CN111193729A - Cross-terminal user identity recognition method and device and computer readable storage medium - Google Patents

Cross-terminal user identity recognition method and device and computer readable storage medium Download PDF

Info

Publication number
CN111193729A
CN111193729A CN201911341917.7A CN201911341917A CN111193729A CN 111193729 A CN111193729 A CN 111193729A CN 201911341917 A CN201911341917 A CN 201911341917A CN 111193729 A CN111193729 A CN 111193729A
Authority
CN
China
Prior art keywords
user
identity
binding
cross
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911341917.7A
Other languages
Chinese (zh)
Inventor
付昌林
商飞
陈少梅
罗滢川
陈堂宋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhaifinancial Assets Exchange Ltd
Original Assignee
Shenzhen Qianhaifinancial Assets Exchange Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhaifinancial Assets Exchange Ltd filed Critical Shenzhen Qianhaifinancial Assets Exchange Ltd
Priority to CN201911341917.7A priority Critical patent/CN111193729A/en
Publication of CN111193729A publication Critical patent/CN111193729A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/255Maintenance or indexing of mapping tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Toxicology (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Biomedical Technology (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to a big data technology, disclosing a cross-terminal user identity identification method, comprising: acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user; when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm, and the identity of the user is identified according to the similarity. The invention also provides a cross-terminal user identity recognition device and a computer readable storage medium. The invention realizes the cross-terminal user identity identification.

Description

Cross-terminal user identity recognition method and device and computer readable storage medium
Technical Field
The invention relates to the technical field of big data, in particular to a cross-terminal user identity identification method and device and a computer readable storage medium.
Background
At present, the traditional user identity identification is the identity authentication problem among one or more systems on a single terminal, and a user is required to perform login authentication, namely, the identity of a registered user can be identified only on the same terminal. At present, more and more enterprises pay more and more attention to identity recognition of multi-end users, but the traditional user identity recognition scheme cannot recognize the uniqueness of the non-registered user identity on different terminals. And the current scheme for the identification of the identity of the tourist users of the cross-terminal multi-system is relatively lacked, so that the requirement that an enterprise needs to identify the identity of a multi-terminal non-registered user is difficult to meet.
Disclosure of Invention
The invention provides a cross-terminal user identity recognition method, a cross-terminal user identity recognition device and a computer readable storage medium, and mainly aims to present an accurate identity recognition result to a user when the user performs cross-terminal identity recognition.
In order to achieve the above object, the present invention provides a method for identifying an identity of a cross-terminal user, comprising:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Optionally, the pre-constructed two-dimensional code of the webpage end includes:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
Optionally, the identity fingerprint and the application program are identity bound by: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Optionally, the generating the link of the binding relationship table includes:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
Optionally, the similarity algorithm comprises:
Figure BDA0002328965840000021
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
In addition, to achieve the above object, the present invention further provides a cross-end user identification apparatus, which includes a memory and a processor, where the memory stores a cross-end user identification program that is executable on the processor, and when the processor executes the cross-end user identification program, the cross-end user identification apparatus implements the following steps:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Optionally, the pre-constructed two-dimensional code of the webpage end includes:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
Optionally, the identity fingerprint and the application program are identity bound by: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Optionally, the generating the link of the binding relationship table includes:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
In addition, to achieve the above object, the present invention also provides a computer readable storage medium having a cross-end user identification program stored thereon, where the cross-end user identification program is executable by one or more processors to implement the steps of the cross-end user identification method as described above.
According to the cross-terminal user identity identification method, the cross-terminal user identity identification device and the computer readable storage medium, when a user performs cross-terminal user identity identification, an identity fingerprint generated when the user accesses a webpage end is obtained, the application program corresponding to the user mobile end is accessed through a pre-constructed webpage end two-dimensional code, and the identity fingerprint and the application program are subjected to identification binding to obtain the identity of the user; when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm, and the identity recognition of the cross-terminal user is completed according to the similarity.
Drawings
Fig. 1 is a schematic flowchart of a cross-terminal user identity recognition method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an internal structure of a cross-terminal user identity recognition apparatus according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a cross-end-user identification program in a cross-end-user identification device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a cross-terminal user identity identification method. Fig. 1 is a schematic flow chart of a cross-terminal user identity recognition method according to an embodiment of the present invention. The method may be performed by an apparatus, which may be implemented by software and/or hardware.
In this embodiment, the method for identifying the identity of the cross-terminal user includes:
s1, obtaining an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to the mobile end of the user through a webpage end two-dimensional code which is constructed in advance, and carrying out identification binding on the identity fingerprint and the application program to obtain an identity of the user.
In the preferred embodiment of the present invention, by using the open source item on github: fingerprintjs, which is the device fingerprint. The device fingerprint is used for acquiring software and hardware information of the terminal device, drawing an image of the user device and generating a unique device identifier. The fingerprintJS is a fast browser fingerprint library, is realized by pure javascript, has no dependency relationship, and returns a 32-bit integer by using a Murmur Hash algorithm. The FingerprintJS can identify the Web browser anonymously, and by inquiring numerical values of proxy character strings, screen color depths, languages, MIME types installed and supported by plug-ins, local storage of time zone offset, session storage and the like of the browser, the numerical values are transmitted through a hash function to generate fingerprints, and the browser can be identified without Cookie storage. Preferably, in the invention, according to the behavior data of the user accessing the webpage, the finger print of the user is generated by collecting the equipment portrait accessed by the user by using the Fingerprintjs.
Preferably, the pre-constructed two-dimensional code of the webpage end includes: creating a two-dimensional code ticket, obtaining a parameter (scene _ id) of the two-dimensional code ticket from the two-dimensional code ticket to a designated url, and obtaining a corresponding two-dimensional code according to the parameter of the two-dimensional code ticket. The scene _ id represents an id of the application program, wherein the application program may be a public number. Further, according to the pre-constructed webpage two-dimensional code, the user directly performs a scanning function to the application program of the mobile terminal through the mobile terminal.
Preferably, the identification binding the identity fingerprint and the application program comprises identification binding the identity fingerprint and an open ID of the application program and identification binding the identity fingerprint and a unique ID of the application program. The open ID indicates that accounts of different applet users in the application are different, and the unique ID indicates that the accounts of all the applet users in the application are the same. And obtaining the identity of the user according to the unique ID and the open ID. Wherein the identifier binding of the open ID comprises: and establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, and performing identification binding of the open ID according to the link. The identification binding of the unique ID comprises: after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Further, the generating the link of the binding relationship table in the present invention includes: receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
And S2, when the user accesses the webpage end or the mobile end again, uploading the identity of the user to a pre-constructed log system, recording the behavior log of the user through the log system, and calculating the similarity between the identity and the behavior log of the user according to a similarity algorithm.
In the preferred embodiment of the present invention, the pre-established log system is compiled through Java language. The log system includes: the format of the log is [ identity ], [ specific user behavior log appearing for the first time ] and [ array formed by all the appearing time of the behavior log ]; initializing a character string similarity threshold value in a user behavior log, wherein if the character strings with the similarity greater than a preset threshold value are of the same type, the preset threshold value is 0.8; time intervals for categorizing the user behavior logs are initialized, and similar logs in one time interval are recorded only once.
Preferably, the similarity calculation method in the present invention includes:
Figure BDA0002328965840000061
wherein X represents the user's bodyIdentity, Y represents a log of user's behavior, XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
And S3, if the similarity is greater than a preset threshold, the user identity authentication is successful, and if the similarity is not greater than the preset threshold, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The invention also provides a cross-terminal user identity recognition device. Fig. 2 is a schematic diagram of an internal structure of a cross-terminal user identity recognition apparatus according to an embodiment of the present invention.
In this embodiment, the cross-terminal user identification apparatus 1 may be a PC (Personal Computer), a terminal device such as a smart phone, a tablet Computer, or a mobile Computer, or may be a server. The cross-end user identification device 1 comprises at least a memory 11, a processor 12, a communication bus 13, and a network interface 14.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the cross-end user identification appliance 1, such as a hard disk of the cross-end user identification appliance 1. The memory 11 may also be an external storage device of the cross-end-user identification apparatus 1 in other embodiments, such as a plug-in hard disk provided on the cross-end-user identification apparatus 1, a Smart Memory Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 11 may also comprise both internal and external memory units across the end user identification appliance 1. The memory 11 may be used not only to store application software installed in the cross-end user id device 1 and various types of data, such as the code of the cross-end user id program 01, but also to temporarily store data that has been output or is to be output.
Processor 12, which in some embodiments may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip, executes program code or processes data stored in memory 11, such as executing cross-end-user id 01.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), typically used to establish a communication link between the apparatus 1 and other electronic devices.
Optionally, the apparatus 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the cross-end user identification device 1 and for displaying a visual user interface.
While fig. 2 shows only the cross-end user identification device 1 with components 11-14 and cross-end user identification program 01, those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the cross-end user identification device 1 and may include fewer or more components than shown, or some components in combination, or a different arrangement of components.
In the embodiment of the apparatus 1 shown in fig. 2, a cross-end-user identification program 01 is stored in the memory 11; the processor 12, when executing the cross-end user identification program 01 stored in the memory 11, performs the following steps:
step one, acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user.
In the preferred embodiment of the present invention, by using the open source item on github: fingerprintjs, which is the device fingerprint. The device fingerprint is used for acquiring software and hardware information of the terminal device, drawing an image of the user device and generating a unique device identifier. The fingerprintJS is a fast browser fingerprint library, is realized by pure javascript, has no dependency relationship, and returns a 32-bit integer by using a Murmur Hash algorithm. The FingerprintJS can identify the Web browser anonymously, and by inquiring numerical values of proxy character strings, screen color depths, languages, MIME types installed and supported by plug-ins, local storage of time zone offset, session storage and the like of the browser, the numerical values are transmitted through a hash function to generate fingerprints, and the browser can be identified without Cookie storage. Preferably, in the invention, according to the behavior data of the user accessing the webpage, the finger print of the user is generated by collecting the equipment portrait accessed by the user by using the Fingerprintjs.
Preferably, the pre-constructed two-dimensional code of the webpage end includes: creating a two-dimensional code ticket, obtaining a parameter (scene _ id) of the two-dimensional code ticket from the two-dimensional code ticket to a designated url, and obtaining a corresponding two-dimensional code according to the parameter of the two-dimensional code ticket. The scene _ id represents an id of the application program, wherein the application program may be a public number. Further, according to the pre-constructed webpage two-dimensional code, the user directly performs a scanning function to the application program of the mobile terminal through the mobile terminal.
Preferably, the identification binding the identity fingerprint and the application program comprises identification binding the identity fingerprint and an open ID of the application program and identification binding the identity fingerprint and a unique ID of the application program. The open ID indicates that accounts of different applet users in the application are different, and the unique ID indicates that the accounts of all the applet users in the application are the same. And obtaining the identity of the user according to the unique ID and the open ID. Wherein the identifier binding of the open ID comprises: and establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, and performing identification binding of the open ID according to the link. The identification binding of the unique ID comprises: after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
Further, the generating the link of the binding relationship table in the present invention includes: receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
And secondly, when the user accesses the webpage end or the mobile end again, uploading the identity of the user to a pre-constructed log system, recording the behavior log of the user through the log system, and calculating the similarity between the identity and the behavior log of the user according to a similarity algorithm.
In the preferred embodiment of the present invention, the pre-established log system is compiled through Java language. The log system includes: the format of the log is [ identity ], [ specific user behavior log appearing for the first time ] and [ array formed by all the appearing time of the behavior log ]; initializing a character string similarity threshold value in a user behavior log, wherein if the character strings with the similarity greater than a preset threshold value are of the same type, the preset threshold value is 0.8; time intervals for categorizing the user behavior logs are initialized, and similar logs in one time interval are recorded only once.
Preferably, the similarity calculation method in the present invention includes:
Figure BDA0002328965840000091
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
And step three, if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
Alternatively, in other embodiments, the cross-end-user identification program may be further divided into one or more modules, and the one or more modules are stored in the memory 11 and executed by one or more processors (in this embodiment, the processor 12) to implement the present invention.
For example, referring to fig. 3, a schematic diagram of program modules of a cross-end user identification program in an embodiment of the cross-end user identification apparatus of the present invention is shown, in this embodiment, the cross-end user identification program may be divided into an identity obtaining module 10, a similarity calculating module 20, and an identification module 30, which exemplarily:
the identity obtaining module 10 is configured to: the method comprises the steps of obtaining an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a webpage end two-dimensional code which is constructed in advance, and carrying out identification binding on the identity fingerprint and the application program to obtain an identity of the user.
The similarity calculation module 20 is configured to: when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm.
The identification module 30 is configured to: if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The functions or operation steps of the program modules such as the identity obtaining module 10, the similarity calculating module 20, and the identity identifying module 30 when executed are substantially the same as those of the above embodiments, and are not repeated herein.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where a cross-end user identification program is stored on the computer-readable storage medium, where the cross-end user identification program is executable by one or more processors to implement the following operations:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a user mobile end through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
The specific implementation manner of the computer-readable storage medium of the present invention is substantially the same as that of the above-mentioned cross-terminal user identification apparatus and method, and will not be described herein again.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A cross-terminal user identification method, the method comprising:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
2. The cross-terminal user identification method of claim 1, wherein the pre-constructed web page side two-dimensional code comprises:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
3. The cross-end user identification method of claim 1 wherein said identity fingerprint identity binding with the application comprises: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
4. The cross-end-user identification method of claim 3, wherein the generating the link of the binding relationship table comprises:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
5. The cross-end user identification method according to any of claims 1 to 4, wherein the similarity algorithm comprises:
Figure FDA0002328965830000021
wherein X represents the identity of the user, Y represents the behavior log of the user, and XiAn identity representing said ith user, YiLine i in the user's behavior log, n represents the number of users, and you represent the number of lines in the user's behavior log.
6. A cross-end user identification device, the device comprising a memory and a processor, the memory having stored thereon a cross-end user identification program executable on the processor, the cross-end user identification program when executed by the processor implementing the steps of:
acquiring an identity fingerprint generated when a user accesses a webpage end, entering an application program corresponding to a mobile end of the user through a pre-constructed webpage end two-dimensional code, and performing identification binding on the identity fingerprint and the application program to obtain an identity of the user;
when the user accesses the webpage end or the mobile end again, the identity of the user is uploaded to a pre-constructed log system, the behavior log of the user is recorded through the log system, and the similarity between the identity and the behavior log of the user is calculated according to a similarity algorithm;
if the similarity is greater than a preset threshold value, the user identity authentication is successful, and if the similarity is not greater than the preset threshold value, the user identity authentication is failed, so that the cross-terminal identity recognition of the user is completed.
7. The cross-end-user identification device of claim 6, wherein the pre-constructed web-side two-dimensional code comprises:
creating a two-dimensional code ticket, acquiring parameters of the two-dimensional code ticket from the two-dimensional code ticket to a specified url, and acquiring a corresponding two-dimensional code according to the parameters of the two-dimensional code ticket.
8. The cross-end user identification device of claim 6 wherein said identity fingerprint identity binding with the application comprises: carrying out identification binding on the identity fingerprint and the open ID of the application program and carrying out identification binding on the identity fingerprint and the unique ID of the application program;
wherein the identifier binding the identity fingerprint with the open ID of the application program comprises:
establishing a binding relation table of the user open ID and the identity fingerprint of the user in a database, generating a link of the binding relation table, wherein the link comprises a timestamp and a user signature, and carrying out identification binding of the open ID according to the link;
the identifier binding the identity fingerprint with the unique ID of the application program comprises:
after user authorization, calling a getUserInfo ({ }) method to obtain encrypted data, iv, rawData and signature parameter values, decoding the parameter values to obtain a unique ID, and finishing identification binding of the unique ID.
9. The cross-end-user identification apparatus of claim 8 wherein the generating the link to the binding relationship table comprises:
receiving an open ID account of a user, splicing parameter addresses of a binding interface according to the preset identifier of the open ID account into character strings to obtain signature information of the user, and thus completing the generation of the link of the binding relationship table.
10. A computer readable storage medium having a cross-end user identification program stored thereon, the cross-end user identification program being executable by one or more processors to implement the steps of the cross-end user identification method as claimed in any one of claims 1 to 5.
CN201911341917.7A 2019-12-20 2019-12-20 Cross-terminal user identity recognition method and device and computer readable storage medium Pending CN111193729A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911341917.7A CN111193729A (en) 2019-12-20 2019-12-20 Cross-terminal user identity recognition method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911341917.7A CN111193729A (en) 2019-12-20 2019-12-20 Cross-terminal user identity recognition method and device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111193729A true CN111193729A (en) 2020-05-22

Family

ID=70710142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911341917.7A Pending CN111193729A (en) 2019-12-20 2019-12-20 Cross-terminal user identity recognition method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111193729A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723083A (en) * 2020-06-23 2020-09-29 北京思特奇信息技术股份有限公司 User identity identification method and device, electronic equipment and storage medium
CN118394237A (en) * 2024-05-09 2024-07-26 金华广电网络技术有限公司 Touch type regional operation method for display

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130016393A1 (en) * 2011-07-14 2013-01-17 Ricoh Company, Ltd. Apparatus, system, and method of log management, and recording medium storing log management program
US20140207813A1 (en) * 2005-05-31 2014-07-24 FairWarning, Inc. Identity mapping system and method
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN106033579A (en) * 2015-03-16 2016-10-19 北京国双科技有限公司 Data processing method and apparatus thereof
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
CN107707356A (en) * 2017-09-25 2018-02-16 中国科学院信息工程研究所 A kind of mobile device secure binding method and application system based on Quick Response Code identification
CN108768970A (en) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 A kind of binding method of smart machine, identity authentication platform and storage medium
CN109951289A (en) * 2019-01-25 2019-06-28 北京三快在线科技有限公司 A kind of recognition methods, device, equipment and readable storage medium storing program for executing

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140207813A1 (en) * 2005-05-31 2014-07-24 FairWarning, Inc. Identity mapping system and method
US20130016393A1 (en) * 2011-07-14 2013-01-17 Ricoh Company, Ltd. Apparatus, system, and method of log management, and recording medium storing log management program
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN106033579A (en) * 2015-03-16 2016-10-19 北京国双科技有限公司 Data processing method and apparatus thereof
CN106850503A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 One kind is exempted to log in identity identifying method and device
CN107707356A (en) * 2017-09-25 2018-02-16 中国科学院信息工程研究所 A kind of mobile device secure binding method and application system based on Quick Response Code identification
CN108768970A (en) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 A kind of binding method of smart machine, identity authentication platform and storage medium
CN109951289A (en) * 2019-01-25 2019-06-28 北京三快在线科技有限公司 A kind of recognition methods, device, equipment and readable storage medium storing program for executing

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723083A (en) * 2020-06-23 2020-09-29 北京思特奇信息技术股份有限公司 User identity identification method and device, electronic equipment and storage medium
CN111723083B (en) * 2020-06-23 2024-04-05 北京思特奇信息技术股份有限公司 User identity recognition method and device, electronic equipment and storage medium
CN118394237A (en) * 2024-05-09 2024-07-26 金华广电网络技术有限公司 Touch type regional operation method for display

Similar Documents

Publication Publication Date Title
CN110602052B (en) Micro-service processing method and server
CN105610810B (en) Data processing method, client and server
US10063620B2 (en) Information sharing method and system
US20080196096A1 (en) Methods for Extending a Security Token Based Identity System
CN105391674B (en) Information processing method and system, server and client
CN107992759B (en) Apparatus, method and computer readable storage medium for implementing electronic seal
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
JP2015528947A (en) Method and system for secure communication of personal information
CN104796257A (en) Flexible data authentication
CN110266469B (en) Remote online electronic signature method based on WEB script data stream operation
CN110708335A (en) Access authentication method and device and terminal equipment
CN105162604A (en) Feature image identification based verification method and system, and verification server
CN112328486A (en) Interface automation test method and device, computer equipment and storage medium
CN111193729A (en) Cross-terminal user identity recognition method and device and computer readable storage medium
CN107819748B (en) Anti-cracking verification code implementation method and device
CN110750765B (en) Service system, front-end page control method thereof, computer device, and storage medium
CN103001934A (en) Terminal application login method and terminal application login system
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN113810375B (en) Webshell detection method, device and equipment and readable storage medium
CN116723247A (en) Micro-service calling method, device, equipment and storage medium
US8904508B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN117133006A (en) Document verification method and device, computer equipment and storage medium
CN117040804A (en) Network attack detection method, device, equipment, medium and program product for website

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200522