CN114936356A - Identity verification method, device, equipment and computer storage medium - Google Patents

Identity verification method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN114936356A
CN114936356A CN202210631672.7A CN202210631672A CN114936356A CN 114936356 A CN114936356 A CN 114936356A CN 202210631672 A CN202210631672 A CN 202210631672A CN 114936356 A CN114936356 A CN 114936356A
Authority
CN
China
Prior art keywords
user
game
information
verification
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210631672.7A
Other languages
Chinese (zh)
Inventor
郭振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
MIGU Culture Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
MIGU Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, MIGU Culture Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210631672.7A priority Critical patent/CN114936356A/en
Publication of CN114936356A publication Critical patent/CN114936356A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The embodiment of the invention relates to the technical field of verification, and discloses an identity verification method, which comprises the following steps: acquiring user information and verification scene information of a user to be verified; determining a target game segment corresponding to the user to be verified; the difficulty of the target game segment is determined according to the user information and the verification scene information; displaying the target game segment to enable the user to be verified to perform verification operation; and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment. Through the mode, the embodiment of the invention improves the user experience of identity authentication.

Description

Identity verification method, device, equipment and computer storage medium
Technical Field
The embodiment of the invention relates to the technical field of identity authentication, in particular to an identity authentication method, an identity authentication device, identity authentication equipment and a computer storage medium.
Background
At present, authentication includes picture authentication, video authentication, animation authentication and logic authentication. The picture verification is usually a picture verification code, a user inputs the content in the picture verification code for verification, the video verification is usually to play a section of video and perform input verification according to information provided in the video, the animation verification is usually to slide animation and a sliding jigsaw puzzle to verify results or time, and the logic verification is usually to calculate a value or select a picture, a Chinese character and the like for verification according to prompt prompts.
The inventor finds out in the process of implementing the embodiment of the invention that: the user experience of the existing authentication mode is poor.
Disclosure of Invention
In view of the above problems, embodiments of the present invention provide an identity authentication method, which is used to solve the problem in the prior art that user experience of identity authentication is poor.
According to an aspect of an embodiment of the present invention, there is provided an authentication method, including:
acquiring user information and verification scene information of a user to be verified;
determining a target game segment corresponding to the user to be verified; the difficulty of the target game segment is determined according to the user information and the verification scene information;
displaying the target game segment to enable the user to be verified to perform verification operation;
and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment.
In an optional mode, the user information comprises user historical game information and system operation data of a system to be verified currently; the method further comprises the following steps:
determining an initial game segment according to the historical game information of the user and the verification scene information;
and adjusting the game difficulty of the initial game segment according to the system operation data to obtain the target game segment.
In an optional manner, the method further comprises:
matching the verification scene information with scene label information respectively corresponding to a plurality of preset original game segments, and determining selectable game segments according to matching results;
determining historical game preference and/or historical game level of the user to be verified according to the historical game information of the user;
determining the initial game segment from the selectable game segments based on the historical game preferences and/or historical game levels.
In an optional manner, the method further comprises:
acquiring target game data; the target game data comprises game data to be promoted;
analyzing the target game data to obtain a plurality of operable scene elements; the operable scene element is used for game operation of a user;
generating the plurality of original game pieces from the plurality of actionable scene elements.
In an optional manner, the method further comprises:
determining the operation agility of the user to be verified according to the system operation data;
and adjusting the game difficulty according to the operation agility to obtain the target game type.
In an optional manner, the method further comprises:
determining the average operation frequency information and the extreme operation frequency information of the user to be verified according to the system operation data;
and determining the operation agility according to the average operation frequency information and the operation frequency extreme value information.
In an optional manner, the method further comprises:
determining the verification operation level of the user to be verified according to the verification operation data and the historical user operation data corresponding to the target game segment;
and updating the target game segment according to the verification operation level.
According to another aspect of the embodiments of the present invention, there is provided an authentication apparatus, including:
the determining module is used for determining a target game segment corresponding to the user to be verified according to the user information of the user to be verified and the verification scene information;
the display module is used for displaying the target game segment so as to enable the user to be verified to carry out verification operation;
and the verification module is used for performing identity verification on the user to be verified according to the verification operation data of the user to be verified aiming at the target game segment.
According to another aspect of the embodiments of the present invention, there is provided an authentication apparatus, including:
the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to perform the operations of any of the embodiments of the authentication method.
According to a further aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored therein at least one executable instruction for causing an authentication device to perform operations of any one of the following embodiments of the authentication method.
The method and the device for verifying the identity of the user to be verified comprise the steps of determining a target game segment corresponding to the user to be verified according to user information and verification scene information of the user to be verified, displaying the target game segment to enable the user to be verified to carry out verification operation, and carrying out identity verification on the user to be verified according to verification operation data of the user to be verified aiming at the target game segment. According to the embodiment of the invention, the game segment which is most suitable for the user at present can be determined according to the user information and the verification scene information, the identity of the user is verified through the game segment, the verification operation has stronger operability and logicality, and the game contains logic, so that the operation experience of the user can be improved.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart illustrating an authentication method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating an authentication method according to another embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a verification interface in the identity verification method according to the embodiment of the present invention;
fig. 4 is a schematic diagram illustrating a verification interface in an identity verification method according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of an authentication device provided in an embodiment of the present invention;
fig. 6 shows a schematic structural diagram of an authentication device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein.
Fig. 1 shows a flow chart of an authentication method provided by an embodiment of the invention, which is executed by a computer processing device. The computer processing device may include a cell phone, a notebook computer, etc. As shown in fig. 1, the method comprises the steps of:
step 10: and acquiring user information and verification scene information of a user to be verified. .
In an embodiment of the present invention, the user information includes at least one of user identity information, terminal information and historical operation information, where the user identity information may include information such as whether the user has logged in, user gender, user age and user preference tag, and the terminal information includes information of a terminal type used by the user to currently send an authentication request, such as one of pc, android, ios and ipad. The historical operation information may be historical operation information in a game system or other preset systems, and may also be historical operation information in a system to be currently verified. Wherein the preset system may be a system that the user frequently logs in and uses.
The verification scene information may include software scene information such as a system type and safety requirement information of a current system to be verified, and at least one of real scene information such as a current verification time, a current verification location, and a current verification climate. The system type may include a payment system, an office system, a file storage system, or the like, and the security requirement information may include a verification difficulty level, whether to start enhanced authentication, or the like.
Step 20: determining a target game segment corresponding to the user to be verified; the difficulty of the target game segment is determined according to the user information and the verification scene information.
In one embodiment of the invention, an initial game segment is selected from a plurality of preset game segments according to authentication scene information, and then game selection preference and/or game operation level of a user are determined according to game operation information in the user information, so that a game segment suitable for the selection preference and/or operation level of the current user to be authenticated is selected from the initial game segment as a target game segment, and accordingly, the interest degree of the user in trying to play the target game segment is high, and the difficulty of the target game segment is matched with the game level of the user to be authenticated, so that the simplicity or difficulty is avoided, the accuracy of identity authentication is reduced, and the user experience is poor.
In a further embodiment of the present invention, in addition to considering the operation preference and the operation level of the user in the game system, in order to improve the degree of engagement between the target game segment and the average operation level of the user, the agility of the average operation of the user may be determined according to the operation data in the preset system or the current verification system in the user information, and the difficulty of the target game segment is adjusted according to the agility of the average operation.
Therefore, in one embodiment of the present invention, the user information includes user historical game information and system operation data of the system to be verified currently; step 20 further comprises:
step 201: and determining an initial game segment according to the historical game information of the user and the verification scene information.
In an embodiment of the present invention, matching is performed according to the verification scene information and the scene tag information corresponding to each of the preset plurality of original game pieces, and the matched original game piece is determined as the selectable game piece. And determining the historical game operation level and/or the historical game preference of the user according to the historical game information of the user to adjust the selectable game segments, wherein the adjustment can be the adjustment of the game difficulty or the replacement of the game types of the selectable game segments. Wherein, the original game segment can be determined according to the original game pack in the game library to be promoted.
Thus, in a further embodiment of the present invention, step 201 further comprises:
step 2011: and matching the verification scene information with the scene label information respectively corresponding to the plurality of preset original game segments, and determining the optional game segments according to the matching result.
In an embodiment of the present invention, the scene tag information is used to represent a verification scene to which the game piece is applicable, such as a scene type, a verification difficulty, a verification mode, and the like. The original game pieces may be determined according to currently popular game data, game data to be promoted, and the like.
In another embodiment of the present invention, step 2011 further includes:
step 111: acquiring target game data; the target game data includes game data to be promoted.
In an embodiment of the present invention, the target game data is raw materials used for generating the target game segment, and may include currently popular game data and game data to be promoted, where the game data to be promoted may be obtained from a game library to be promoted, and a plurality of games that have marketing promotion requirements are stored in the game library to be promoted.
Step 112: analyzing the target game data to obtain a plurality of operable scene elements; the operable scene element is used for game operation of the user.
In one embodiment of the invention, an actionable scene element refers to an element in a game that can interact with a user to compose a game action for the user. At least one operable scene element exists in one game segment. A plurality of game pieces can be constituted by changing the type, number, and combination of the operable scene elements. The types of the operable scene elements may include a display type, a display priority, an operable number, and the like. One operable scene element can be operated by a user at least once, and the operable times can be correspondingly adjusted according to the game difficulty. For example, when the operable scene element refers to a plurality of fruits appearing in the game and guiding the user to operate the cut-open M times, M is set according to the scene used for verification, for example, M may be increased appropriately in the payment verification scene, and M may be decreased appropriately in the verification scene confirming whether the action is actively triggered by the user.
Analyzing the game data to be promoted to obtain a plurality of game segments, and analyzing the composition elements of the game segments to obtain operable scene elements.
Step 113: generating the plurality of original game pieces from the plurality of actionable scene elements.
In an embodiment of the present invention, when the operable scene elements are combined, different original game pieces can be generated according to game type information from which the operable scene elements are derived, where the game type information includes multiple dimensions, such as difficulty level of an original game, duration of a game piece in which the scene element is located, and scene type of the game piece.
Step 2012: and determining the historical game preference and/or the historical game level of the user to be verified according to the historical game information of the user.
In an embodiment of the present invention, the historical game preferences are used to represent game feature information preferred by the user history, and the preferences of the user for each game played by the user in the history can be determined according to game identifiers, game operation time information, liveness, friend number, payment situations, and the like in the user historical game information. The historical game level is used for representing the performance of the user in the historical game operation, such as ranking among all players and success rate; and determining the historical game level of the user according to the historical battle performance, the game time, the login and registration time and the like in the historical game information of the user.
Step 2013: determining the initial game segment from the selectable game segments based on the historical game preferences and/or historical game levels.
In one embodiment of the invention, the similarity of the selectable game segments and the historical game preference is respectively calculated, and the selectable game segment with the highest similarity is determined as the initial game segment.
In yet another embodiment of the invention, the difficulty information for each of the selectable game pieces and a median of the player's game levels is determined, the median being used to characterize the player's prevailing level for the game, the median and the difficulty information are matched to the user's historical game levels, and the selectable game piece having the closest match between game difficulty and player prevailing level is determined to be the initial game piece.
Step 202: and adjusting the game difficulty of the initial game segment according to the system operation data to obtain the target game segment.
In an embodiment of the present invention, in order to improve the accuracy of the identity verification and prevent an attacker, there is a requirement on the timeliness of the operation of the identity verification in general, that is, the operation needs to be completed within a preset number of operations or an operation duration, that is, the reaction speed of the identity verification performed through a game to a user, that is, the operation agility, is high. Therefore, the level of the user during game operation is combined with the normal operation agility of the non-game to obtain the comprehensive operation level of the user, and the game difficulty of the initial game segment is adjusted according to the comprehensive operation level.
In still another embodiment of the present invention, the operation frequency information of the user may be determined according to the system operation data, and the operation agility of the user may be determined according to the operation frequency information. Specifically, the operation frequency information includes an average value of operation steps of the user and extremum information.
It should be noted that, in another embodiment of the present invention, an original game piece similar to the user's historical preference may also be determined as the initial game piece according to the historical game preferences. The method can also determine the game friend information of the user according to the historical game information of the user, determine the game preference and the historical verification record of the friend of the user according to the game friend information, and determine the initial game segment according to the game preference and the historical verification record of the friend. The history verification record comprises the record of the friend history for identity verification in a game mode, including the verification of game types, verification results and the like.
In one embodiment of the present invention, step 202 further comprises:
step 2021: and determining the operation agility of the user to be verified according to the system operation data.
In one embodiment of the invention, the operation agility is used for reflecting the average reaction speed of the user, and the greater the operation agility, the faster the reaction speed of the user is, and the better the reaction speed is, the better the game is performed in the process of verifying. And counting operation frequency information of the user in a preset time interval according to the system operation data, and determining operation agility according to the average value and extreme value information of the operation frequency information.
Thus, in one embodiment of the present invention, step 2021 further comprises:
step 211: and determining the average operation frequency information and the extreme operation frequency information of the user to be verified according to the system operation data.
In one embodiment of the present invention, the operation frequency can be characterized by the operation step size of the user, i.e. how often the operation is completed. The average operation frequency information includes an average operation step size of the user in the historical time interval. Correspondingly, the extreme operating frequency information comprises the maximum operating step length and/or the minimum operating step length of the user in the historical time interval.
The historical time interval may be a total historical interval, such as from when the user record exists to the present, or may be a time interval within a short time from the present, such as within half an hour, or from the last time the user entered the system to be verified to the present.
Step 212: and determining the operation agility according to the average operation frequency information and the operation frequency extreme value information.
In an embodiment of the present invention, operation frequency data of other users of the system to be verified is further obtained, average and extreme value information of the overall operation frequency of the user of the current system to be verified is determined, and the average and extreme value information of the operation frequency of the user to be verified and the average and extreme value information of the operation frequency of the overall user are compared to obtain the deviation degree of the operation frequency of the user to be verified relative to the overall user as the operation agility of the user to be verified.
Specifically, the first coefficient Sv is determined as follows from the average operation frequency information:
Sv=Cvo/Hvo;
the Sv is used for reflecting the deviation degree of the average operation frequency of the user to be verified relative to other users; cvo is the average step size of the operation of the user to be verified in the historical time interval in the system to be verified, and Hvo is the average step size of the operation of other users in the historical time interval in the system to be verified.
Determining Svs the second coefficient according to the extreme operating frequency information is as follows:
Svs=Clo/Hlo;
svs, used for reflecting the deviation degree of the operation frequency extreme value of the user to be verified relative to other users; clo is the minimum operation step size of the user to be verified in the historical time interval of the system to be verified, and Hlo is the minimum operation step size of other users in the historical time interval of the system to be verified.
In one embodiment of the present invention, either one of the first coefficient and the second coefficient may be determined as the operation agility of the user, or the first coefficient and the second coefficient may be subjected to weighted summation to obtain the operation agility.
Step 2022: and adjusting the game difficulty according to the operation agility to obtain the target game type.
In one embodiment of the invention, the operation agility is compared with a preset threshold, when the operation agility is greater than the preset threshold, the game difficulty is increased, and when the operation agility is less than the preset threshold, the game difficulty is reduced. In particular, considering that the speed of the operation frequency of the user generally does not differ too much from that of other users, the value of normal Sv is around 1, and the value of normal Svs should be greater than 1.
Therefore, in one embodiment of the present invention, a game with a greater difficulty factor is pushed if Svs < ═ 1 and/or Sv < ═ 1. Wherein, the greater difficulty coefficient can be obtained by increasing Math.ceil (2/(Svs + Sv))% 11 on the normal difficulty coefficient. Ceil is rounded up, and the remainder 11 is to ensure that the calculation result is within 0-20.
Step 30: and displaying the target game segment so as to enable the user to be verified to perform verification operation.
In one embodiment of the invention, in order to improve the user experience, a part of the target game segment may be displayed for the user to try to play, and whether to display the full amount of the target game segment or to change the verification mode is determined according to the feedback of the user. When the target game segment is displayed, prompt information such as 'please start the game to perform identity verification' and a game operation mode of the target game segment can be displayed to prompt the user to perform identity verification through a mode of finishing the game.
Step 40: and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment.
In one embodiment of the invention, the user is authenticated according to the authentication operation data and the authentication logic corresponding to the target game segment. If the target game segment is a shooting game, comparing the number of the objects hit by the user, the time interval, the hit rate and the verification threshold value of the corresponding dimension specified in the verification logic to obtain whether the user passes the verification.
It should be noted that, in order to improve the accuracy of the identity verification, the target game segment may be updated in real time according to the operation condition of the user in the process of operating the target game segment, because the user may not perform the identity verification through the game before, the game may not perform well or malfunction due to the fact that the user does not adapt to the verification experience. The operation success rate of the user, the real-time operation frequency and the like can be considered during updating.
Thus, in one embodiment of the present invention, step 40 further comprises:
step 401: and determining the verification operation level of the user to be verified according to the verification operation data and the historical user operation data corresponding to the target game segment.
In one embodiment of the present invention, similarly to the determination of the operation agility in the foregoing step, a degree of deviation of the user to be authenticated with respect to the whole of the other users may be determined from the authentication operation data and the historical user operation data, and the authentication operation level is reflected by the degree of deviation.
Specifically, the historical user operation data corresponding to the target game segment may include historical operation data of the user to be verified, and when the current user to be verified operates the target game segment for the first time, the historical user operation data may further include operation data of all users of the target game segment.
And respectively determining the current operation frequency information of the user according to the verification operation data, and determining historical operation frequency information according to the historical user operation data, wherein the operation frequency information can comprise average operation frequency information and operation frequency extreme value information.
In one embodiment of the invention, a first degree of change of the average operation frequency of the user and/or a second degree of change of the extreme value of the operation frequency are respectively determined according to the user, and the operation agility of the user is determined according to the first degree of change and/or the second degree of change.
Specifically, the first degree of change Yv is determined from the average operation frequency information as follows:
Yv=Cvoy/Hvoy
and Cvoy is the average step length of the current game operation, and Hvoy is the average step length of the current game to be verified, which is inquired from the game system. Alternatively, Hvoy may also be the average step size of the game play for all users in the game system.
Determining Yvs the second degree of change based on the operating frequency extremum information is as follows:
Yvs=Cloy/Hloy
wherein, Cloy is the minimum step length of the current game operation, and Hloy is the minimum step length of the game played inquired from the game system. Alternatively, Hvoy may also be the average step size of the game play for all users in the game system.
Step 402: and updating the target game segment according to the verification operation level.
In yet another embodiment of the present invention, it is contemplated that the normal Yvs value should be greater than 1. The value of normal Yv should be greater than 1.
Therefore, when Yvs < ═ 1, the authentication method is switched to another existing authentication method. If Yv < 1, the verification time length is lengthened, and the game difficulty coefficient is increased.
The added difficulty factors are: current difficulty coefficient + Math. ceil (1/Yv)% 11
Ceil is rounded up, and the remainder 11 is to ensure that the calculation result is within 0-10.
In a further embodiment of the present invention, after the identity authentication is passed, in addition to displaying the operation interface of the system to be authenticated, a game system entry corresponding to the target game segment may be displayed, wherein the user may enter the game interface or the game download interface after selecting the game entry. And when the identity authentication fails, the game interface can be continuously displayed or the switching of the authentication mode is prompted.
In yet another embodiment of the present invention, the process of identity verification can also be as shown in fig. 2:
the first stage is as follows: generating a game segment:
step 1.1: the game server generates different game segments and game segment description information according to multiple dimensions such as the number of operable elements in the game, game difficulty, game segment duration, game segment scene types and the like.
For example, original game package a, generated game segments a1, a2, a3.; original game package B, generated game pieces B1, B2, b3.. At least M (M is an integer greater than 2) actionable scene elements are included in the game segment. Wherein, the operable scene element refers to an element in the game for interacting with the user to complete the game, such as a game of cutting fruits, and the operable scene element refers to a plurality of fruits appearing in the game and guiding the user to operate the cutting M times. The number of scene elements in the game segment may be different depending on the scene in which the verification is used (identified by the scene factor), for example, M may be appropriately larger in a payment verification scene, and M may be appropriately smaller in a verification scene for confirming whether the action is actively triggered by the user.
Optionally, the difficulty level of the verification requirement can be adjusted according to the scene factor. The operable scene elements can be graded according to the difficulty level of the operation, and the operable elements of different levels can be distributed with different verification factors. In the generation of the game segments, different game segments may be classified into different game segment difficulty levels according to the number of operable scene elements included therein and the ranking of the operable scene elements. For example, the game segment a1 corresponds to a game segment difficulty level 1 (high difficulty level), the game segment a2 corresponds to a game segment difficulty level 2 (medium difficulty level), and so on. .
The number of operational scene elements provided by different scene factors may be different, and the verification requirements may be different.
The service server can adjust the verification factor of the verification according to the historical operation record of the user, historical verification data and user information inquired from the system or the game server.
Step 1.2: the game server synchronizes the generated game segment and the related information of the game segment to the service server at regular time, and the service server can maintain a game segment and related information by itself. The service server can also acquire the latest game segment information from the game server in real time when needed.
In specific implementation, the game server may generate game pieces according to the parameters shown in table 1 and provide the game pieces and the following parameter information to the service server:
Figure BDA0003680249460000121
Figure BDA0003680249460000131
TABLE 1
And a second stage: selecting an appropriate game piece for a user
And 2.1, the user enters into an authentication link in different scenes, such as login authentication, payment authentication, false touch authentication and the like.
For example, an interface corresponding to login authentication is shown in fig. 3, and an interface corresponding to operation authentication is shown in fig. 4. The current verification animation is shown in fig. 3, and the prompt message "verify completion by watermelon cutting" is shown in fig. 4.
And 2.2, synchronizing scene information of the verification position, such as terminal information, user information, special requirement information and the like, to the service server by the terminal to obtain a proper verification game segment. The terminal may also acquire a game segment preset in advance.
For example, the terminal requests the service server to authenticate the game piece at the time of authentication, wherein the parameters provided to the service server are as shown in table 2:
Figure BDA0003680249460000141
TABLE 2
In addition, the authentication request sent by the terminal to the service server may also carry information related to the authentication scenario, and the service server may perform the determination of the authentication scenario according to the information, for example, the current authentication is used for user payment authentication, or the current authentication is used for user system login authentication, or the current authentication is used for verifying whether the user is actively operating.
And 2.3, the service server selects the game segment according to the verification request.
During selection, user segments with different difficulty levels can be selected according to different verification scenes. If the service server determines that the current verification scene is user payment verification, the service server selects the game segment with higher difficulty level as the game segment used for verification and sends the game segment to the user equipment.
The specific selection process is as follows: and the business server calculates a proper game segment according to the received request information and by combining the operation record information of the user in the current system, the record information inquired from the game server and other information, and pushes the game segment and related information to the terminal system.
The users are divided into two types, namely tourists who do not log in and system users who log in. For the tourist user, because the tourist user cannot obtain enough user information, the pushing of the game segments is pushed according to the description, and the verification of the game operation behavior of the user is judged according to the description information.
For the judgment of the verification behavior of the login user, the user information of the game end is needed, such as whether the user is a game user, if so, what the current level of the user is, what the operation frequency and the limit duration of the user are, the operation preference of the user, and the like. In addition, it also requires the user to calculate the previous operation statistics of the current system, such as the average step size of the operation steps in the current end, and the minimum step size of the operation.
For example,
1) calculating the current system operation coefficient Sv ═ Cvo/Hvo
Where Cvo is the current average step size of the system operation, and Hvo is the current average step size of the system operation history.
The value of normal Sv is around 1.
2) Calculating current system operation extremum coefficient Svs ═ Clo/Hlo
Where Clo is the current minimum step size for operation within the system and Hlo is the current minimum step size for historical operation of the system.
The normal Svs value should be greater than 1.
3) If Svs | | | Sv | | | 1, a game with a larger difficulty factor is pushed.
Among these, the greater difficulty factor is + Math. ceil (2/(Svs + Sv))% 11 above the normal difficulty factor.
Other, pushing game pieces of normal difficulty factor
For the normal difficulty coefficient, the service server may automatically determine according to the terminal type, the scene tag, and the user information, for example, the parameters related to the pushed game information are shown in table 3:
Figure BDA0003680249460000151
Figure BDA0003680249460000161
TABLE 3
Step 2.4: the service server sends a game request message carrying an original game identifier to the game server, the game server judges whether a corresponding game is stored according to the original game identifier, if not, the game server can download in advance at a game manufacturer server corresponding to the game, and therefore the time for a user to acquire the game is reduced.
Step 2.5: the service server sends the game piece to the user equipment.
And a third stage: security verification based on user's game play
After the second stage is executed, the terminal displays the game segment, at this time, the user can perform game operation according to the understood operation logic or the prompted operation logic, and the terminal synchronizes game operation information (such as real-time operation data, stage operation results, or final verification results) to the service end.
In the third phase, the service server can carry out verification according to the game operation information synchronized by the terminal.
During verification, the service server can directly obtain verification data sent by the terminal to perform verification by itself, and can also obtain a verification result from the game server.
Take the example that the terminal synchronizes the user operation result (verification result) to the service server:
3.1: the service server directly obtains the verification data sent by the terminal
For example, playing watermelon and shooting games, each time the terminal is operated, the operation result is synchronized to the service server in real time, and the service server determines whether the verification is passed (for example, the score is more than 50 points continuously twice) through the parameters shown in table 4.
Figure BDA0003680249460000162
Figure BDA0003680249460000171
TABLE 4
3.2: the service server obtains the verification result from the game server
For example, the terminal synchronizes the user operation result to the game server, and the service server acquires the verification result information through the callback interface. For example, when a watermelon is played and a shooting game is played, the front end acquires an operation result every time, the real-time operation result is synchronized to the rear end of the game, and the service server acquires verification information from the callback interface at regular time or irregular time after pushing the verification game segment. The service server directly obtains a verification result from the game server, where the verification result includes: pass verification, fail verification, in verification, no operation.
In addition, in the verification process, the game difficulty can be dynamically adjusted or the verification method can be prompted to be switched by combining the game information sent by the terminal.
For example, 1) real-time computing the game operation extremum coefficient Yvs ═ Cloy/Hloy
Wherein, Cloy is the minimum step length of the current game operation, and Hloy is the minimum step length of the game played inquired from the game system.
The normal Yvs value should be greater than 1.
2) Calculating game operation coefficient Yv ═ Cvoy/Hvoy in real time
Where Cvoy is the current average step size of the game operation, and Hvoy is the average step size of the game played queried from the game system.
The value of normal Yv should be greater than 1.
3) If Yvs < > is 1, switch to other existing verifications.
If Yv < 1, the verification time length is lengthened, and the game difficulty coefficient is increased.
The added difficulty factors are: current difficulty coefficient + Math. ceil (1/Yv)% 11
In addition, the verification completion comprises verification passing, and a system operation interface and a game entrance are displayed (optional); if the verification fails, the terminal continues to display a game interface or prompts to switch verification modes and the like; and other prompt messages. The user selects a game entry, enters a game interface or a game downloading interface and the like.
The method and the device for verifying the identity of the user to be verified comprise the steps of determining a target game segment corresponding to the user to be verified according to user information and verification scene information of the user to be verified, displaying the target game segment to enable the user to be verified to carry out verification operation, and carrying out identity verification on the user to be verified according to verification operation data of the user to be verified aiming at the target game segment. According to the embodiment of the invention, the game segment which is most suitable for the user at present can be determined according to the user information and the verification scene information, the identity of the user is verified through the game segment, the verification operation has stronger operability and logicality, and the game contains logic, so that the operation experience of the user can be improved.
Fig. 5 is a schematic structural diagram illustrating an authentication apparatus according to an embodiment of the present invention. As shown in fig. 5, the apparatus 50 includes: a determination module 501, a presentation module 502, and a verification module 503.
The determining module 501 is configured to determine, according to user information of a user to be verified and verification scene information, a target game segment corresponding to the user to be verified;
a display module 502, configured to display the target game segment so that the user to be authenticated performs an authentication operation;
the verification module 503 is configured to perform identity verification on the user to be verified according to the verification operation data of the user to be verified for the target game segment.
The operation process executed by the identity authentication device provided by the embodiment of the invention is substantially the same as that of the method embodiment, and is not described again.
The identity authentication device provided by the embodiment of the invention determines the target game segment corresponding to the user to be authenticated according to the user information and the authentication scene information of the user to be authenticated, displays the target game segment to enable the user to be authenticated to carry out authentication operation, and carries out identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment. According to the embodiment of the invention, the game segment which is most suitable for the user at present can be determined according to the user information and the verification scene information, the identity of the user is verified through the game segment, the verification operation has stronger operability and logicality, and the game contains logic, so that the operation experience of the user can be improved.
Fig. 6 is a schematic structural diagram of an authentication device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the authentication device.
As shown in fig. 6, the authentication apparatus may include: a processor (processor)602, a communication Interface 604, a memory 606, and a communication bus 608.
Wherein: the processor 602, communication interface 604, and memory 606 communicate with one another via a communication bus 608. A communication interface 604 for communicating with network elements of other devices, such as clients or other servers. The processor 602 is configured to execute the program 610, and may specifically perform the relevant steps in the embodiment of the identity authentication method described above.
In particular, program 610 may include program code comprising computer-executable instructions.
The processor 602 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The identity authentication device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 606 for storing a program 610. Memory 606 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 610 may specifically be invoked by the processor 602 to cause the authentication device to perform the following operations:
determining a target game segment corresponding to a user to be verified according to the user information of the user to be verified and verification scene information;
displaying the target game segment to enable the user to be verified to perform verification operation;
and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment.
The operation process executed by the identity authentication device provided by the embodiment of the present invention is substantially the same as that of the foregoing method embodiment, and is not described again.
The identity authentication device provided by the embodiment of the invention determines the target game segment corresponding to the user to be authenticated according to the user information and the authentication scene information of the user to be authenticated, displays the target game segment to enable the user to be authenticated to carry out authentication operation, and carries out identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment. According to the embodiment of the invention, the game segment which is most suitable for the user at present can be determined according to the user information and the verification scene information, and the identity of the user is verified through the game segment, because the verification operation has stronger operability and logicality, and the game contains the logicality, the operation experience of the user can also be improved, so that the game is applied to the verification field, on one hand, the verification is converted into the game experience, the operability of the identity verification can be improved, and more excellent operation experience is brought to the user, on the other hand, the optional initial game segment is determined according to the game data to be popularized, the user can be prompted to try to play the game in the hiding, and the conversion rate of game popularization is improved.
An embodiment of the present invention provides a computer-readable storage medium, where the storage medium stores at least one executable instruction, and when the executable instruction is executed on an identity verification apparatus, the identity verification apparatus is caused to execute an identity verification method in any method embodiment described above.
The executable instructions may be specifically configured to cause the authentication device to perform the following operations:
determining a target game segment corresponding to a user to be verified according to the user information of the user to be verified and verification scene information;
displaying the target game segment to enable the user to be verified to perform verification operation;
and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment.
The operation process executed by the executable instructions stored in the computer storage medium provided by the embodiment of the present invention is substantially the same as that of the method embodiment, and is not described again.
The executable instruction stored in the computer storage medium provided by the embodiment of the invention determines the target game segment corresponding to the user to be verified according to the user information of the user to be verified and the verification scene information, displays the target game segment to enable the user to be verified to carry out verification operation, and carries out identity verification on the user to be verified according to the verification operation data of the user to be verified aiming at the target game segment. According to the embodiment of the invention, the game segment which is most suitable for the user at present can be determined according to the user information and the verification scene information, the identity of the user is verified through the game segment, the verification operation has stronger operability and logicality, and the game contains logic, so that the operation experience of the user can be improved.
The embodiment of the invention provides an identity authentication device, which is used for executing the identity authentication method.
Embodiments of the present invention provide a computer program that can be invoked by a processor to enable an authentication apparatus to perform an authentication method in any of the above method embodiments.
Embodiments of the present invention provide a computer program product comprising a computer program stored on a computer-readable storage medium, the computer program comprising program instructions which, when run on a computer, cause the computer to perform the method of authentication in any of the above-described method embodiments.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1. An identity verification method, the method comprising:
acquiring user information and verification scene information of a user to be verified;
determining a target game segment corresponding to the user to be verified; the difficulty of the target game segment is determined according to the user information and the verification scene information;
displaying the target game segment to enable the user to be verified to perform verification operation;
and performing identity authentication on the user to be authenticated according to the authentication operation data of the user to be authenticated aiming at the target game segment.
2. The method of claim 1, wherein the user information comprises user historical game information and system operation data of a system currently to be verified; the determining the target game segment corresponding to the user to be verified includes:
determining an initial game segment according to the historical game information of the user and the verification scene information;
and adjusting the game difficulty of the initial game segment according to the system operation data to obtain the target game segment.
3. The method of claim 2, wherein determining an initial game segment based on the user historical game information and the verification scenario information comprises:
matching the verification scene information with scene label information respectively corresponding to a plurality of preset original game segments, and determining selectable game segments according to matching results;
determining historical game preference and/or historical game level of the user to be verified according to the historical game information of the user;
determining the initial game segment from the selectable game segments based on the historical game preferences and/or historical game levels.
4. The method according to claim 3, wherein before obtaining the optional game segments by matching the verified scene information with the scene feature information corresponding to the plurality of original game segments, the method comprises:
acquiring target game data; the target game data comprises game data to be promoted;
analyzing the target game data to obtain a plurality of operable scene elements; the operable scene element is used for game operation of a user;
generating the plurality of original game pieces from the plurality of actionable scene elements.
5. The method of claim 2, wherein said adjusting the game difficulty of the initial game piece based on the system operation data comprises:
determining the operation agility of the user to be verified according to the system operation data;
and adjusting the game difficulty according to the operation agility to obtain the target game type.
6. The method of claim 5, wherein the determining the operation agility of the user to be verified according to the system operation data comprises:
determining the average operation frequency information and the extreme operation frequency information of the user to be verified according to the system operation data;
and determining the operation agility according to the average operation frequency information and the operation frequency extreme value information.
7. The method according to claim 1, wherein the authenticating the user to be authenticated according to the authentication operation data of the user to be authenticated for the target game segment comprises:
determining the verification operation level of the user to be verified according to the verification operation data and the historical user operation data corresponding to the target game segment;
and updating the target game segment according to the verification operation level.
8. An authentication apparatus, the apparatus comprising:
the acquisition module is used for determining a target game segment corresponding to the user to be verified according to the user information of the user to be verified and the verification scene information;
the determining module is used for determining the target game segment corresponding to the user to be verified; the difficulty of the target game segment is determined according to the user information and the verification scene information;
the display module is used for displaying the target game segment so as to enable the user to be verified to carry out verification operation;
and the verification module is used for verifying the identity of the user to be verified according to the verification operation data of the user to be verified aiming at the target game segment.
9. An authentication apparatus, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to perform the operations of the authentication method according to any one of claims 1-7.
10. A computer-readable storage medium having stored therein at least one executable instruction which, when run on an authentication device, causes the authentication device to perform the operations of the authentication method of any one of claims 1-7.
CN202210631672.7A 2022-06-06 2022-06-06 Identity verification method, device, equipment and computer storage medium Pending CN114936356A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210631672.7A CN114936356A (en) 2022-06-06 2022-06-06 Identity verification method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210631672.7A CN114936356A (en) 2022-06-06 2022-06-06 Identity verification method, device, equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN114936356A true CN114936356A (en) 2022-08-23

Family

ID=82867187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210631672.7A Pending CN114936356A (en) 2022-06-06 2022-06-06 Identity verification method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN114936356A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115994752A (en) * 2023-03-23 2023-04-21 天津奇立软件技术有限公司 Recovery verification method and system for electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115994752A (en) * 2023-03-23 2023-04-21 天津奇立软件技术有限公司 Recovery verification method and system for electronic equipment
CN115994752B (en) * 2023-03-23 2023-06-30 天津奇立软件技术有限公司 Recovery verification method and system for electronic equipment

Similar Documents

Publication Publication Date Title
US11318390B2 (en) Systems and methods for hardware-based matchmaking
US20220355204A1 (en) Game data processing method and apparatus, computer, and readable storage medium
EP3856375B1 (en) Implementing a graphical overlay for a streaming game based on current game scenario
US20210038993A1 (en) Information processing program, information processing server, information processing method, and information processing system
CN112755521A (en) System and method for providing time-shifted intelligent synchronized gaming video
US10821364B2 (en) Enhanced item discovery and delivery for electronic video game systems
KR101629378B1 (en) Apparstus and method of providing replay movie in massively multiplayer online role playing game
US11882336B2 (en) Method and system for interaction in live streaming
CN114728205A (en) Server-based personal gaming time estimation of gaming activities
CN114936356A (en) Identity verification method, device, equipment and computer storage medium
US11504618B2 (en) Server-based video help in a video game
KR102530298B1 (en) Malicious game detection
US11771984B2 (en) Variable latency compensation for asynchronous multiplayer games
KR101540461B1 (en) Simulation method and system using senario
CN117065361A (en) Matching method, device, equipment and storage medium in game
CN115337637A (en) Interactive control method and device for game and electronic equipment
KR101540460B1 (en) Simulation method and system for real-time broadcasting
CN117891348A (en) Interactive control method, device, equipment and storage medium
CN110612519A (en) Data generating device and application software operating device
KR20170060889A (en) Device and method to control user object and non-user object
CN105141592A (en) Combination verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination