CN111193729A - Cross-terminal user identity recognition method and device and computer readable storage medium - Google Patents
Cross-terminal user identity recognition method and device and computer readable storage medium Download PDFInfo
- Publication number
- CN111193729A CN111193729A CN201911341917.7A CN201911341917A CN111193729A CN 111193729 A CN111193729 A CN 111193729A CN 201911341917 A CN201911341917 A CN 201911341917A CN 111193729 A CN111193729 A CN 111193729A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- binding
- cross
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 230000006399 behavior Effects 0.000 claims description 40
- 238000013475 authorization Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 235000014510 cooky Nutrition 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/255—Maintenance or indexing of mapping tables
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Toxicology (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Biomedical Technology (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention relates to a big data technology, disclosing a cross-terminal user identity identification method, comprising: acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user; when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm, and the identity of the user is identified according to the similarity. The invention also provides a cross-terminal user identity recognition device and a computer readable storage medium. The invention realizes the cross-terminal user identity identification.
Description
Technical Field
The invention relates to the technical field of big data, in particular to a cross-terminal user identity identification method and device and a computer readable storage medium.
Background
At present, the traditional user identity identification is the identity authentication problem among one or more systems on a single terminal, and a user is required to perform login authentication, namely, the identity of a registered user can be identified only on the same terminal. At present, more and more enterprises pay more and more attention to identity recognition of multi-end users, but the traditional user identity recognition scheme cannot recognize the uniqueness of the non-registered user identity on different terminals. And the current scheme for the identification of the identity of the tourist users of the cross-terminal multi-system is relatively lacked, so that the requirement that an enterprise needs to identify the identity of a multi-terminal non-registered user is difficult to meet.
Disclosure of Invention
The invention provides a cross-terminal user identity recognition method, a cross-terminal user identity recognition device and a computer readable storage medium, and mainly aims to present an accurate identity recognition result to a user when the user performs cross-terminal identity recognition.
In order to achieve the above object, the present invention provides a method for identifying an identity of a cross-terminal user, comprising:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Optionally, the pre-constructed two-dimensional code of the webpage end includes:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
Optionally, the identity fingerprint and the application program are identity bound by: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Optionally, the generating the link of the binding relationship table includes:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
Optionally, the similarity algorithm comprises:
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
In addition, to achieve the above object, the present invention further provides a cross-end user identification apparatus, which includes a memory and a processor, where the memory stores a cross-end user identification program that is executable on the processor, and when the processor executes the cross-end user identification program, the cross-end user identification apparatus implements the following steps:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Optionally, the pre-constructed two-dimensional code of the webpage end includes:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
Optionally, the identity fingerprint and the application program are identity bound by: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Optionally, the generating the link of the binding relationship table includes:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
In addition, to achieve the above object, the present invention also provides a computer readable storage medium having a cross-end user identification program stored thereon, where the cross-end user identification program is executable by one or more processors to implement the steps of the cross-end user identification method as described above.
According to the cross-terminal user identity identification method, the cross-terminal user identity identification device and the computer readable storage medium, when a user performs cross-terminal user identity identification, an identity fingerprint generated when the user accesses a webpage end is obtained, the application program corresponding to the user mobile end is accessed through a pre-constructed webpage end two-dimensional code, and the identity fingerprint and the application program are subjected to identification binding to obtain the identity of the user; when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm, and the identity recognition of the cross-terminal user is completed according to the similarity.
Drawings
Fig. 1 is a schematic flowchart of a cross-terminal user identity recognition method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an internal structure of a cross-terminal user identity recognition apparatus according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a cross-end-user identification program in a cross-end-user identification device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a cross-terminal user identity identification method. Fig. 1 is a schematic flow chart of a cross-terminal user identity recognition method according to an embodiment of the present invention. The method may be performed by an apparatus, which may be implemented by software and/or hardware.
In this embodiment, the method for identifying the identity of the cross-terminal user includes:
s1, obtaining an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to the mobile end of the user through a webpage end two-dimensional code which is constructed in advance, and carrying out identification binding on the identity fingerprint and the application program to obtain an identity of the user.
In the preferred embodiment of the present invention, by using the open source item on github: fingerprintjs, which is the device fingerprint. The device fingerprint is used for acquiring software and hardware information of the terminal device, drawing an image of the user device and generating a unique device identifier. The fingerprintJS is a fast browser fingerprint library, is realized by pure javascript, has no dependency relationship, and returns a 32-bit integer by using a Murmur Hash algorithm. The FingerprintJS can identify the Web browser anonymously, and by inquiring numerical values of proxy character strings, screen color depths, languages, MIME types installed and supported by plug-ins, local storage of time zone offset, session storage and the like of the browser, the numerical values are transmitted through a hash function to generate fingerprints, and the browser can be identified without Cookie storage. Preferably, in the invention, according to the behavior data of the user accessing the webpage, the finger print of the user is generated by collecting the equipment portrait accessed by the user by using the Fingerprintjs.
Preferably, the pre-constructed two-dimensional code of the webpage end includes: creating a two-dimensional code ticket, obtaining a parameter (scene _ id) of the two-dimensional code ticket from the two-dimensional code ticket to a designated url, and obtaining a corresponding two-dimensional code according to the parameter of the two-dimensional code ticket. The scene _ id represents an id of the application program, wherein the application program may be a public number. Further, according to the pre-constructed webpage two-dimensional code, the user directly performs a scanning function to the application program of the mobile terminal through the mobile terminal.
Preferably, the identification binding the identity fingerprint and the application program comprises identification binding the identity fingerprint and an open ID of the application program and identification binding the identity fingerprint and a unique ID of the application program. The open ID indicates that accounts of different applet users in the application are different, and the unique ID indicates that the accounts of all the applet users in the application are the same. And obtaining the identity of the user according to the unique ID and the open ID. Wherein the identifier binding of the open ID comprises: and establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, and performing identification binding of the open ID according to the link. The identification binding of the unique ID comprises: after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Further, the generating the link of the binding relationship table in the present invention includes: receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
And S2, when the user accesses the webpage end or the mobile end again, uploading the identity of the user to a pre-constructed log system, recording the behavior log of the user through the log system, and calculating the similarity between the identity and the behavior log of the user according to a similarity algorithm.
In the preferred embodiment of the present invention, the pre-established log system is compiled through Java language. The log system includes: the format of the log is [ identity ], [ specific user behavior log appearing for the first time ] and [ array formed by all the appearing time of the behavior log ]; initializing a character string similarity threshold value in a user behavior log, wherein if the character strings with the similarity greater than a preset threshold value are of the same type, the preset threshold value is 0.8; time intervals for categorizing the user behavior logs are initialized, and similar logs in one time interval are recorded only once.
Preferably, the similarity calculation method in the present invention includes:
wherein X represents the user's bodyIdentity, Y represents a log of user's behavior, XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
And S3, if the similarity is greater than a preset threshold, the user identity authentication is successful, and if the similarity is not greater than the preset threshold, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The invention also provides a cross-terminal user identity recognition device. Fig. 2 is a schematic diagram of an internal structure of a cross-terminal user identity recognition apparatus according to an embodiment of the present invention.
In this embodiment, the cross-terminal user identification apparatus 1 may be a PC (Personal Computer), a terminal device such as a smart phone, a tablet Computer, or a mobile Computer, or may be a server. The cross-end user identification device 1 comprises at least a memory 11, a processor 12, a communication bus 13, and a network interface 14.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the cross-end user identification appliance 1, such as a hard disk of the cross-end user identification appliance 1. The memory 11 may also be an external storage device of the cross-end-user identification apparatus 1 in other embodiments, such as a plug-in hard disk provided on the cross-end-user identification apparatus 1, a Smart Memory Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 11 may also comprise both internal and external memory units across the end user identification appliance 1. The memory 11 may be used not only to store application software installed in the cross-end user id device 1 and various types of data, such as the code of the cross-end user id program 01, but also to temporarily store data that has been output or is to be output.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), typically used to establish a communication link between the apparatus 1 and other electronic devices.
Optionally, the apparatus 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the cross-end user identification device 1 and for displaying a visual user interface.
While fig. 2 shows only the cross-end user identification device 1 with components 11-14 and cross-end user identification program 01, those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the cross-end user identification device 1 and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
In the embodiment of the apparatus 1 shown in fig. 2, a cross-end-user identification program 01 is stored in the memory 11; the processor 12, when executing the cross-end user identification program 01 stored in the memory 11, performs the following steps:
step one, acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user.
In the preferred embodiment of the present invention, by using the open source item on github: fingerprintjs, which is the device fingerprint. The device fingerprint is used for acquiring software and hardware information of the terminal device, drawing an image of the user device and generating a unique device identifier. The fingerprintJS is a fast browser fingerprint library, is realized by pure javascript, has no dependency relationship, and returns a 32-bit integer by using a Murmur Hash algorithm. The FingerprintJS can identify the Web browser anonymously, and by inquiring numerical values of proxy character strings, screen color depths, languages, MIME types installed and supported by plug-ins, local storage of time zone offset, session storage and the like of the browser, the numerical values are transmitted through a hash function to generate fingerprints, and the browser can be identified without Cookie storage. Preferably, in the invention, according to the behavior data of the user accessing the webpage, the finger print of the user is generated by collecting the equipment portrait accessed by the user by using the Fingerprintjs.
Preferably, the pre-constructed two-dimensional code of the webpage end includes: creating a two-dimensional code ticket, obtaining a parameter (scene _ id) of the two-dimensional code ticket from the two-dimensional code ticket to a designated url, and obtaining a corresponding two-dimensional code according to the parameter of the two-dimensional code ticket. The scene _ id represents an id of the application program, wherein the application program may be a public number. Further, according to the pre-constructed webpage two-dimensional code, the user directly performs a scanning function to the application program of the mobile terminal through the mobile terminal.
Preferably, the identification binding the identity fingerprint and the application program comprises identification binding the identity fingerprint and an open ID of the application program and identification binding the identity fingerprint and a unique ID of the application program. The open ID indicates that accounts of different applet users in the application are different, and the unique ID indicates that the accounts of all the applet users in the application are the same. And obtaining the identity of the user according to the unique ID and the open ID. Wherein the identifier binding of the open ID comprises: and establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, and performing identification binding of the open ID according to the link. The identification binding of the unique ID comprises: after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Further, the generating the link of the binding relationship table in the present invention includes: receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
And secondly, when the user accesses the webpage end or the mobile end again, uploading the identity of the user to a pre-constructed log system, recording the behavior log of the user through the log system, and calculating the similarity between the identity and the behavior log of the user according to a similarity algorithm.
In the preferred embodiment of the present invention, the pre-established log system is compiled through Java language. The log system includes: the format of the log is [ identity ], [ specific user behavior log appearing for the first time ] and [ array formed by all the appearing time of the behavior log ]; initializing a character string similarity threshold value in a user behavior log, wherein if the character strings with the similarity greater than a preset threshold value are of the same type, the preset threshold value is 0.8; time intervals for categorizing the user behavior logs are initialized, and similar logs in one time interval are recorded only once.
Preferably, the similarity calculation method in the present invention includes:
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
And step three, if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Alternatively, in other embodiments, the cross-end-user identification program may be further divided into one or more modules, and the one or more modules are stored in the memory 11 and executed by one or more processors (in this embodiment, the processor 12) to implement the present invention.
For example, referring to fig. 3, a schematic diagram of program modules of a cross-end user identification program in an embodiment of the cross-end user identification apparatus of the present invention is shown, in this embodiment, the cross-end user identification program may be divided into an identity obtaining module 10, a similarity calculating module 20, and an identification module 30, which exemplarily:
the identity obtaining module 10 is configured to: the method comprises the steps of obtaining an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a webpage end two-dimensional code which is constructed in advance, and carrying out identification binding on the identity fingerprint and the application program to obtain an identity of the user.
The similarity calculation module 20 is configured to: when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm.
The identification module 30 is configured to: if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The functions or operation steps of the program modules such as the identity obtaining module 10, the similarity calculating module 20, and the identity identifying module 30 when executed are substantially the same as those of the above embodiments, and are not repeated herein.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where a cross-end user identification program is stored on the computer-readable storage medium, where the cross-end user identification program is executable by one or more processors to implement the following operations:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The specific implementation manner of the computer-readable storage medium of the present invention is substantially the same as that of the above-mentioned cross-terminal user identification apparatus and method, and will not be described herein again.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A cross-terminal user identification method, the method comprising:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
2. The cross-terminal user identification method of claim 1, wherein the pre-constructed web page side two-dimensional code comprises:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
3. The cross-end user identification method of claim 1 wherein said identity fingerprint identity binding with the application comprises: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
4. The cross-end-user identification method of claim 3, wherein the generating the link of the binding relationship table comprises:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
5. The cross-end user identification method according to any of claims 1 to 4, wherein the similarity algorithm comprises:
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
6. A cross-end user identification device, the device comprising a memory and a processor, the memory having stored thereon a cross-end user identification program executable on the processor, the cross-end user identification program when executed by the processor implementing the steps of:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
7. The cross-end-user identification device of claim 6, wherein the pre-constructed web-side two-dimensional code comprises:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
8. The cross-end user identification device of claim 6 wherein said identity fingerprint identity binding with the application comprises: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
9. The cross-end-user identification apparatus of claim 8 wherein the generating the link to the binding relationship table comprises:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
10. A computer readable storage medium having a cross-end user identification program stored thereon, the cross-end user identification program being executable by one or more processors to implement the steps of the cross-end user identification method as claimed in any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911341917.7A CN111193729A (en) | 2019-12-20 | 2019-12-20 | Cross-terminal user identity recognition method and device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911341917.7A CN111193729A (en) | 2019-12-20 | 2019-12-20 | Cross-terminal user identity recognition method and device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111193729A true CN111193729A (en) | 2020-05-22 |
Family
ID=70710142
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911341917.7A Pending CN111193729A (en) | 2019-12-20 | 2019-12-20 | Cross-terminal user identity recognition method and device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111193729A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723083A (en) * | 2020-06-23 | 2020-09-29 | 北京思特奇信息技术股份有限公司 | User identity identification method and device, electronic equipment and storage medium |
CN118394237A (en) * | 2024-05-09 | 2024-07-26 | 金华广电网络技术有限公司 | Touch type regional operation method for display |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130016393A1 (en) * | 2011-07-14 | 2013-01-17 | Ricoh Company, Ltd. | Apparatus, system, and method of log management, and recording medium storing log management program |
US20140207813A1 (en) * | 2005-05-31 | 2014-07-24 | FairWarning, Inc. | Identity mapping system and method |
CN103995907A (en) * | 2014-06-13 | 2014-08-20 | 北京奇艺世纪科技有限公司 | Determining method of access users |
CN106033579A (en) * | 2015-03-16 | 2016-10-19 | 北京国双科技有限公司 | Data processing method and apparatus thereof |
CN106850503A (en) * | 2015-12-04 | 2017-06-13 | 阿里巴巴集团控股有限公司 | One kind is exempted to log in identity identifying method and device |
CN107707356A (en) * | 2017-09-25 | 2018-02-16 | 中国科学院信息工程研究所 | A kind of mobile device secure binding method and application system based on Quick Response Code identification |
CN108768970A (en) * | 2018-05-15 | 2018-11-06 | 腾讯科技(北京)有限公司 | A kind of binding method of smart machine, identity authentication platform and storage medium |
CN109951289A (en) * | 2019-01-25 | 2019-06-28 | 北京三快在线科技有限公司 | A kind of recognition methods, device, equipment and readable storage medium storing program for executing |
-
2019
- 2019-12-20 CN CN201911341917.7A patent/CN111193729A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140207813A1 (en) * | 2005-05-31 | 2014-07-24 | FairWarning, Inc. | Identity mapping system and method |
US20130016393A1 (en) * | 2011-07-14 | 2013-01-17 | Ricoh Company, Ltd. | Apparatus, system, and method of log management, and recording medium storing log management program |
CN103995907A (en) * | 2014-06-13 | 2014-08-20 | 北京奇艺世纪科技有限公司 | Determining method of access users |
CN106033579A (en) * | 2015-03-16 | 2016-10-19 | 北京国双科技有限公司 | Data processing method and apparatus thereof |
CN106850503A (en) * | 2015-12-04 | 2017-06-13 | 阿里巴巴集团控股有限公司 | One kind is exempted to log in identity identifying method and device |
CN107707356A (en) * | 2017-09-25 | 2018-02-16 | 中国科学院信息工程研究所 | A kind of mobile device secure binding method and application system based on Quick Response Code identification |
CN108768970A (en) * | 2018-05-15 | 2018-11-06 | 腾讯科技(北京)有限公司 | A kind of binding method of smart machine, identity authentication platform and storage medium |
CN109951289A (en) * | 2019-01-25 | 2019-06-28 | 北京三快在线科技有限公司 | A kind of recognition methods, device, equipment and readable storage medium storing program for executing |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723083A (en) * | 2020-06-23 | 2020-09-29 | 北京思特奇信息技术股份有限公司 | User identity identification method and device, electronic equipment and storage medium |
CN111723083B (en) * | 2020-06-23 | 2024-04-05 | 北京思特奇信息技术股份有限公司 | User identity recognition method and device, electronic equipment and storage medium |
CN118394237A (en) * | 2024-05-09 | 2024-07-26 | 金华广电网络技术有限公司 | Touch type regional operation method for display |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110602052B (en) | Micro-service processing method and server | |
CN105610810B (en) | Data processing method, client and server | |
US10063620B2 (en) | Information sharing method and system | |
US20080196096A1 (en) | Methods for Extending a Security Token Based Identity System | |
CN105391674B (en) | Information processing method and system, server and client | |
CN107992759B (en) | Apparatus, method and computer readable storage medium for implementing electronic seal | |
WO2020181809A1 (en) | Data processing method and system based on interface checking, and computer device | |
JP2015528947A (en) | Method and system for secure communication of personal information | |
CN104796257A (en) | Flexible data authentication | |
CN110266469B (en) | Remote online electronic signature method based on WEB script data stream operation | |
CN110708335A (en) | Access authentication method and device and terminal equipment | |
CN105162604A (en) | Feature image identification based verification method and system, and verification server | |
CN112328486A (en) | Interface automation test method and device, computer equipment and storage medium | |
CN111193729A (en) | Cross-terminal user identity recognition method and device and computer readable storage medium | |
CN107819748B (en) | Anti-cracking verification code implementation method and device | |
CN110750765B (en) | Service system, front-end page control method thereof, computer device, and storage medium | |
CN103001934A (en) | Terminal application login method and terminal application login system | |
CN114996675A (en) | Data query method and device, computer equipment and storage medium | |
CN111651749A (en) | Method and device for finding account based on password, computer equipment and storage medium | |
CN113810375B (en) | Webshell detection method, device and equipment and readable storage medium | |
CN116723247A (en) | Micro-service calling method, device, equipment and storage medium | |
US8904508B2 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN117133006A (en) | Document verification method and device, computer equipment and storage medium | |
CN117040804A (en) | Network attack detection method, device, equipment, medium and program product for website |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200522 |