the credibility of present terminal, if insincere, then
This business transaction is prevented, user's wealth is avoided to lose;If credible, then allow the progress of business transaction, target terminal can be
Mobile phone, the mobile terminals such as tablet computer.
The identification equipment of the present embodiment passes through the first parameter of acquisition target terminal and the second parameter and the first parameter
The credibility that target terminal is determined with the confidence level of the second parameter improves the precision of trusted end-user identification.
Each step will be described in detail below:
Step S10 obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains
Second parameter of the target terminal;
In the present embodiment, when the credibility to target terminal identifies, identification equipment obtains the of target terminal
One parameter, and the second parameter based on the current logging state acquisition target terminal of target terminal, wherein the first parameter is target
The identity information of terminal, such as target terminal the address mac indicate target terminal identity information;And the second parameter is then basis
The unique value that the logging state of target terminal generates, logging state include logging in and being not logged in, and the first parameter and the second parameter can
Identification equipment is reported to together in initiating business request by target terminal, and identification equipment can get first by service request
Parameter and the second parameter.
Further, step S10 includes:
Step a, obtains the hardware information of target terminal, and is based on the hardware information, generates the of the target terminal
One parameter;
In this step, identification equipment first obtains the hardware information of target terminal, wherein hardware information includes DeviceId
One or more of (equipment id), the address mac and sequence number etc. are generated further according to the hardware information and preset algorithm of acquisition
First parameter of target terminal, preset algorithm can be hash algorithm, specific such as MD5 algorithm (Message-Digest
Algorithm 5, md5-challenge the 5th edition), SHA-1 algorithm (calculate by Secure Hash Algorithm, secure hash
Method) etc., i.e. the hardware information of target terminal is specifically generated 32 or 64 by the first parameter=HASH (hardware equipment information)
Cryptographic Hash, since the above hash algorithm is the algorithm of existing maturation, therefore do not do excessive introduction herein.
It should be understood that believing to guarantee that the first parameter generated has the effect of unique identification target terminal by hardware
During breath generates the first parameter, a random value can be increased.If the hardware information of target terminal A and target terminal B are mac
Address, and it (may be to make the address the mac phase of the terminal drawn with production line failure production that the address mac of the two is identical
Together) at this point, during generating the first parameter according to the address mac a random value can be increased, to distinguish target terminal A
With the first parameter of both target terminal B.
Step b obtains the user information of target terminal described in the corresponding server of the target terminal and stepping on currently
Record state, and it is based on the user information and the logging state, generate the second parameter.
In this step, the user information of target terminal and current logging state can be stored in corresponding server,
Identify that equipment can get the user information of target terminal in the corresponding server of target terminal and log in shape by communication protocol
State, and according to user information and logging state and preset algorithm, generate the second parameter, wherein logging state can pass through service
The cookies that device generates learns that preset algorithm for convenience of description, is unified to be illustrated by taking MD5 algorithm as an example herein, the second parameter
=HASH (logging state/it is not logged in state userid, random), it is related with user that userid can be social information id etc.
And unique user information;Random is the random number that server-side generates.Therefore, the second parameter of target terminal actually has two
Kind value, and the second parameter for identifying that equipment obtains specifically is determined by the logging state of target terminal.
Step S20 determines the first confidence level of first parameter and the second confidence level of second parameter.
In the present embodiment, after the first parameter and the second parameter for getting target terminal, the first parameter is calculated separately
The first confidence level and the second parameter the second confidence level, so that subsequent the first confidence level of foundation and the second confidence level are to target end
End carries out credible identification.
Specifically, step S20 includes:
Step c, the first history parameters and the server for obtaining the target terminal are based on the target terminal and issue
The second history parameters;
In this step, identification equipment further obtains after the first parameter and the second parameter for getting target terminal
The second history parameters that the corresponding server of the first history parameters and target terminal of target terminal is issued based on target terminal,
That is target terminal is in upper primary initiating business request, and has corresponding history parameters to be identified equipment and obtain, and by conduct
The judgement parameter of second confidence level of the first confidence level and the second parameter of current first parameter.
First parameter is compared by step d with first history parameters, determines described according to comparison result
First confidence level of one parameter;
Second parameter is compared by step e with second history parameters, determines described according to comparison result
Second confidence level of two parameters.
In this step, the first parameter is specifically compared by identification equipment with the first history parameters, judges the first parameter
It is whether consistent with the first history parameters, if unanimously, it is determined that the first confidence level of the first parameter be it is credible, indicated with numerical value 1;If
It is inconsistent, it is determined that the first confidence level of the first parameter be it is insincere, indicated with numerical value 0.Similarly, the second parameter is gone through with second
History parameter is compared, and is judged whether the second parameter is consistent with the second history parameters, is equally indicated the second ginseng with numerical value 1 or 0
Number is credible or insincere.
Step S30 is based on the logging state, determine first confidence level weighted value and second confidence level
Weighted value, and calculate the confidence level of the target terminal.
In the present embodiment, identification equipment determines the weighted value of the first confidence level and the weighted value of the second confidence level, specifically
, it identifies in equipment and is preset with logging state-weighted value mapping table, it can be by the logging state of determining target terminal, thus really
Fixed corresponding weighted value, in the specific implementation, when the logging state of target terminal is to be not logged in, the weight of the first confidence level is accounted for
Than being 0.5, the weight accounting of the second confidence level is 0.5, at this time the confidence level of target terminal=first confidence level × 0.5+ second
Confidence level × 0.5;When the logging state of target terminal is to log in, further judge whether the logging state of target terminal is the
It is primary to log in, can specifically determine whether the logging state of current target terminal is to step on for the first time by reading historical log information
Record, corresponding historical log information, then can determine the logging state of current target terminal to log in for the first time, in mesh if it does not exist
The logging state for marking terminal is when logging in for the first time, and the weight accounting of the first confidence level is 0.5, the weight accounting of the second confidence level
It is 0.5, the second confidence level × 0.5 the confidence level of target terminal=first confidence level × 0.5+ at this time;Corresponding history if it exists
Log-on message then can determine the logging state of current target terminal for non-first time login, i.e. login times >=2, at this point, first
The weight accounting of confidence level is 0.3, and the weight accounting of the second confidence level is 0.7, and confidence level=the first of target terminal can at this time
The second confidence level × 0.7 reliability × 0.3+.Resulting first confidence level will be calculated and the second confidence level substitutes into formula, mesh can be obtained
The confidence level for marking terminal is one of 0.3,0.5,0.7,1.
It should be noted that the above are preferred embodiment when actual implementation, specific logging state-weighted value mapping table
It can be configured according to the actual situation.
Step S40, determines whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
In the present embodiment, after the value for the confidence level for obtaining target terminal, determine whether the confidence level of target terminal is low
In preset threshold, which is set as 0.5 in the specific implementation, if not, it is determined that target terminal is credible, in target terminal
When initiating business request, allow the progress of corresponding business;If so, determining that target terminal is insincere, industry is initiated in target terminal
When business request, the progress of corresponding business is prevented.
The present embodiment obtains the first parameter of target terminal, and the logging state current based on the target terminal, obtains
Second parameter of the target terminal;Determine first parameter the first confidence level and second parameter it is second credible
Degree;Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and calculate
The confidence level of the target terminal;Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can
Letter.The present invention is identified using credibility of the multiple parameters to terminal by the logging state of terminal, avoids single parameter band
The resultant error come, so that recognition result is more accurate.
Further, it is based on trusted end-user recognition methods first embodiment of the present invention, proposes trusted end-user of the present invention
Recognition methods second embodiment.
The difference of the first embodiment of the second embodiment and trusted end-user recognition methods of trusted end-user recognition methods
It is, step a includes:
Step a1 obtains the first hardware information of target terminal, and based on preset dirty data rule, determines described first
Whether hardware information is dirty data;
Step a2 generates the first ginseng of the target terminal if it is not, being then based on first hardware information and preset algorithm
Number;
Step a3, based on the dirty data rule, is determined if so, obtaining the second hardware information of the target terminal
Whether second hardware information is dirty data;
Step a4 generates the of the target terminal if it is not, being then based on second hardware information and the preset algorithm
One parameter.
The present embodiment is when obtaining the hardware information of target terminal, it is possible to there is acquisition less than or getting dirty number
According to the case where, therefore, dirty data need to be filtered, to get accurate hardware information so that generate the first parameter can
It leans on.
It is specific:
Step a1 obtains the first hardware information of target terminal, and based on preset dirty data rule, determines described first
Whether hardware information is dirty data;
In the present embodiment, identification equipment obtains the first hardware information of target terminal, and judges that the first hardware information is
No is dirty data, and specific judgment basis is that preset dirty data is regular, as long as meeting dirty data rule, all will be regarded as dirty number
According to.Specific dirty data rule can be configured according to the actual situation, as data format is not discontinuous to, data, error in data
Deng, if the address mac of target terminal can not be directly obtained there are the address mac of part terminal in the actual implementation process,
The value that terminal returns at this time is the error values such as FF:FF:FF:FF:FF or 0000000000, this is dirty data.
Step a2 generates the first ginseng of the target terminal if it is not, being then based on first hardware information and preset algorithm
Number;
If it is determined that the first hardware information is not dirty data, then target terminal is generated based on the first hardware information and preset algorithm
The first parameter, specific generating mode can be referring to above-described embodiment, and details are not described herein.
Step a3, based on the dirty data rule, is determined if so, obtaining the second hardware information of the target terminal
Whether second hardware information is dirty data;
If it is determined that the first hardware information is dirty data, then filter out, and reacquire the second hardware information of target terminal,
Then verify whether the second hardware information is dirty data again.It should be understood that there are multiple hardware informations in target terminal, such as
The address mac, sequence number etc. if the address mac is dirty data, then it is hard to obtain second after determining that the first hardware information is dirty data
Part information, such as sequence number, and whether verifying sequence number is dirty data again.
Step a4 generates the of the target terminal if it is not, being then based on second hardware information and the preset algorithm
One parameter.
If it is determined that the second hardware information is not dirty data, then target terminal is generated based on the second hardware information and preset algorithm
The first parameter;If the second hardware information or dirty data, continue to obtain third hardware information, and verify third hardware information
It whether is dirty data.Details are not described herein for the mode of the first parameter of specific judgment mode and generation.
Further, in another embodiment, however, it is determined that the first hardware information is dirty data, then further determines that first is hard
The dirty data type of part information, wherein dirty data type includes that shortage of data, error in data, data format be not reciprocity.
If the dirty data type of the first hardware information is shortage of data, the number of characters of missing is further determined that, namely really
Fixed first hardware information lacks how many character, if the number of characters of missing is less than default value, mends to the first hardware information
Entirely, and with the first hardware information after completion the first parameter is generated.
Specific completion mode are as follows: replace the character of missing with uniform character, such as the first hardware information currently lacks three
Character then replaces missing character with uniform character.
It should be noted that guarantee that the first hardware information is reliable, default value 3.
The present embodiment needs to be filtered the hardware information of acquisition when generating the first parameter, so that the hardware of acquisition
Information is reliable, the first reliable in parameters of generation, so that subsequent reliable in parameters based in the credibility for judging target terminal,
Improve the precision of trusted end-user identification.
Further, it is based on the first, second embodiment of trusted end-user recognition methods of the present invention, proposes that terminal of the present invention can
Letter property recognition methods 3rd embodiment.
First, second embodiment of the 3rd embodiment and trusted end-user recognition methods of trusted end-user recognition methods
Difference is that step S10 includes:
Step f is detected with the presence or absence of first parameter in the target terminal, and is based on the logging state, detection
It whether there is second parameter in the target terminal;
Step g obtains first parameter and second parameter if existing.
The present embodiment first determines whether deposit in target terminal before the first parameter and the second parameter for obtaining target terminal
In the first parameter and the second parameter, it is ensured that the first parameter and the second parameter can be got.
It is specific:
Step f is detected with the presence or absence of first parameter in the target terminal, and is based on the logging state, detection
It whether there is second parameter in the target terminal;
First parameter of the present embodiment and the second parameter storage on a target terminal, for avoid user by target terminal into
The operations such as row deletion, so that the first parameter and the second parameter in target terminal are lost, identification equipment need to first detect target terminal
In whether there is the first parameter, and the logging state based on target terminal detects and whether there is the second parameter in target terminal, i.e.,
Second parameter is related to logging state.
Step g obtains first parameter and second parameter if existing.
If all existing, illustrating that user does not delete the first parameter and the second parameter, the first parameter and the second parameter are not lost,
Then obtain the first parameter and the second parameter of target terminal.
Wherein, in the present embodiment, the first parameter is obtained the hardware information of target terminal by target terminal, and by target end
End is generated according to hardware information and preset algorithm, and specific generating mode can be found in above-described embodiment, and details are not described herein, and identification is set
Standby the first parameter that can be directly obtained generation, goes to generate again without first obtaining hardware information;Second parameter is then by target
The corresponding server of terminal generates, specifically, determining the logging state of target terminal by server, then obtains target by server
The user information of terminal generates the second parameter according to preset algorithm, logging state and user information by server, and second is joined
Number, which is issued in target terminal, to be stored, and specific generating mode also repeats no more herein.
The generation of the first parameter is responsible for by target terminal in the present embodiment, and the generation of the second parameter is born by server
Duty, avoiding all parameters all is that target terminal generates, and also avoids the behavior that user modifies parameter by target terminal.And
And two parameters are generated by different main body, can accelerate formation speed, enable identification equipment faster get the first parameter and
Second parameter.
Further, after step f, the method also includes:
If first parameter and/or second parameter are not present, read in preset at least two buffer zone
Corresponding first cached parameters of the target terminal and the second cached parameters are taken, and first in determining each buffer zone is slow
Whether the second cached parameters deposited in parameter and each buffer zone are consistent;
If it is determined that the first parameter and/or the second parameter are not present in target terminal, illustrate to lack parameters on target terminal
Credibility identified, then corresponding first cached parameters of target terminal and the are read in preset at least two buffer zone
Two cached parameters, i.e., in the present embodiment, to prevent user from deleting the first parameter stored in target terminal and/or the second parameter
It removing or other reasons causes the first parameter and/or the second parameter to be lost, the present embodiment is preset at least two buffer zones,
Parameter is stored in buffer zone, such as is stored in APP cache file, equipment cache file, SD card position, to establish more
Layer data cross validation.Specifically, sentencing respectively after getting the first cached parameters and the second cached parameters in each buffer zone
Whether the first cached parameters broken in each buffer zone are consistent, and whether the second cached parameters in each buffer zone are consistent.
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal
First parameter and the second parameter.
If the first cached parameters in each buffer zone are consistent, and the second cached parameters in each buffer zone are consistent, then
First cached parameters and the second cached parameters are respectively set to the first parameter and the second parameter of target terminal.Namely using more
The mode of layer data cross validation determines the first parameter and the second parameter of target terminal, and avoiding monofactor causes to count
The problem of according to deviation.
It should be understood that illustrating that cached parameters are insincere, it is determined that target terminal is insincere if inconsistent.
The present embodiment obtains the first parameter and the second parameter of target terminal, and passes through the side of multi-layer data cross validation
Formula verifies the first parameter and the second parameter, so that the first parameter and the second reliable in parameters, improve trusted end-user knowledge
Other precision, and since the first parameter and the second parameter are by target terminal and each self-generating of server, it mentions to a certain extent
The high speed of trusted end-user identification.
The present invention also provides a kind of trusted end-user identification devices.Trusted end-user identification device of the present invention includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal,
Obtain the second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for being based on the logging state, the weighted value and described second for determining first confidence level can
The weighted value of reliability, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal can
Letter.
Further, the acquisition module is also used to:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
The user information and current logging state of target terminal described in the corresponding server of the target terminal are obtained,
And it is based on the user information and the logging state, generate the second parameter.
Further, the acquisition module is also used to:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines the first hardware letter
Whether breath is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, described second is determined
Whether hardware information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
Further, the acquisition module is also used to:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, detect the mesh
It marks and whether there is second parameter in terminal;
If all existing, first parameter and second parameter are obtained.
Further, first parameter is obtained the hardware information of the target terminal by the target terminal, and by institute
Target terminal is stated to be generated according to the hardware information and preset algorithm;Second parameter determines the target by the server
The current logging state of terminal, and obtain by the server user information of the target terminal, by the server according to
The logging state, the user information and the preset algorithm generate and are issued to the target terminal.
Further, the trusted end-user identification device further includes read module, and the read module is used for:
If if first parameter and/or second parameter are not present, in preset at least two buffer zone
Read corresponding first cached parameters of the target terminal and the second cached parameters, and first in determining each buffer zone
Whether the second cached parameters in cached parameters and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the target terminal
First parameter and the second parameter.
Further, the determining module is used for:
The first history parameters and the server for obtaining the target terminal issued based on the target terminal second
History parameters;
First parameter is compared with first history parameters, first parameter is determined according to comparison result
The first confidence level;
Second parameter is compared with second history parameters, second parameter is determined according to comparison result
The second confidence level.
The present invention also provides a kind of computer readable storage mediums.
Trusted end-user recognizer, the trusted end-user identification are stored on computer readable storage medium of the present invention
The step of trusted end-user recognition methods as described above is realized when program is executed by processor.
Wherein, the trusted end-user recognizer run on the processor is performed realized method and can refer to
The each embodiment of trusted end-user recognition methods of the present invention, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content, is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of trusted end-user recognition methods, which is characterized in that the trusted end-user recognition methods includes the following steps:
The first parameter of target terminal, and the logging state current based on the target terminal are obtained, the target terminal is obtained
The second parameter;
Determine the first confidence level of first parameter and the second confidence level of second parameter;
Based on the logging state, the weighted value of first confidence level and the weighted value of second confidence level are determined, and count
Calculate the confidence level of the target terminal;
Determine whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
2. trusted end-user recognition methods as described in claim 1, which is characterized in that first ginseng for obtaining target terminal
Number, and the logging state based on the target terminal, the step of obtaining the second parameter of the target terminal include:
The hardware information of target terminal is obtained, and is based on the hardware information, generates the first parameter of the target terminal;
Obtain the user information and current logging state of target terminal described in the corresponding server of the target terminal, and base
In the user information and the logging state, the second parameter is generated.
3. trusted end-user recognition methods as claimed in claim 2, which is characterized in that the hardware letter for obtaining target terminal
Breath, and the step of being based on the hardware information, generating the first parameter of the target terminal includes:
The first hardware information of target terminal is obtained, and based on preset dirty data rule, determines that first hardware information is
No is dirty data;
If it is not, being then based on first hardware information and preset algorithm, the first parameter of the target terminal is generated;
If so, obtaining the second hardware information of the target terminal, based on the dirty data rule, second hardware is determined
Whether information is dirty data;
If it is not, being then based on second hardware information and the preset algorithm, the first parameter of the target terminal is generated.
4. trusted end-user recognition methods as described in claim 1, which is characterized in that first ginseng for obtaining target terminal
Number, and the logging state based on the target terminal, the step of obtaining the second parameter of the target terminal include:
It detects with the presence or absence of first parameter in the target terminal, and is based on the logging state, it is whole to detect the target
It whether there is second parameter in end;
If all existing, first parameter and second parameter are obtained.
5. trusted end-user recognition methods as claimed in claim 4, which is characterized in that first parameter is whole by the target
End obtains the hardware information of the target terminal, and is generated by the target terminal according to the hardware information and preset algorithm;
Second parameter determines the current logging state of the target terminal by the server, and as described in server acquisition
The user information of target terminal, it is raw according to the logging state, the user information and the preset algorithm by the server
At and be issued to the target terminal.
6. such as the described in any item trusted end-user recognition methods of claim 4, which is characterized in that the detection target is whole
It whether there is first parameter in end, and be based on the logging state, detect in the target terminal with the presence or absence of described the
After the step of two parameters, the method also includes:
If first parameter and/or second parameter are not present, institute is read in preset at least two buffer zone
Corresponding first cached parameters of target terminal and the second cached parameters are stated, and determine the first caching ginseng in each buffer zone
Whether the second cached parameters in several and each buffer zone are consistent;
If consistent, first cached parameters and second cached parameters are respectively set to the first of the target terminal
Parameter and the second parameter.
7. trusted end-user recognition methods as claimed in any one of claims 1 to 6, which is characterized in that the determination described first
Second confidence level step of the first confidence level of parameter and second parameter includes:
The second history that the first history parameters and the server for obtaining the target terminal are issued based on the target terminal
Parameter;
First parameter is compared with first history parameters, determines the of first parameter according to comparison result
One confidence level;
Second parameter is compared with second history parameters, determines the of second parameter according to comparison result
Two confidence levels.
8. a kind of trusted end-user identification device, which is characterized in that the trusted end-user identification device includes:
Module is obtained, for obtaining the first parameter of target terminal, and the logging state current based on the target terminal, is obtained
Second parameter of the target terminal;
Determining module, for determining the first confidence level of first parameter and the second confidence level of second parameter;
Computing module, for be based on the logging state, determine first confidence level weighted value and second confidence level
Weighted value, and calculate the confidence level of the target terminal;
Identification module, for determining whether the confidence level is lower than preset threshold, if not, it is determined that the target terminal is credible.
9. a kind of trusted end-user identifies equipment, which is characterized in that the trusted end-user identification equipment includes: memory, place
It manages device and is stored in the trusted end-user recognizer that can be run on the memory and on the processor, the terminal can
Letter property recognizer realizes the trusted end-user identification as described in any one of claims 1 to 7 when being executed by the processor
The step of method.
10. a kind of computer readable storage medium, which is characterized in that being stored with terminal on the computer readable storage medium can
Letter property recognizer, is realized when the trusted end-user recognizer is executed by processor such as any one of claims 1 to 7 institute
The step of trusted end-user recognition methods stated.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762819.4A CN110474911B (en) | 2019-08-14 | 2019-08-14 | Terminal credibility identification method, device, equipment and computer readable storage medium |
PCT/CN2020/108190 WO2021027777A1 (en) | 2019-08-14 | 2020-08-10 | Terminal credibility identification method, apparatus and device, and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910762819.4A CN110474911B (en) | 2019-08-14 | 2019-08-14 | Terminal credibility identification method, device, equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110474911A true CN110474911A (en) | 2019-11-19 |
CN110474911B CN110474911B (en) | 2023-05-23 |
Family
ID=68511885
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910762819.4A Active CN110474911B (en) | 2019-08-14 | 2019-08-14 | Terminal credibility identification method, device, equipment and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110474911B (en) |
WO (1) | WO2021027777A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111107064A (en) * | 2019-12-04 | 2020-05-05 | 北京奇虎科技有限公司 | Terminal equipment identification method, device, equipment and readable storage medium |
CN111708354A (en) * | 2020-07-06 | 2020-09-25 | 四川创客知佳科技有限公司 | Smart hotel terminal fault detection method based on big data |
CN111753329A (en) * | 2020-06-05 | 2020-10-09 | 江苏任务网络科技有限公司 | Automatic early warning method for locking remote login of user |
CN111756716A (en) * | 2020-06-15 | 2020-10-09 | 深信服科技股份有限公司 | Flow detection method and device and computer readable storage medium |
CN112311760A (en) * | 2020-09-17 | 2021-02-02 | 广西电网有限责任公司电力科学研究院 | Terminal credibility analysis method and device for one-end multi-network environment |
WO2021027777A1 (en) * | 2019-08-14 | 2021-02-18 | 深圳前海微众银行股份有限公司 | Terminal credibility identification method, apparatus and device, and computer readable storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040059792A1 (en) * | 2001-11-02 | 2004-03-25 | Nokia Corporation | Method for processing data, a data processing system and a portable terminal |
CN104135494A (en) * | 2014-08-22 | 2014-11-05 | 北京京东尚科信息技术有限公司 | Same-account incredible terminal login method and system based on credible terminal |
CN104966002A (en) * | 2015-07-03 | 2015-10-07 | 北京数字联盟网络科技有限公司 | False mobile terminal identification method and apparatus |
CN105426734A (en) * | 2015-11-12 | 2016-03-23 | 山东超越数控电子有限公司 | Identity authentication method and device based on trusted computing |
CN106453372A (en) * | 2016-11-03 | 2017-02-22 | 努比亚技术有限公司 | Terminal, server and account login method |
CN106778023A (en) * | 2017-01-03 | 2017-05-31 | 武汉大学 | A kind of Postural Evaluations of Electric Equipments credible result evaluation method |
CN106936761A (en) * | 2015-12-29 | 2017-07-07 | 株式会社日立制作所 | A kind of secure log authentication method and system based on Quick Response Code and hardware information |
CN108011936A (en) * | 2017-11-28 | 2018-05-08 | 百度在线网络技术(北京)有限公司 | Method and apparatus for pushed information |
US20180302852A1 (en) * | 2016-07-29 | 2018-10-18 | Tencent Technology (Shenzhen) Company Limited | Wireless local area network connection method, mobile terminal, and storage medium |
CN109002733A (en) * | 2018-06-20 | 2018-12-14 | 阿里巴巴集团控股有限公司 | A kind of pair of equipment carries out the method and device of reliability evaluation |
US20190034658A1 (en) * | 2017-07-28 | 2019-01-31 | Alibaba Group Holding Limited | Data secruity enhancement by model training |
CN110061987A (en) * | 2019-04-19 | 2019-07-26 | 武汉大学 | A kind of access control method and device of based role and trusted end-user |
CN110069360A (en) * | 2019-04-22 | 2019-07-30 | 重庆长安新能源汽车科技有限公司 | A kind of storage, read method and the device of electric machine controller data |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8635662B2 (en) * | 2008-01-31 | 2014-01-21 | Intuit Inc. | Dynamic trust model for authenticating a user |
CN104954350B (en) * | 2014-03-31 | 2020-06-23 | 腾讯科技(深圳)有限公司 | Account information protection method and system |
CN105635084B (en) * | 2014-11-17 | 2018-12-14 | 华为技术有限公司 | Terminal authentication apparatus and method |
CN110474911B (en) * | 2019-08-14 | 2023-05-23 | 深圳前海微众银行股份有限公司 | Terminal credibility identification method, device, equipment and computer readable storage medium |
-
2019
- 2019-08-14 CN CN201910762819.4A patent/CN110474911B/en active Active
-
2020
- 2020-08-10 WO PCT/CN2020/108190 patent/WO2021027777A1/en active Application Filing
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040059792A1 (en) * | 2001-11-02 | 2004-03-25 | Nokia Corporation | Method for processing data, a data processing system and a portable terminal |
CN104135494A (en) * | 2014-08-22 | 2014-11-05 | 北京京东尚科信息技术有限公司 | Same-account incredible terminal login method and system based on credible terminal |
CN104966002A (en) * | 2015-07-03 | 2015-10-07 | 北京数字联盟网络科技有限公司 | False mobile terminal identification method and apparatus |
CN105426734A (en) * | 2015-11-12 | 2016-03-23 | 山东超越数控电子有限公司 | Identity authentication method and device based on trusted computing |
CN106936761A (en) * | 2015-12-29 | 2017-07-07 | 株式会社日立制作所 | A kind of secure log authentication method and system based on Quick Response Code and hardware information |
US20180302852A1 (en) * | 2016-07-29 | 2018-10-18 | Tencent Technology (Shenzhen) Company Limited | Wireless local area network connection method, mobile terminal, and storage medium |
CN106453372A (en) * | 2016-11-03 | 2017-02-22 | 努比亚技术有限公司 | Terminal, server and account login method |
CN106778023A (en) * | 2017-01-03 | 2017-05-31 | 武汉大学 | A kind of Postural Evaluations of Electric Equipments credible result evaluation method |
US20190034658A1 (en) * | 2017-07-28 | 2019-01-31 | Alibaba Group Holding Limited | Data secruity enhancement by model training |
CN108011936A (en) * | 2017-11-28 | 2018-05-08 | 百度在线网络技术(北京)有限公司 | Method and apparatus for pushed information |
CN109002733A (en) * | 2018-06-20 | 2018-12-14 | 阿里巴巴集团控股有限公司 | A kind of pair of equipment carries out the method and device of reliability evaluation |
CN110061987A (en) * | 2019-04-19 | 2019-07-26 | 武汉大学 | A kind of access control method and device of based role and trusted end-user |
CN110069360A (en) * | 2019-04-22 | 2019-07-30 | 重庆长安新能源汽车科技有限公司 | A kind of storage, read method and the device of electric machine controller data |
Non-Patent Citations (1)
Title |
---|
杨蕊岚: "基于定序回归的云终端用户行为可信性评估方法的研究" * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021027777A1 (en) * | 2019-08-14 | 2021-02-18 | 深圳前海微众银行股份有限公司 | Terminal credibility identification method, apparatus and device, and computer readable storage medium |
CN111107064A (en) * | 2019-12-04 | 2020-05-05 | 北京奇虎科技有限公司 | Terminal equipment identification method, device, equipment and readable storage medium |
CN111753329A (en) * | 2020-06-05 | 2020-10-09 | 江苏任务网络科技有限公司 | Automatic early warning method for locking remote login of user |
CN111756716A (en) * | 2020-06-15 | 2020-10-09 | 深信服科技股份有限公司 | Flow detection method and device and computer readable storage medium |
CN111708354A (en) * | 2020-07-06 | 2020-09-25 | 四川创客知佳科技有限公司 | Smart hotel terminal fault detection method based on big data |
CN111708354B (en) * | 2020-07-06 | 2021-11-05 | 四川创客知佳科技有限公司 | Smart hotel terminal fault detection method based on big data |
CN112311760A (en) * | 2020-09-17 | 2021-02-02 | 广西电网有限责任公司电力科学研究院 | Terminal credibility analysis method and device for one-end multi-network environment |
Also Published As
Publication number | Publication date |
---|---|
WO2021027777A1 (en) | 2021-02-18 |
CN110474911B (en) | 2023-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110474911A (en) | Trusted end-user recognition methods, device, equipment and computer readable storage medium | |
US11637824B2 (en) | Multi-factor authentication devices | |
US10924514B1 (en) | Machine learning detection of fraudulent validation of financial institution credentials | |
CN109492378B (en) | Identity verification method based on equipment identification code, server and medium | |
US9491182B2 (en) | Methods and systems for secure internet access and services | |
US9439070B2 (en) | User authentication system | |
JP2021518705A (en) | Runtime self-modification for blockchain ledger | |
US9230066B1 (en) | Assessing risk for third-party data collectors | |
CN109561085A (en) | A kind of auth method based on EIC equipment identification code, server and medium | |
US20200050759A1 (en) | Enhancing security using anomaly detection | |
US11855976B2 (en) | Utilizing behavioral features to authenticate a user entering login credentials | |
TWI701932B (en) | Identity authentication method, server and client equipment | |
CN109711162A (en) | Block chain-based security application method and system | |
CN108028843A (en) | Passive type web application firewalls | |
CN115086047B (en) | Interface authentication method and device, electronic equipment and storage medium | |
CN114257451B (en) | Verification interface replacement method and device, storage medium and computer equipment | |
CN112765588B (en) | Identity recognition method and device, electronic equipment and storage medium | |
US10009330B1 (en) | Method, apparatus and article of manufacture for fast tracking authentication | |
CN115437798A (en) | Data processing method, device, equipment and medium for shared memory | |
TW202125379A (en) | Fraud detection system, fraud detection method, and program | |
US20240220593A1 (en) | User authentication with biometric data in conjunction with autofill assistance | |
US20240160707A1 (en) | Monitoring user interaction with client devices | |
US20240202293A1 (en) | Fraud detection system, fraud detection method, and program | |
US20230385390A1 (en) | System and method for detecting login fraud based on a machine learning model | |
TWI704796B (en) | System for using network identification to sign in service server via telecommunication server and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |