TWI788662B - Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium - Google Patents

Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium Download PDF

Info

Publication number
TWI788662B
TWI788662B TW109114889A TW109114889A TWI788662B TW I788662 B TWI788662 B TW I788662B TW 109114889 A TW109114889 A TW 109114889A TW 109114889 A TW109114889 A TW 109114889A TW I788662 B TWI788662 B TW I788662B
Authority
TW
Taiwan
Prior art keywords
target user
user
behavior data
security authentication
multiple sets
Prior art date
Application number
TW109114889A
Other languages
Chinese (zh)
Other versions
TW202117568A (en
Inventor
劉磊
Original Assignee
大陸商支付寶(杭州)信息技術有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大陸商支付寶(杭州)信息技術有限公司 filed Critical 大陸商支付寶(杭州)信息技術有限公司
Publication of TW202117568A publication Critical patent/TW202117568A/en
Application granted granted Critical
Publication of TWI788662B publication Critical patent/TWI788662B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Abstract

本說明書實施例公開了一種安全認證以及安全認證模型的訓練方法、裝置及電子設備,該方法包括:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述目標用戶的行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果;其中,所述安全認證模型為基於所述目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。 The embodiment of this specification discloses a security authentication and security authentication model training method, device, and electronic equipment. The method includes: responding to the target user's security authentication request, acquiring the target user's user behavior within a preset time period data; obtain the target user's behavior feature sequence based on the user behavior profile; input the target user's behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence; wherein, the security The authentication model is trained based on multiple sets of behavior feature sequences of the target user in the historical time period.

Description

安全認證方法、訓練安全認證模型的方法、安全認證裝置、安全認證模型的訓練裝置、電子設備及電腦可讀儲存媒體 Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium

本說明書涉及電腦軟體技術領域,尤其涉及一種安全認證以及訓練安全認證模型的方法、裝置及電子設備。 This specification relates to the technical field of computer software, in particular to a method, device and electronic equipment for security authentication and training a security authentication model.

目前的終端設備主要採用靜態的安全認證方式,例如指紋認證、面部認證、密碼認證等。這種方式下,靜態的認證資訊需要儲存至電腦內部儲存器,並藉由網路傳輸,因此存在被木馬程式或監聽設備截獲的風險。此外,這種方式還要求用戶配合操作,比如指紋認證需要用戶的手指保持乾燥清潔,面部認證需要特定角度,密碼認證需要用戶輸入密碼資訊。顯然,這些安全認證方式對於用戶來講,還不夠便捷,在一定程度上影響了用戶的使用體驗。 Current terminal devices mainly adopt static security authentication methods, such as fingerprint authentication, face authentication, password authentication, and the like. In this way, static authentication information needs to be stored in the internal storage of the computer and transmitted over the network, so there is a risk of being intercepted by Trojan horse programs or monitoring devices. In addition, this method also requires the user to cooperate with the operation. For example, fingerprint authentication requires the user's fingers to be kept dry and clean, face authentication requires a specific angle, and password authentication requires the user to enter password information. Obviously, these security authentication methods are not convenient enough for users, which affects the user experience to a certain extent.

有鑑於此,當期亟需一種對用戶更加友好且更便捷的安全認證方式。 In view of this, there is an urgent need for a more user-friendly and convenient security authentication method.

本說明書實施例的目的是提供一種安全認證以及訓練 安全認證模型的方法、裝置及電子設備,能夠為用戶提供更加友好且更加便捷的安全認證方式。 The purpose of the embodiment of this description is to provide a security certification and training The method, device and electronic equipment of the security authentication model can provide users with a more friendly and convenient security authentication method.

為解決上述技術問題,本說明書實施例是這樣實現的: In order to solve the above-mentioned technical problems, the embodiments of this specification are implemented as follows:

第一方面,提出了一種安全認證方法,該方法包括:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述目標用戶的行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果;其中,所述安全認證模型為基於所述目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。 In the first aspect, a security authentication method is proposed, the method includes: in response to a security authentication request for the target user, obtaining user behavior data of the target user within a preset time period; obtaining the user behavior data based on the user behavior data The behavior characteristic sequence of the target user; input the behavior characteristic sequence of the target user into the security authentication model to obtain the security authentication result corresponding to the behavior characteristic sequence; wherein, the security authentication model is based on the historical time of the target user It is obtained by training multiple sets of behavioral feature sequences in the segment.

第二方面,提出了一種訓練安全認證模型的方法,包括:獲取目標用戶在歷史時間段內的多組用戶行為資料;基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列;基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 In the second aspect, a method for training a security authentication model is proposed, including: obtaining multiple sets of user behavior data of the target user within the historical time period; based on the multiple sets of user behavior data of the target user within the historical time period, Acquiring multiple sets of behavioral feature sequences of the target user; training a security authentication model of the target user based on the multiple sets of behavioral feature sequences of the target user.

第三方面,提出了一種安全認證裝置,包括:資料獲取單元,響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;序列獲取單元,基於所述用戶行為資料獲取所述目標 用戶的行為特徵序列;安全認證單元,將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 In the third aspect, a security authentication device is proposed, including: a data acquisition unit, which acquires user behavior data of the target user within a preset time period in response to a security authentication request for the target user; a sequence acquisition unit, based on the User Behavior Data Acquisition Said Goals A user's behavioral feature sequence; a security authentication unit that inputs the behavioral feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavioral feature sequence.

第四方面,提出了一種安全認證模型的訓練裝置,包括:資料獲取單元,獲取目標用戶在歷史時間段內的多組用戶行為資料;序列獲取單元,基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列;模型訓練單元,基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 In the fourth aspect, a safety authentication model training device is proposed, including: a data acquisition unit, which acquires multiple groups of user behavior data of a target user in a historical time period; a sequence acquisition unit, based on the target user's historical time period multiple sets of user behavior data in the target user to obtain multiple sets of behavioral feature sequences of the target user; the model training unit is based on the multiple sets of behavioral feature sequences of the target user to train and obtain the security authentication model of the target user.

第五方面,提出了一種電子設備,該電子設備包括:處理器;以及被安排成儲存電腦可執行指令的儲存器,所述可執行指令在被執行時使所述處理器執行以下操作:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 In a fifth aspect, an electronic device is provided, the electronic device includes: a processor; and a memory arranged to store computer-executable instructions, the executable instructions cause the processor to perform the following operations when executed: responding Based on the security authentication request for the target user, obtain the user behavior data of the target user within a preset time period; obtain the behavior characteristic sequence of the target user based on the user behavior data; input the behavior characteristic sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence.

第六方面,提出了一種電腦可讀儲存媒體,所述電腦可讀儲存媒體儲存一個或多個程式,所述一個或多個程式 當被包括多個應用程式的電子設備執行時,使得所述電子設備執行以下操作:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 In the sixth aspect, a computer-readable storage medium is proposed, the computer-readable storage medium stores one or more programs, and the one or more programs When executed by an electronic device including a plurality of application programs, the electronic device is made to perform the following operations: in response to a security authentication request for the target user, obtain user behavior data of the target user within a preset time period; based on the Obtaining the behavior feature sequence of the target user from the user behavior data; inputting the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence.

第七方面,提出了一種電子設備,該電子設備包括:處理器;以及被安排成儲存電腦可執行指令的儲存器,所述可執行指令在被執行時使所述處理器執行以下操作:獲取目標用戶在歷史時間段內的多組用戶行為資料;基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列;基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 In a seventh aspect, an electronic device is provided, the electronic device includes: a processor; and a memory arranged to store computer-executable instructions, the executable instructions cause the processor to perform the following operations when executed: acquire multiple sets of user behavior data of the target user within the historical time period; based on the multiple sets of user behavior data of the target user within the historical time period, obtaining multiple sets of behavioral feature sequences of the target user; based on the target user Multiple sets of behavioral feature sequences are trained to obtain the security authentication model of the target user.

第八方面,提出了一種電腦可讀儲存媒體,所述電腦可讀儲存媒體儲存一個或多個程式,所述一個或多個程式當被包括多個應用程式的電子設備執行時,使得所述電子設備執行以下操作:獲取目標用戶在歷史時間段內的多組用戶行為資料;基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列; 基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 In an eighth aspect, a computer-readable storage medium is proposed, the computer-readable storage medium stores one or more programs, and when the one or more programs are executed by an electronic device including a plurality of application programs, the The electronic device performs the following operations: acquire multiple sets of user behavior data of the target user within the historical time period; acquire multiple sets of behavioral characteristics of the target user based on the multiple sets of user behavior data of the target user within the historical time period sequence; Based on multiple sets of behavior feature sequences of the target user, a security authentication model of the target user is obtained through training.

由以上本說明書實施例提供的技術方案可見,本說明書實施例方案至少具備如下一種技術效果:本說明書提供的一種或多個實施例,在對用戶進行安全認證時,能夠響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,再基於用戶行為資料獲取目標用戶的行為特徵序列,最後將目標用戶的行為特徵序列輸入到安全認證模型,得到該行為特徵序列對應的安全認證結果,其中安全認證模型為基於目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。這樣在用戶進行安全認證時,由於獲取的是用戶預設時間段內的動態特徵序列,因此不再需要用戶進行過多的刻意配合就能實現安全認證,為用戶提供更加友好且便捷的安全認證方式。 From the above technical solutions provided by the embodiments of this specification, it can be seen that the solutions of the embodiments of this specification have at least one of the following technical effects: one or more embodiments provided by this specification can respond to the target user’s Security authentication request, obtain the user behavior data of the target user within the preset time period, and then obtain the behavior characteristic sequence of the target user based on the user behavior data, and finally input the behavior characteristic sequence of the target user into the security authentication model to obtain the behavior characteristic sequence The corresponding security authentication results, wherein the security authentication model is trained based on multiple sets of behavior feature sequences of the target user in the historical time period. In this way, when the user performs security authentication, since the dynamic feature sequence within the user's preset time period is obtained, the security authentication can be realized without too much deliberate cooperation from the user, and a more friendly and convenient security authentication method is provided for the user. .

S102~S106:步驟 S102~S106: Steps

S502~S506:步驟 S502~S506: steps

600:安全認證裝置 600: safety authentication device

610:資料獲取單元 610: data acquisition unit

620:序列獲取單元 620: sequence acquisition unit

630:安全認證單元 630: Security authentication unit

700:安全認證模型的訓練裝置 700: Training device for secure authentication model

710:資料獲取單元 710: data acquisition unit

720:序列獲取單元 720: sequence acquisition unit

730:模型訓練單元 730: Model training unit

為了更清楚地說明本說明書實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本說明書中記載的一些實施例,對於本領域具有通常知識者來講,在不付出創造性勞動性的前提下,還可以根據這些圖式獲得其他的圖式。 In order to more clearly illustrate the technical solutions in the embodiments of this specification or the prior art, the drawings that need to be used in the description of the embodiments or the prior art will be briefly introduced below. Obviously, the drawings in the following description are only For some embodiments described in the description, for those skilled in the art, other drawings can also be obtained based on these drawings without any creative effort.

[圖1]是本說明書的一個實施例提供的一種安全認證 方法的方法流程圖。 [Figure 1] is a security authentication provided by an embodiment of this manual Method flow diagram of the method.

[圖2]是本說明書的一個實施例提供的安全認證方法應用於實際場景中的交互流程圖。 [Fig. 2] is an interactive flowchart of the application of the security authentication method provided by an embodiment of this specification in an actual scenario.

[圖3]是本說明書的一個實施例提供的採集動作軌跡特徵序列的示意圖。 [ Fig. 3 ] is a schematic diagram of a feature sequence of an action trajectory collected according to an embodiment of the present specification.

[圖4]是本說明書的一個實施例提供的安全認證方法中獲取用戶在預設時間段內的行為習慣的概率示意圖。 [ Fig. 4 ] is a schematic diagram of the probability of obtaining the user's behavior habits within a preset time period in the security authentication method provided by an embodiment of this specification.

[圖5]是本說明書的一個實施例提供的一種安全認證模型的訓練方法的實現流程示意圖。 [ Fig. 5 ] is a schematic diagram of the implementation flow of a training method for a security authentication model provided by an embodiment of this specification.

[圖6]是本說明書的一個實施例提供的一種安全認證裝置的結構示意圖。 [Fig. 6] is a schematic structural diagram of a security authentication device provided by an embodiment of this specification.

[圖7]是本說明書的一個實施例提供的一種安全認證模型的訓練裝置的結構示意圖。 [ Fig. 7 ] is a schematic structural diagram of a training device for a security authentication model provided by an embodiment of this specification.

[圖8]是本說明書的一個實施例提供的一種電子設備的結構示意圖。 [ Fig. 8 ] is a schematic structural diagram of an electronic device provided by an embodiment of this specification.

[圖9]是本說明書的一個實施例提供的另一種電子設備的結構示意圖。 [ Fig. 9 ] is a schematic structural diagram of another electronic device provided by an embodiment of this specification.

為使本說明書的目的、技術方案和優點更加清楚,下面將結合本說明書具體實施例及相應的圖式對本說明書中的技術方案進行清楚、完整地描述。顯然,所描述的實施例僅是本文件一部分實施例,而不是全部的實施例。基於本文件中的實施例,本領域具有通常知識者在沒有做出創 造性勞動前提下所獲得的所有其他實施例,都屬於本文件保護的範圍。 In order to make the purpose, technical solutions and advantages of this specification clearer, the technical solutions in this specification will be clearly and completely described below in conjunction with specific embodiments of this specification and corresponding drawings. Apparently, the described embodiments are only some of the embodiments in this document, not all of them. Based on the examples in this document, those of ordinary skill in the art have not made any creative All other embodiments obtained under the premise of creative labor belong to the scope of protection of this document.

以下結合圖式,詳細說明本說明書各實施例提供的技術方案。 The technical solutions provided by each embodiment of this specification will be described in detail below in conjunction with the drawings.

如前所述,目前的終端設備主要採用靜態的安全認證方式,例如指紋認證、面部認證、密碼認證等。這種方式下,一方面會由於靜態的認證資訊需要在電腦內部儲存器中儲存並在網路中傳輸,而導致認證資訊存在被木馬程式或監聽設備截獲的風險;另一方面,還會要求用戶配合認證操作,比如指紋認證需要用戶把手指按在指紋識別模組,並保持手指乾燥清潔,面部認證需要用戶手持設備採集特定角度的面部圖像,這對用戶而言則不夠便捷,且會影響用戶的使用體驗。 As mentioned above, current terminal devices mainly adopt static security authentication methods, such as fingerprint authentication, face authentication, password authentication, and the like. In this way, on the one hand, because the static authentication information needs to be stored in the internal memory of the computer and transmitted on the network, there is a risk that the authentication information will be intercepted by Trojan horse programs or listening devices; on the other hand, it will also require The user cooperates with the authentication operation. For example, fingerprint authentication requires the user to press the finger on the fingerprint recognition module and keep the finger dry and clean. Face authentication requires the user to hold a device to collect a facial image at a specific angle, which is not convenient for the user and will cause problems. affect the user experience.

針對上述問題,本說明書實施例旨在提供一種能夠為用戶提供更加友好且更加便捷的安全認證方式。 In view of the above problems, the embodiment of this specification aims to provide a more friendly and convenient security authentication method for users.

圖1是本說明書的一個實施例提供的一種安全認證方法的方法流程圖。圖1的方法可包括: Fig. 1 is a method flowchart of a security authentication method provided by an embodiment of this specification. The method of Figure 1 may include:

S102,響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料。 S102, in response to the security authentication request for the target user, acquire user behavior data of the target user within a preset time period.

應理解,日常生活中,用戶與用戶之間通常會存在習慣上的差異,比如走路的步頻、步幅、跑步的姿態、速度、使用終端設備時觸摸螢幕的頻率、力度、以及使用終端設備中安裝的應用程式的習慣、使用偏好,等等,這些不同類別的行為之間的微弱差別則會形成用戶個體之間的 巨大差異。本說明書實施例基於這一點,可以獲取目標用戶在預設時間段內的用戶行為資料,該用戶行為資料能夠表示目標用戶在預設時間段內的動態且連續的行為資料。 It should be understood that in daily life, there are usually differences in habits between users, such as walking frequency, stride length, running posture, speed, frequency and strength of touching the screen when using a terminal device, and the frequency and strength of using a terminal device. Habits, usage preferences, etc. of the applications installed in the A huge difference. Based on this point, the embodiment of the present description can acquire the user behavior data of the target user within a preset time period, and the user behavior data can represent the dynamic and continuous behavior data of the target user within the preset time period.

可選地,為了獲取能夠表示用戶在一段時間內的動態且連續的行為資料,該預設時間段包括如下至少一種:發起安全認證請求之前的指定時間段;發起安全認證請求之後的指定時間段;發起安全認證請求之前的第一指定時間段和發起安全認證請求之後的第二指定時間段。 Optionally, in order to obtain dynamic and continuous behavior data that can represent the user's behavior within a period of time, the preset time period includes at least one of the following: a specified period of time before initiating a security authentication request; a specified period of time after initiating a security authentication request ; A first specified time period before initiating the security authentication request and a second specified time period after initiating the security authentication request.

其中,發起安全認證請求之前的指定時間段,比如可以是發起安全請求之前的幾個小時內;發起安全認證請求之後的指定時間段,比如可以是發起安全請求之後的1分鐘或半分鐘內;發起安全認證請求之前的第一指定時間段和發起安全認證請求之後的第二指定時間段,比如可以包括發起安全請求之前的幾個小時內和發起安全請求之後的1分鐘或半分鐘內,即綜合這兩段時間內目標用戶的用戶行為資料,對目標用戶進行安全認證,確定目標用戶在這兩段時間內的行為特徵是否出現異常於以往學習到的行為特徵。 Wherein, the specified time period before initiating the security authentication request, for example, may be within a few hours before initiating the security request; the specified time period after initiating the security authentication request, for example, may be within 1 minute or half a minute after initiating the security request; The first specified time period before initiating the security authentication request and the second specified time period after initiating the security authentication request, for example, may include several hours before initiating the security request and within 1 minute or half a minute after initiating the security request, namely Combine the user behavior data of the target user during these two periods of time, perform security authentication on the target user, and determine whether the behavior characteristics of the target user during these two periods of time are abnormal to the behavior characteristics learned in the past.

可選地,一個用戶通常會同時使用多個終端設備,該終端設備可以但不限於包括:PC、手機、PAD、智慧手環、智慧眼鏡等常見的用戶個人設備,且這類終端設備普遍具有採集用戶行為特徵序列的功能。為了更全面地獲取目標用戶在預設時間段內的用戶行為資料,本說明書實施 例既可以從目標用戶發起安全認證請求的終端設備中,獲取目標用戶在預設時間段內的用戶行為資料,還可以從與目標用戶關聯的多個終端設備中,獲取目標用戶在預設時間段內的用戶行為資料。具體地,獲取目標用戶在預設時間段內的用戶行為資料,包括:從目標用戶發起安全認證請求的終端設備中,獲取目標用戶在預設時間段內的用戶行為資料;及/或從與目標用戶關聯的多個終端設備中,獲取目標用戶在預設時間段內的用戶行為資料。 Optionally, a user usually uses multiple terminal devices at the same time. The terminal devices may include but are not limited to: common user personal devices such as PCs, mobile phones, PADs, smart bracelets, and smart glasses, and such terminal devices generally have The function of collecting user behavior feature sequences. In order to more comprehensively obtain user behavior data of target users within a preset time period, this manual implements For example, the user behavior data of the target user within the preset time period can be obtained from the terminal device that the target user initiates the security authentication request, and the user behavior data of the target user within the preset time period can also be obtained from multiple terminal devices associated with the target user. User behavior data within the segment. Specifically, obtaining the user behavior data of the target user within the preset time period includes: obtaining the user behavior data of the target user within the preset time period from the terminal device that the target user initiates the security authentication request; From multiple terminal devices associated with the target user, user behavior data of the target user within a preset time period is obtained.

如圖2所示,為本說明書實施例提供的一種安全認證方法應用於實際場景中的示意圖。其中,與目標用戶關聯的多個終端設備包括手機、PC和智慧手環,用戶發起安全認證請求的終端設備為手機,執行安全認證操作的設備為雲端伺服器,在實際應用中,該執行安全認證操作的設備還可以是用戶指定的終端設備。 As shown in FIG. 2 , it is a schematic diagram of a security authentication method provided by the embodiment of this specification applied in an actual scene. Among them, the multiple terminal devices associated with the target user include mobile phones, PCs, and smart bracelets. The terminal device that the user initiates the security authentication request is the mobile phone, and the device that performs the security authentication operation is the cloud server. In practical applications, the implementation security The device for the authentication operation may also be a terminal device designated by the user.

當目標用戶使用手機進行螢幕解鎖時,該螢幕解鎖需要對目標用戶進行安全認證,此時,手機將該安全認證請求發送至雲端伺服器;雲端伺服器響應於該安全認證請求,從與目標用戶相關聯的手機、PC和智慧手環中獲取目標用戶在預設時間段內的用戶行為資料;雲端伺服器再基於該用戶行為資料對目標用戶進行安全認證,並將安全認證結果回饋給手機,若對目標用戶的安全認證通過,則螢幕解鎖成功,若對目標用戶的安全認證失敗,則螢幕解鎖失敗。 When the target user uses the mobile phone to unlock the screen, the screen unlocking needs to perform security authentication on the target user. At this time, the mobile phone sends the security authentication request to the cloud server; the cloud server responds to the security authentication request from the target user. The associated mobile phone, PC and smart bracelet obtain the user behavior data of the target user within the preset time period; the cloud server then performs security authentication on the target user based on the user behavior data, and returns the security authentication result to the mobile phone. If the security authentication of the target user is passed, the screen unlocking is successful, and if the security authentication of the target user fails, the screen unlocking fails.

S104,基於用戶行為資料獲取目標用戶的行為特徵序列。 S104. Obtain a behavior feature sequence of the target user based on the user behavior data.

可選地,在獲取目標用戶的行為特徵資料時,可將目標用戶抽象為指定數量的關鍵點(或者也可以是指定關節),這些關鍵點在相關關聯後,能夠表示目標用戶的完整軀幹,每個時間點,都可以將目標用戶藉由這些關鍵點之間的關聯關係來表示目標用戶在各時間點的動作。具體地,目標用戶的行為特徵序列包括下述至少一種:目標用戶的運動軌跡特徵序列;目標用戶的指定關節特徵序列;目標用戶的指定軀幹特徵序列。 Optionally, when acquiring the behavioral feature data of the target user, the target user can be abstracted into a specified number of key points (or specified joints). These key points can represent the complete torso of the target user after correlation. At each time point, the target user can represent the target user's actions at each time point through the association relationship between these key points. Specifically, the target user's behavior feature sequence includes at least one of the following: the target user's motion trajectory feature sequence; the target user's specified joint feature sequence; the target user's specified body feature sequence.

如圖3所示,為本說明書實施例提供的採集動作軌跡特徵序列的示意圖。如圖3(a)所示,為將目標用戶抽象為17個關鍵點,這些關鍵點包括目標用戶的關節,這些關鍵點之間存在一些關聯關係,即這些關鍵點之間的連接關係。圖3(b)所示,為將這些關鍵點劃分為目標用戶的上半身和下半身的示意圖。如圖3(c)所示,第一個圖為採集到的目標用戶在一段時間內四個連續時間點的動作,這四個連續時間點的動作即組成了目標用戶在該段時間內的動作軌跡序列;第二個圖為採集到的目標用戶在該段時間內四個連續時間點的下半身動作;第三個圖為採集到的目標用戶在該段時間內四個連續時間點的上半身動作。 As shown in FIG. 3 , it is a schematic diagram of the feature sequence of the collected action trajectory provided by the embodiment of this specification. As shown in Figure 3(a), in order to abstract the target user into 17 key points, these key points include the joints of the target user, and there are some associations between these key points, that is, the connection relationship between these key points. Figure 3(b) is a schematic diagram of dividing these key points into the upper body and lower body of the target user. As shown in Figure 3(c), the first picture shows the collected actions of the target user at four consecutive time points within a certain period of time. Action trajectory sequence; the second picture shows the collected lower body movements of the target user at four consecutive time points during the period; the third picture shows the collected upper body movements of the target user at four consecutive time points during the period action.

如圖4所示,為本說明書實施例提供的記錄目標用戶在過去0~3.5s內四種不同狀態的概率示意圖,該四種狀態 包括行走狀態、停止狀態、開始狀態和站立狀態。該四種不同狀態的概率示意圖則能夠反應目標用戶在該段時間內的行為特徵,可以看出目標用戶在該段時間內處於行走狀態中的概率相較其他三種狀態而言概率較大。 As shown in Figure 4, it is a schematic diagram of the probability of recording the target user's four different states in the past 0~3.5s provided by the embodiment of this specification. The four states Including walking state, stop state, start state and standing state. The probability diagrams of the four different states can reflect the behavior characteristics of the target user during this period of time. It can be seen that the probability of the target user being in the walking state during this period of time is higher than that of the other three states.

S106,將目標用戶的行為特徵序列輸入安全認證模型,以得到行為特徵序列對應的安全認證結果;其中,安全認證模型為基於目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。 S106. Input the behavioral feature sequence of the target user into the security authentication model to obtain a security authentication result corresponding to the behavioral feature sequence; wherein, the security authentication model is obtained by training based on multiple sets of behavioral feature sequences of the target user in a historical time period.

可選地,為了不斷優化安全認證模型,提高安全認證模型的安全認證準確率,將行為特徵序列輸入安全認證模型,以得到行為特徵序列對應的安全認證結果之後,該方法還包括:基於目標用戶在預設時間段內的行為特徵序列和對應的安全認證結果,疊代更新安全認證模型。 Optionally, in order to continuously optimize the security authentication model and improve the security authentication accuracy of the security authentication model, after inputting the behavior feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, the method further includes: The behavioral feature sequence and the corresponding security certification results within the preset time period, iteratively update the security certification model.

本說明書提供的一種或多個實施例,在對用戶進行安全認證時,能夠響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,再基於用戶行為資料獲取目標用戶的行為特徵序列,最後將目標用戶的行為特徵序列輸入到安全認證模型,得到該行為特徵序列對應的安全認證結果,其中安全認證模型為基於目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。這樣在用戶進行安全認證時,由於獲取的是用戶預設時間段內的動態特徵序列,因此不再需要用戶進行過多的刻意配合就能實現安全認證,為用戶提供更加友好且便捷的安全認證 方式。 One or more embodiments provided in this specification can respond to the security authentication request for the target user when performing security authentication on the user, obtain the user behavior data of the target user within a preset time period, and then obtain the user behavior data based on the user behavior data. The target user’s behavioral feature sequence, and finally input the target user’s behavioral feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavioral feature sequence, where the security authentication model is based on multiple sets of behavioral features of the target user in the historical time period obtained by sequence training. In this way, when the user performs security authentication, since the dynamic feature sequence within the user's preset time period is obtained, the security authentication can be realized without the user's excessive deliberate cooperation, providing users with more friendly and convenient security authentication Way.

圖5是本說明書的一個實施例提供的一種訓練安全認證模型的方法的實施流程示意圖,包括: Fig. 5 is a schematic diagram of the implementation flow of a method for training a security authentication model provided by an embodiment of this specification, including:

S502,獲取目標用戶在歷史時間段內的多組用戶行為資料。 S502. Obtain multiple sets of user behavior data of the target user within a historical time period.

其中,多組用戶行為資料為多組不同時間段內的用戶行為資料。 Wherein, the multiple sets of user behavior data are multiple sets of user behavior data in different time periods.

S504,基於目標用戶在歷史時間段內的多組用戶行為資料,獲取目標用戶的多組行為特徵序列。 S504. Acquire multiple sets of behavior feature sequences of the target user based on multiple sets of user behavior data of the target user in a historical time period.

可選地,可基於與目標用戶相關聯的多個終端設備聯合對目標用戶的用戶行為資料進行採集,比如智慧手環可採集用戶手關節處的動作軌跡資料,智慧眼鏡可採集用戶頭部的動作軌跡資料。具體地,基於目標用戶在歷史時間段內的多組用戶行為資料,獲取目標用戶的多組行為特徵序列,包括:分別從目標用戶在歷史時間段內的多組用戶行為資料中,抽取多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對多組用戶行為資料中的多個時間點對應的指定關鍵點進行關聯計算,以獲取多組用戶行為資料在多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於多組用戶行為資料在多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取目標用戶的行為特 徵序列。 Optionally, user behavior data of the target user can be collected jointly based on multiple terminal devices associated with the target user. Action track data. Specifically, based on multiple sets of user behavior data of the target user in the historical time period, obtaining multiple sets of behavioral feature sequences of the target user includes: extracting multiple sets of user behavior data from the multiple sets of user behavior data in the historical time period The specified key points corresponding to multiple time points in the user behavior data, wherein one user corresponds to multiple specified key points at one time point, and a set of user behavior data corresponds to multiple time points; Correlation calculation is performed on the specified key points corresponding to multiple time points in the multiple time points to obtain the correlation between the specified key points corresponding to multiple sets of user behavior data at each time point in multiple time points; based on multiple sets of user behavior data in The association relationship between the specified key points corresponding to each time point in multiple time points, to obtain the behavior characteristics of the target user sign sequence.

其中,指定關鍵點可對應於圖3(a)所示的17個關鍵點。為了能夠得到動態的行為特徵序列,上述一組用戶行為資料對應於多個時間點應為連續的多個時間點。 Among them, the designated key points may correspond to the 17 key points shown in Fig. 3(a). In order to obtain a dynamic sequence of behavioral characteristics, the above-mentioned set of user behavior data corresponds to multiple time points that should be continuous.

S506,基於目標用戶的多組行為特徵序列,訓練得到目標用戶的安全認證模型。 S506. Based on multiple sets of behavioral feature sequences of the target user, train to obtain a security authentication model of the target user.

本說明書提供的一種或多個實施例,在訓練認證目標用戶行為的安全認證模型時,能夠獲取目標用戶在歷史時間段內的多組用戶行為資料,再基於目標用戶在歷史時間段內的多組用戶行為資料,獲取目標用戶的多組行為特徵序列,最後基於目標用戶的多組行為特徵序列,訓練得到目標用戶的安全認證模型。由於訓練的安全認證模型是基於目標用戶在歷史時間段內的動態行為特徵序列訓練得到的,這樣在對目標用戶進行安全認證時,獲取該目標用戶在認證前的一段時間內的動態行為特徵序列,即可實現對目標用戶的安全認證,因此也就不再需要目標用戶進行過多的刻意配合,從而能夠為用戶提供更加友好且便捷的安全認證方式。 In one or more embodiments provided in this specification, when training a security authentication model for authenticating target user behavior, multiple sets of user behavior data of the target user in the historical time period can be obtained, and then based on the multiple sets of user behavior data of the target user in the historical time period, Group user behavior data, obtain multiple sets of behavioral feature sequences of target users, and finally train the security authentication model of target users based on multiple sets of behavioral feature sequences of target users. Since the trained security authentication model is trained based on the target user's dynamic behavior feature sequence in the historical time period, when performing security authentication on the target user, the dynamic behavior feature sequence of the target user in a period of time before authentication is obtained , the security authentication of the target user can be realized, so the target user no longer needs too much deliberate cooperation, so as to provide the user with a more friendly and convenient security authentication method.

圖6是本說明書的一個實施例提供的一種安全認證裝置600的結構示意圖。請參考圖6,在一種軟體實施方式中,安全認證裝置600可包括:資料獲取單元610,響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;序列獲取單元620,基於所述用戶行為資料獲取所述 目標用戶的行為特徵序列;安全認證單元630,將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 Fig. 6 is a schematic structural diagram of a security authentication device 600 provided by an embodiment of this specification. Please refer to FIG. 6. In a software implementation, the security authentication device 600 may include: a data acquisition unit 610, which acquires user behavior data of the target user within a preset time period in response to a security authentication request for the target user; The sequence acquisition unit 620, based on the user behavior data, acquires the Behavior feature sequence of the target user; the security authentication unit 630 inputs the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence.

藉由圖6所示的安全認證裝置可以知道:本說明書提供的一種或多個實施例,在對用戶進行安全認證時,能夠響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,再基於用戶行為資料獲取目標用戶的行為特徵序列,最後將目標用戶的行為特徵序列輸入到安全認證模型,得到該行為特徵序列對應的安全認證結果,其中安全認證模型為基於目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。這樣在用戶進行安全認證時,由於獲取的是用戶預設時間段內的動態特徵序列,因此不再需要用戶進行過多的刻意配合就能實現安全認證,為用戶提供更加友好且便捷的安全認證方式。 From the security authentication device shown in Figure 6, it can be known that in one or more embodiments provided by this specification, when performing security authentication on a user, it can respond to the security authentication request for the target user and obtain the target user's time at a preset time. The user behavior data in the segment, and then based on the user behavior data to obtain the behavior feature sequence of the target user, and finally input the behavior feature sequence of the target user into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, where the security authentication model is It is trained based on multiple sets of behavior feature sequences of the target user in the historical time period. In this way, when the user performs security authentication, since the dynamic feature sequence within the user's preset time period is obtained, the security authentication can be realized without too much deliberate cooperation from the user, and a more friendly and convenient security authentication method is provided for the user. .

可選地,在一種實施方式中,所述預設時間段包括如下至少一種:發起所述安全認證請求之前的指定時間段;發起所述安全認證請求之後的指定時間段;發起所述安全認證請求之前的第一指定時間段和發起所述安全認證請求之後的第二指定時間段。 Optionally, in an implementation manner, the preset time period includes at least one of the following: a specified time period before initiating the security authentication request; a specified time period after initiating the security authentication request; initiating the security authentication A first specified time period before the request and a second specified time period after the security authentication request is initiated.

可選地,在一種實施方式中,所述資料獲取單元610,用於:從所述目標用戶發起所述安全認證請求的終端設備中,獲取所述目標用戶在所述預設時間段內的用戶行為資 料;及/或從與所述目標用戶關聯的多個終端設備中,獲取所述目標用戶在所述預設時間段內的用戶行為資料。 Optionally, in an implementation manner, the data acquisition unit 610 is configured to: acquire the information of the target user within the preset time period from the terminal device from which the target user initiates the security authentication request. user behavior data and/or acquire user behavior data of the target user within the preset time period from multiple terminal devices associated with the target user.

可選地,在一種實施方式中,所述目標用戶的行為特徵序列,包括下述至少一種:所述目標用戶的運動軌跡特徵序列;所述目標用戶的指定關節特徵序列;所述目標用戶的指定軀幹特徵序列。 Optionally, in an embodiment, the target user's behavior feature sequence includes at least one of the following: the target user's movement track feature sequence; the target user's designated joint feature sequence; the target user's Specifies the sequence of body features.

可選地,在一種實施方式中,所述安全認證單元630將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果之後,所述裝置還包括:模型更新單元640,基於所述目標用戶在所述預設時間段內的行為特徵序列和對應的安全認證結果,疊代更新所述安全認證模型。 Optionally, in one embodiment, after the security authentication unit 630 inputs the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, the device further includes: a model update unit 640. Iteratively update the security authentication model based on the behavior feature sequence of the target user within the preset time period and the corresponding security authentication result.

安全認證裝置600能夠實現圖1~圖4的方法實施例的方法,具體可參考圖1~圖4所示實施例的安全認證方法,不再贅述。 The security authentication device 600 can implement the methods in the method embodiments shown in FIGS. 1 to 4 . For details, reference may be made to the security authentication method in the embodiments shown in FIGS. 1 to 4 , which will not be repeated here.

圖7是本說明書的一個實施例提供的一種安全認證模型的訓練裝置700的結構示意圖。請參考圖7,在一種軟體實施方式中,安全認證模型的訓練裝置700可包括:資料獲取單元710,獲取目標用戶在歷史時間段內的多組用戶行為資料;序列獲取單元720,基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行 為特徵序列;模型訓練單元730,基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 Fig. 7 is a schematic structural diagram of a safety authentication model training device 700 provided by an embodiment of this specification. Please refer to FIG. 7 , in a software implementation, the training device 700 of the security authentication model may include: a data acquisition unit 710, which acquires multiple sets of user behavior data of the target user in a historical time period; a sequence acquisition unit 720, based on the multiple sets of user behavior data of the target user in the historical time period, and obtain multiple sets of rows of the target user is a feature sequence; the model training unit 730, based on multiple sets of behavior feature sequences of the target user, trains to obtain a security authentication model of the target user.

藉由圖7所示的安全認證模型的訓練裝置可以知道:本說明書提供的一種或多個實施例,在訓練認證目標用戶行為的安全認證模型時,能夠獲取目標用戶在歷史時間段內的多組用戶行為資料,再基於目標用戶在歷史時間段內的多組用戶行為資料,獲取目標用戶的多組行為特徵序列,最後基於目標用戶的多組行為特徵序列,訓練得到目標用戶的安全認證模型。由於訓練的安全認證模型是基於目標用戶在歷史時間段內的動態行為特徵序列訓練得到的,這樣在對目標用戶進行安全認證時,獲取該目標用戶在認證前的一段時間內的動態行為特徵序列,即可實現對目標用戶的安全認證,因此也就不再需要目標用戶進行過多的刻意配合,從而能夠為用戶提供更加友好且便捷的安全認證方式。 From the training device of the security authentication model shown in FIG. 7, it can be known that: one or more embodiments provided in this specification can obtain multiple information of the target user in the historical time period when training the security authentication model for authenticating the behavior of the target user. Group user behavior data, and then based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior feature sequences of the target user are obtained, and finally based on multiple sets of behavior feature sequences of the target user, the security authentication model of the target user is obtained through training . Since the trained security authentication model is trained based on the target user's dynamic behavior feature sequence in the historical time period, when performing security authentication on the target user, the dynamic behavior feature sequence of the target user in a period of time before authentication is obtained , the security authentication of the target user can be realized, so the target user no longer needs too much deliberate cooperation, so as to provide the user with a more friendly and convenient security authentication method.

可選地,在一種實施方式中,所述序列獲取單元720,用於:分別從所述目標用戶在所述歷史時間段內的多組用戶行為資料中,抽取所述多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對所述多組用戶行為資料中的多個時間點對應的指定關鍵點進行關聯計算,以獲取所述多組用戶行為資料 在所述多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於所述多組用戶行為資料在所述多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取所述目標用戶的行為特徵序列。 Optionally, in an implementation manner, the sequence acquisition unit 720 is configured to: extract the multiple sets of user behavior data from the multiple sets of user behavior data of the target user within the historical time period, respectively. The specified key points corresponding to multiple time points, wherein one user corresponds to multiple specified key points at one time point, and a set of user behavior data corresponds to multiple time points; Perform associated calculations on specified key points corresponding to multiple time points to obtain the multiple sets of user behavior data The relationship between the specified key points corresponding to each of the multiple time points; based on the multiple sets of user behavior data between the specified key points corresponding to each of the multiple time points The association relationship of the target user is obtained to obtain the behavior feature sequence of the target user.

安全認證模型的訓練裝置700能夠實現圖5的方法實施例的方法,具體可參考圖5所示實施例的安全認證模型的訓練方法,不再贅述。 The security authentication model training device 700 can implement the method in the method embodiment shown in FIG. 5 . For details, reference may be made to the security authentication model training method in the embodiment shown in FIG. 5 , which will not be repeated here.

圖8是本說明書的一個實施例電子設備的結構示意圖。請參考圖8,在硬體層面,該電子設備包括處理器,可選地還包括內部匯流排、網路介面、儲存器。其中,儲存器可能包含內部儲存器,例如高速隨機存取記憶體(Random-Access Memory,RAM),也可能還包括非易失性記憶體(non-volatile memory),例如至少1個磁碟儲存器等。當然,該電子設備還可能包括其他業務所需要的硬體。 Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Please refer to FIG. 8 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the storage may include internal storage, such as high-speed random access memory (Random-Access Memory, RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk storage device etc. Of course, the electronic device may also include hardware required by other services.

處理器、網路介面和儲存器可以藉由內部匯流排相互連接,該內部匯流排可以是ISA(Industry Standard Architecture,工業標準架構)匯流排、PCI(Peripheral Component Interconnect,週邊組件互連)匯流排或EISA(Extended Industry Standard Architecture,延伸工業標準架構)匯流排等。所述匯流排可以分為位址匯流排、資料匯流排、控制匯流排等。為便於表示,圖8中僅用一個雙向箭頭表示,但並不表示僅有一根匯流排或一種類型的匯 流排。 The processor, network interface, and storage can be connected to each other by an internal bus, which can be an ISA (Industry Standard Architecture, industry standard architecture) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnection) bus Or EISA (Extended Industry Standard Architecture, extended industry standard architecture) busbar, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one double-headed arrow is used in Figure 8, but it does not mean that there is only one bus bar or one type of sink Flow row.

儲存器,用於存放程式。具體地,程式可以包括程式碼,所述程式碼包括電腦操作指令。儲存器可以包括內部儲存器和非易失性記憶體,並向處理器提供指令和資料。 Memory, used to store programs. Specifically, the program may include program code, and the program code includes computer operation instructions. Storage can include internal storage and non-volatile memory and provides instructions and data to the processor.

處理器從非易失性記憶體中讀取對應的電腦程式到內部儲存器中然後運行,在邏輯層面上形成安全認證裝置。處理器,執行儲存器所存放的程式,並具體用於執行以下操作:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 The processor reads the corresponding computer program from the non-volatile memory into the internal storage and then runs it, forming a security authentication device on a logical level. The processor executes the program stored in the memory, and is specifically used to perform the following operations: in response to the security authentication request for the target user, obtain user behavior data of the target user within a preset time period; based on the user behavior The data acquires the behavior characteristic sequence of the target user; input the behavior characteristic sequence into the security authentication model to obtain the security authentication result corresponding to the behavior characteristic sequence.

藉由圖8所示的電子設備可以知道:本說明書提供的一種或多個實施例,在對用戶進行安全認證時,能夠響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,再基於用戶行為資料獲取目標用戶的行為特徵序列,最後將目標用戶的行為特徵序列輸入到安全認證模型,得到該行為特徵序列對應的安全認證結果,其中安全認證模型為基於目標用戶在歷史時間段內的多組行為特徵序列訓練得到的。這樣在用戶進行安全認證時,由於獲取的是用戶預設時間段內的動態特徵序列,因此不再需要用戶進行過多的刻意配合就能實現安全認證, 為用戶提供更加友好且便捷的安全認證方式。 From the electronic device shown in FIG. 8, it can be known that: one or more embodiments provided by this specification can respond to the security authentication request for the target user when performing security authentication on the user, and obtain the target user's time period during the preset time period. Based on the user behavior data in the user behavior data, the target user’s behavior feature sequence is obtained based on the user behavior data, and finally the target user’s behavior feature sequence is input into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence. The security authentication model is based on It is obtained by training multiple sets of behavior feature sequences of the target user in the historical time period. In this way, when the user performs security authentication, since the dynamic feature sequence within the user's preset time period is obtained, the security authentication can be realized without the need for too much deliberate cooperation from the user. Provide users with a more friendly and convenient security authentication method.

上述如本說明書圖1~圖4所示實施例揭示的安全認證裝置執行的方法可以應用於處理器中,或者由處理器實現。處理器可能是一種集成電路晶片,具有信號的處理能力。在實現過程中,上述方法的各步驟可以藉由處理器中的硬體的集成邏輯電路或者軟體形式的指令完成。上述的處理器可以是通用處理器,包括中央處理器(Central Processing Unit,CPU)、網路處理器(Network Processor,NP)等;還可以是數位信號處理器(Digital Signal Processor,DSP)、特定應用積體電路(Application Specific Integrated Circuit,ASIC)、現場可程式閘陣列(Field-Programmable Gate Array,FPGA)或者其他可程式化邏輯裝置、分離閘或者電晶體邏輯裝置、分離硬體組件。可以實現或者執行本說明書實施例中的公開的各方法、步驟及邏輯方塊圖。通用處理器可以是微處理器或者該處理器也可以是任何常規的處理器等。結合本說明書實施例所公開的方法的步驟可以直接體現為硬體解碼處理器執行完成,或者用解碼處理器中的硬體及軟體模組組合執行完成。軟體模組可以位於隨機記憶體,快閃記憶體、唯讀記憶體,可程式化唯讀記憶體或電可擦除可程式化記憶體、暫存器等本領域成熟的儲存媒體中。該儲存媒體位於儲存器,處理器讀取儲存器中的資訊,結合其硬體完成上述方法的步驟。 The above method performed by the security authentication device disclosed in the embodiments shown in FIGS. 1 to 4 of this specification may be applied to or implemented by a processor. A processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above-mentioned method can be completed by an integrated logic circuit of the hardware in the processor or instructions in the form of software. The above-mentioned processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processor, DSP), a specific Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, separate gate or transistor logic devices, and separate hardware components. The methods, steps and logic block diagrams disclosed in the embodiments of this specification can be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the methods disclosed in the embodiments of this specification can be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, scratchpad. The storage medium is located in the storage, and the processor reads the information in the storage, and completes the steps of the above method in combination with its hardware.

該電子設備還可執行圖1~圖4的方法,並實現安全認 證裝置在圖1~圖3所示實施例的功能,本說明書實施例在此不再贅述。 The electronic device can also execute the methods shown in Fig. 1 to Fig. 4, and realize security authentication. The functions of the verification device in the embodiments shown in FIGS. 1 to 3 will not be repeated here in the embodiments of this specification.

當然,除了軟體實現方式之外,本說明書的電子設備並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。 Of course, in addition to the software implementation, the electronic equipment in this specification does not exclude other implementations, such as logic devices or the combination of software and hardware, etc., that is to say, the execution subject of the following processing flow is not limited to each logic unit , which can also be a hardware or logic device.

本說明書實施例還提出了一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式包括指令,該指令當被包括多個應用程式的便攜式電子設備執行時,能夠使該便攜式電子設備執行圖1~圖4所示實施例的方法,並具體用於執行以下操作:響應於對所述目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料;基於所述用戶行為資料獲取所述目標用戶的行為特徵序列;將所述行為特徵序列輸入安全認證模型,以得到所述行為特徵序列對應的安全認證結果。 The embodiment of this specification also proposes a computer-readable storage medium, the computer-readable storage medium stores one or more programs, the one or more programs include instructions, and the instructions are executed by a portable electronic device including a plurality of application programs , the portable electronic device can be made to execute the method of the embodiment shown in Figures 1 to 4, and is specifically used to perform the following operations: in response to the security authentication request for the target user, obtain the the user behavior data; obtain the behavior characteristic sequence of the target user based on the user behavior data; input the behavior characteristic sequence into the security authentication model to obtain the security authentication result corresponding to the behavior characteristic sequence.

圖9是本說明書的一個實施例提供的另一種電子設備的結構示意圖。請參考圖9,在硬體層面,該電子設備包括處理器,可選地還包括內部匯流排、網路介面、儲存器。其中,儲存器可能包含內部儲存器,例如高速隨機存取記憶體(Random-Access Memory,RAM),也可能還包括非易失性記憶體(non-volatile memory),例如至少1個磁碟儲存器等。當然,該電子設備還可能包括其他業務所需要 的硬體。 Fig. 9 is a schematic structural diagram of another electronic device provided by an embodiment of this specification. Please refer to FIG. 9 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a storage. Wherein, the storage may include internal storage, such as high-speed random access memory (Random-Access Memory, RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk storage device etc. Of course, the electronic equipment may also include other business needs hardware.

處理器、網路介面和儲存器可以藉由內部匯流排相互連接,該內部匯流排可以是ISA(Industry Standard Architecture,工業標準架構)匯流排、PCI(Peripheral Component Interconnect,週邊組件互連)匯流排或EISA(Extended Industry Standard Architecture,延伸工業標準架構)匯流排等。所述匯流排可以分為位址匯流排、資料匯流排、控制匯流排等。為便於表示,圖9中僅用一個雙向箭頭表示,但並不表示僅有一根匯流排或一種類型的匯流排。 The processor, network interface, and storage can be connected to each other by an internal bus, which can be an ISA (Industry Standard Architecture, industry standard architecture) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnection) bus Or EISA (Extended Industry Standard Architecture, extended industry standard architecture) busbar, etc. The bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one double-headed arrow is used in FIG. 9 , but it does not mean that there is only one bus bar or one type of bus bar.

儲存器,用於存放程式。具體地,程式可以包括程式碼,所述程式碼包括電腦操作指令。儲存器可以包括內部儲存器和非易失性記憶體,並向處理器提供指令和資料。 Memory, used to store programs. Specifically, the program may include program code, and the program code includes computer operation instructions. Storage can include internal storage and non-volatile memory and provides instructions and data to the processor.

處理器從非易失性記憶體中讀取對應的電腦程式到內部儲存器中然後運行,在邏輯層面上形成上述安全認證模型的訓練裝置。處理器,執行儲存器所存放的程式,並具體用於執行以下操作:獲取目標用戶在歷史時間段內的多組用戶行為資料;基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列;基於所述目標用戶的多組行為特徵序列,訓練得到所述目標用戶的安全認證模型。 The processor reads the corresponding computer program from the non-volatile memory into the internal storage and then runs it, forming a training device for the above-mentioned safety authentication model on a logical level. The processor executes the program stored in the memory, and is specifically used to perform the following operations: obtain multiple sets of user behavior data of the target user within the historical time period; Behavior data, obtaining multiple sets of behavior feature sequences of the target user; based on the multiple sets of behavior feature sequences of the target user, training to obtain a security authentication model of the target user.

藉由圖9所示的電子設備可以知道:本說明書提供的一種或多個實施例,在訓練認證目標用戶行為的安全認證 模型時,能夠獲取目標用戶在歷史時間段內的多組用戶行為資料,再基於目標用戶在歷史時間段內的多組用戶行為資料,獲取目標用戶的多組行為特徵序列,最後基於目標用戶的多組行為特徵序列,訓練得到目標用戶的安全認證模型。由於訓練的安全認證模型是基於目標用戶在歷史時間段內的動態行為特徵序列訓練得到的,這樣在對目標用戶進行安全認證時,獲取該目標用戶在認證前的一段時間內的動態行為特徵序列,即可實現對目標用戶的安全認證,因此也就不再需要目標用戶進行過多的刻意配合,從而能夠為用戶提供更加友好且便捷的安全認證方式。 By means of the electronic device shown in Figure 9, it can be known that one or more embodiments provided by this specification, in training and authenticating the security authentication of target user behavior When modeling, it is possible to obtain multiple sets of user behavior data of the target user in the historical time period, and then obtain multiple sets of behavioral feature sequences of the target user based on the multiple sets of user behavior data of the target user in the historical time period, and finally based on the target user’s Multiple sets of behavioral feature sequences are trained to obtain the security authentication model of the target user. Since the trained security authentication model is trained based on the target user's dynamic behavior feature sequence in the historical time period, when performing security authentication on the target user, the dynamic behavior feature sequence of the target user in a period of time before authentication is obtained , the security authentication of the target user can be realized, so the target user no longer needs too much deliberate cooperation, so as to provide the user with a more friendly and convenient security authentication method.

上述如本說明書圖5所示實施例揭示的訓練安全認證模型的方法可以應用於處理器中,或者由處理器實現。處理器可能是一種集成電路晶片,具有信號的處理能力。在實現過程中,上述方法的各步驟可以藉由處理器中的硬體的集成邏輯電路或者軟體形式的指令完成。上述的處理器可以是通用處理器,包括中央處理器(Central Processing Unit,CPU)、網路處理器(Network Processor,NP)等;還可以是數位信號處理器(Digital Signal Processor,DSP)、特定應用積體電路(Application Specific Integrated Circuit,ASIC)、現場可程式閘陣列(Field-Programmable Gate Array,FPGA)或者其他可程式化邏輯裝置、分離閘或者電晶體邏輯裝置、分離硬體組件。可以實現或者執行本說明書實施例中的公開的各方法、步驟及邏輯方塊圖。通用處理器可以是微處理器或者該處理器也可以是任何常 規的處理器等。結合本說明書實施例所公開的方法的步驟可以直接體現為硬體解碼處理器執行完成,或者用解碼處理器中的硬體及軟體模組組合執行完成。軟體模組可以位於隨機記憶體,快閃記憶體、唯讀記憶體,可程式化唯讀記憶體或者電可擦寫可程式化記憶體、暫存器等本領域成熟的儲存媒體中。該儲存媒體位於儲存器,處理器讀取儲存器中的資訊,結合其硬體完成上述方法的步驟。 The above-mentioned method for training a security authentication model disclosed in the embodiment shown in FIG. 5 of this specification may be applied to or implemented by a processor. A processor may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above-mentioned method can be completed by an integrated logic circuit of the hardware in the processor or instructions in the form of software. The above-mentioned processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processor, DSP), a specific Application Specific Integrated Circuit (ASIC), Field Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, separate gate or transistor logic devices, and separate hardware components. The methods, steps and logic block diagrams disclosed in the embodiments of this specification can be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any standard processor, etc. The steps of the methods disclosed in the embodiments of this specification can be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, scratchpad. The storage medium is located in the storage, and the processor reads the information in the storage, and completes the steps of the above method in combination with its hardware.

應理解,本說明書實施例的電子設備可以實現上述訓練安全認證模型的裝置在圖1所示的實施例的功能,本文不再贅述。 It should be understood that the electronic device in the embodiment of this specification can realize the functions of the above-mentioned apparatus for training a security authentication model shown in the embodiment shown in FIG. 1 , which will not be repeated herein.

當然,除了軟體實現方式之外,本說明書的電子設備並不排除其他實現方式,比如邏輯裝置抑或軟硬體結合的方式等等,也就是說以下處理流程的執行主體並不限定於各個邏輯單元,也可以是硬體或邏輯裝置。 Of course, in addition to the software implementation, the electronic equipment in this specification does not exclude other implementations, such as logic devices or the combination of software and hardware, etc., that is to say, the execution subject of the following processing flow is not limited to each logic unit , which can also be a hardware or logic device.

此外,本說明書實施例還提出了一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式包括指令。 In addition, the embodiment of this specification also proposes a computer-readable storage medium, where the computer-readable storage medium stores one or more programs, and the one or more programs include instructions.

可選地,該指令當被包括多個應用程式的便攜式電子設備執行時,能夠使該便攜式電子設備執行圖5所示實施例的方法,並具體用於執行以下方法:獲取目標用戶在歷史時間段內的多組用戶行為資料;基於所述目標用戶在所述歷史時間段內的多組用戶行為資料,獲取所述目標用戶的多組行為特徵序列;基於所述目標用戶的多組行為特徵序列,訓練得到所 述目標用戶的安全認證模型。 Optionally, when the instruction is executed by a portable electronic device including multiple application programs, the portable electronic device can execute the method of the embodiment shown in FIG. multiple sets of user behavior data in the segment; based on the multiple sets of user behavior data of the target user in the historical time period, obtain multiple sets of behavioral feature sequences of the target user; based on multiple sets of behavioral features of the target user sequence, the trained Describe the security authentication model of the target user.

應理解,上述指令當被包括多個應用程式的便攜式電子設備執行時,能夠使上文所述的安全認證裝置實現圖1所示實施例的功能。由於原理相同,本文不再贅述。 It should be understood that, when the above instructions are executed by a portable electronic device including multiple application programs, the security authentication device described above can realize the functions of the embodiment shown in FIG. 1 . Since the principle is the same, this article will not repeat them.

上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多任務處理和並行處理也是可以的或者可能是有利的。 The foregoing describes specific embodiments of this specification. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the examples and still achieve desirable results. In addition, the processes depicted in the figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. Multitasking and parallel processing are also possible or may be advantageous in certain embodiments.

總之,以上所述僅為本說明書的較佳實施例而已,並非用於限定本說明書的保護範圍。凡在本說明書的精神和原則之內,所作的任何修改、等同替換、改進等,均應包含在本說明書的保護範圍之內。 In a word, the above descriptions are only preferred embodiments of this specification, and are not intended to limit the scope of protection of this specification. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of this manual shall be included within the scope of protection of this manual.

上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體的,電腦例如可以為個人電腦、筆記型電腦、行動電話、相機電話、智慧型電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任何設備的組合。 The systems, devices, modules or units described in the above embodiments can be implemented by computer chips or entities, or by products with certain functions. A typical implementing device is a computer. Specifically, the computer can be, for example, a personal computer, a notebook computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device or Combinations of any of these devices.

電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可 以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變隨機存取記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式化唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟(CD-ROM)、數位化多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 Computer-readable media includes both permanent and non-permanent, removable and non-removable media and can be implemented by any method or technology for storage of information. information available So computer-readable instructions, data structures, modules of a program, or other data. Examples of storage media for computers include, but are not limited to, phase change random access memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, compact disc-read-only (CD-ROM), digital multifunction A compact disc (DVD) or other optical storage, magnetic cassette, tape magnetic disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media, such as modulated data signals and carrier waves.

還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個......”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 It should also be noted that the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes Other elements not expressly listed, or elements inherent in the process, method, commodity, or apparatus are also included. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.

本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, refer to part of the description of the method embodiment.

Claims (11)

一種安全認證方法,藉由安全認證設備執行,包括:響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,其中,該用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該預設時間段內的不同關鍵點的用戶行為資料;基於該用戶行為資料獲取該目標用戶的行為特徵序列,其中,該行為特徵序列用於描述該目標用戶在多個時間點分別的動作,該行為特徵序列是基於該用戶行為資料中的多個時間點分別對應的指定關鍵點之間的關聯關係獲取得到,以便表示該目標用戶在該多個時間點的動作;將該目標用戶的行為特徵序列輸入安全認證模型,以得到該行為特徵序列對應的安全認證結果;其中,該安全認證模型為基於該目標用戶在歷史時間段內的多組行為特徵序列訓練得到的,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A security authentication method, performed by a security authentication device, comprising: in response to a security authentication request for a target user, acquiring user behavior data of the target user within a preset time period, wherein the user behavior data is obtained from the target user Acquired from multiple associated terminal devices, the multiple terminal devices respectively collect user behavior data at different key points of the target user within the preset time period; obtain the target user's behavior feature sequence based on the user behavior data, Wherein, the behavior feature sequence is used to describe the actions of the target user at multiple time points, and the behavior feature sequence is obtained based on the association relationship between the specified key points corresponding to the multiple time points in the user behavior data. , so as to represent the actions of the target user at the multiple time points; input the target user's behavioral feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavioral feature sequence; wherein, the security authentication model is based on the target It is obtained by training multiple sets of behavior feature sequences of users in the historical time period, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, by using multiple specified key The association relationship between the points obtains the actions of the target user at each time point. 如請求項1所述的方法,該預設時間段包括如下至少一種:發起該安全認證請求之前的指定時間段;發起該安全認證請求之後的指定時間段; 發起該安全認證請求之前的第一指定時間段和發起該安全認證請求之後的第二指定時間段。 According to the method described in claim 1, the preset time period includes at least one of the following: a specified time period before initiating the security authentication request; a specified period of time after initiating the security authentication request; A first specified time period before initiating the security authentication request and a second specified time period after initiating the security authentication request. 如請求項1所述的方法,該目標用戶的行為特徵序列,包括下述至少一種:該目標用戶的運動軌跡特徵序列;該目標用戶的指定關節特徵序列;該目標用戶的指定軀幹特徵序列。 According to the method described in Claim 1, the target user's behavior feature sequence includes at least one of the following: the target user's motion track feature sequence; the target user's specified joint feature sequence; the target user's specified body feature sequence. 如請求項1所述的方法,將該行為特徵序列輸入安全認證模型,以得到該行為特徵序列對應的安全認證結果之後,該方法還包括:基於該目標用戶在該預設時間段內的行為特徵序列和對應的安全認證結果,疊代更新該安全認證模型。 According to the method described in claim 1, after inputting the behavior feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, the method further includes: based on the behavior of the target user within the preset time period The feature sequence and the corresponding security certification result update the security certification model iteratively. 一種訓練安全認證模型的方法,包括:獲取目標用戶在歷史時間段內的多組用戶行為資料,其中,該多組用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該歷史時間段內的不同關鍵點的用戶行為資料;基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列;基於該目標用戶的多組行為特徵序列,訓練得到該目標用戶的安全認證模型,其中,基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列,包括:分別從該目標用戶在該歷史時間段內的多組用戶行為 資料中,抽取該多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對該多組用戶行為資料中的多個時間點對應的指定關鍵點進行關聯計算,以獲取該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取該目標用戶的行為特徵序列,該行為特徵序列用於描述該目標用戶在該多個時間點分別的動作,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A method for training a security authentication model, comprising: obtaining multiple sets of user behavior data of a target user within a historical time period, wherein the multiple sets of user behavior data are obtained from multiple terminal devices associated with the target user, the Multiple terminal devices separately collect user behavior data of different key points of the target user in the historical time period; based on multiple sets of user behavior data of the target user in the historical time period, obtain multiple sets of behavioral characteristics of the target user Sequence; based on multiple sets of behavioral feature sequences of the target user, the security authentication model of the target user is trained, wherein, based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior of the target user are obtained Feature sequence, including: multiple groups of user behaviors from the target user in the historical time period In the data, specifying key points corresponding to multiple time points in the multiple sets of user behavior data are extracted, wherein one user corresponds to multiple specified key points at one time point, and a set of user behavior data corresponds to multiple time points; Respectively perform associated calculations on the specified key points corresponding to multiple time points in the multiple sets of user behavior data, so as to obtain the relationship between the multiple sets of user behavior data between the specified key points corresponding to each time point in the multiple time points Association relationship: based on the association relationship between the specified key points corresponding to each of the multiple time points in the multiple sets of user behavior data, the behavioral feature sequence of the target user is obtained, and the behavioral feature sequence is used to describe the target The respective actions of the user at the multiple time points, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, through the association between multiple specified key points The relationship obtains the actions of the target user at each time point. 一種安全認證裝置,包括:資料獲取單元,響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,其中,該用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該預設時間段內的不同關鍵點的用戶行為資料;序列獲取單元,基於該用戶行為資料獲取該目標用戶的行為特徵序列,其中,該行為特徵序列用於描述該目標用戶在多個時間點分別的動作,該行為特徵序列是基於該用戶行為資料中的多個時間點分別對應的指定關鍵點之間 的關聯關係獲取得到,以便表示該目標用戶在該多個時間點的動作;安全認證單元,將該行為特徵序列輸入安全認證模型,以得到該行為特徵序列對應的安全認證結果,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A security authentication device, comprising: a data acquisition unit, in response to a security authentication request for a target user, to acquire user behavior data of a target user within a preset time period, wherein the user behavior data is obtained from multiple Acquired in a terminal device, the plurality of terminal devices respectively collect the user behavior data of different key points of the target user within the preset time period; the sequence acquisition unit obtains the behavior characteristic sequence of the target user based on the user behavior data , wherein the behavior feature sequence is used to describe the actions of the target user at multiple time points, the behavior feature sequence is based on the specified key points corresponding to the multiple time points in the user behavior data The association relationship is obtained to represent the actions of the target user at the multiple time points; the security authentication unit inputs the behavior feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, wherein the key The points are the joints of the target user, the specified key points are the specified joints of the target user, and the actions of the target user at each time point are obtained through the association relationship between the multiple specified key points. 一種安全認證模型的訓練裝置,包括:資料獲取單元,獲取目標用戶在歷史時間段內的多組用戶行為資料,該多組用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該歷史時間段內的不同關鍵點的用戶行為資料;序列獲取單元,基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列;模型訓練單元,基於該目標用戶的多組行為特徵序列,訓練得到該目標用戶的安全認證模型,其中,該序列獲取單元:分別從該目標用戶在該歷史時間段內的多組用戶行為資料中,抽取該多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對該多組用戶行為資料中的多個時間點對應的指 定關鍵點進行關聯計算,以獲取該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取該目標用戶的行為特徵序列,該行為特徵序列用於描述該目標用戶在該多個時間點分別的動作,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A training device for a security authentication model, comprising: a data acquisition unit, which acquires multiple sets of user behavior data of a target user within a historical time period, and the multiple sets of user behavior data are obtained from multiple terminal devices associated with the target user , the plurality of terminal devices respectively collect user behavior data of different key points of the target user in the historical time period; the sequence acquisition unit acquires the target user based on multiple sets of user behavior data of the target user in the historical time period Multiple sets of behavioral feature sequences of the user; the model training unit, based on the multiple sets of behavioral feature sequences of the target user, trains to obtain the security authentication model of the target user, wherein the sequence acquisition unit: Among the multiple sets of user behavior data in , extract the specified key points corresponding to multiple time points in the multiple sets of user behavior data. Among them, one user corresponds to multiple specified key points at one time point, and a set of user behavior data corresponds to at multiple time points; the indicators corresponding to multiple time points in the multiple sets of user behavior data Perform associated calculations at certain key points to obtain the association relationship between the specified key points corresponding to each of the multiple time points in the multiple sets of user behavior data; based on the multiple sets of user behavior data at the multiple time points The relationship between the specified key points corresponding to each time point in , to obtain the behavior feature sequence of the target user, the behavior feature sequence is used to describe the actions of the target user at the multiple time points, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, the action of the target user at each time point is obtained through the association relationship between a plurality of the specified key points. 一種電子設備,包括:處理器;以及被安排成儲存電腦可執行指令的儲存器,該可執行指令在被執行時使該處理器執行以下操作:響應於對該目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,其中,該用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該預設時間段內的不同關鍵點的用戶行為資料;基於該用戶行為資料獲取該目標用戶的行為特徵序列,其中,該行為特徵序列用於描述該目標用戶在多個時間點分別的動作,該行為特徵序列是基於該用戶行為資料中的多個時間點分別對應的指定關鍵點之間的關聯關係獲取得到,以便表示該目標用戶在該多個時間點的動作; 將該行為特徵序列輸入安全認證模型,以得到該行為特徵序列對應的安全認證結果,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 An electronic device comprising: a processor; and a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform the following operations: in response to a security authentication request to the target user, obtain User behavior data of the target user within a preset time period, wherein the user behavior data is obtained from multiple terminal devices associated with the target user, and the multiple terminal devices respectively collect The user behavior data of different key points in the segment; the behavior feature sequence of the target user is obtained based on the user behavior data, wherein the behavior feature sequence is used to describe the actions of the target user at multiple time points, and the behavior feature sequence It is obtained based on the correlation between specified key points respectively corresponding to multiple time points in the user behavior data, so as to represent the actions of the target user at the multiple time points; input the behavior feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, by The actions of the target user at each time point are obtained from the association relationship among the specified key points. 一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式當被包括多個應用程式的電子設備執行時,使得該電子設備執行以下操作:響應於對目標用戶的安全認證請求,獲取目標用戶在預設時間段內的用戶行為資料,其中,該用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該預設時間段內的不同關鍵點的用戶行為資料;基於該用戶行為資料獲取該目標用戶的行為特徵序列,其中,該行為特徵序列用於描述該目標用戶在多個時間點分別的動作,該行為特徵序列是基於該用戶行為資料中的多個時間點分別對應的指定關鍵點之間的關聯關係獲取得到,以便表示該目標用戶在該多個時間點的動作;將該行為特徵序列輸入安全認證模型,以得到該行為特徵序列對應的安全認證結果,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A computer-readable storage medium that stores one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to perform the following operations: The security authentication request of the target user, to obtain the user behavior data of the target user within a preset time period, wherein the user behavior data is obtained from multiple terminal devices associated with the target user, and the multiple terminal devices collect The user behavior data of the target user at different key points within the preset time period; the behavior feature sequence of the target user is obtained based on the user behavior data, wherein the behavior feature sequence is used to describe the target user at multiple time points Respective actions, the behavior feature sequence is obtained based on the association relationship between the specified key points corresponding to multiple time points in the user behavior data, so as to represent the actions of the target user at the multiple time points; The behavior feature sequence is input into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, by multiple The association relationship between the specified key points is used to obtain the actions of the target user at each time point. 一種電子設備,包括:處理器;以及被安排成儲存電腦可執行指令的儲存器,該可執行指令在被執行時使該處理器執行以下操作:獲取目標用戶在歷史時間段內的多組用戶行為資料,其中,該多組用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該歷史時間段內的不同關鍵點的用戶行為資料;基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列;基於該目標用戶的多組行為特徵序列,訓練得到該目標用戶的安全認證模型,其中,基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列,包括:分別從該目標用戶在該歷史時間段內的多組用戶行為資料中,抽取該多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對該多組用戶行為資料中的多個時間點對應的指定關鍵點進行關聯計算,以獲取該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取該目標用戶的 行為特徵序列,該行為特徵序列用於描述該目標用戶在該多個時間點分別的動作,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 An electronic device, comprising: a processor; and a memory arranged to store computer-executable instructions, which when executed cause the processor to perform the following operations: acquire a plurality of groups of users of a target user within a historical time period Behavior data, wherein the multiple sets of user behavior data are obtained from multiple terminal devices associated with the target user, and the multiple terminal devices respectively collect user behavior of the target user at different key points within the historical time period Data; based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavioral feature sequences of the target user are obtained; based on multiple sets of behavioral feature sequences of the target user, the security authentication model of the target user is obtained through training , wherein, based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavioral feature sequences of the target user are obtained, including: respectively obtaining multiple sets of user behavior data of the target user in the historical time range , extract the specified key points corresponding to multiple time points in the multiple groups of user behavior data, wherein one user corresponds to multiple specified key points at one time point, and a group of user behavior data corresponds to multiple time points; respectively Carry out correlation calculation on the specified key points corresponding to multiple time points in the multiple sets of user behavior data, so as to obtain the correlation between the specified key points corresponding to each time point in the multiple time points of the multiple sets of user behavior data relationship; based on the association relationship between the specified key points corresponding to each of the multiple time points in the multiple sets of user behavior data, the target user's A behavioral feature sequence, the behavioral feature sequence is used to describe the respective actions of the target user at the multiple time points, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein , the actions of the target user at each time point are obtained through the association relationship among the specified key points. 一種電腦可讀儲存媒體,該電腦可讀儲存媒體儲存一個或多個程式,該一個或多個程式當被包括多個應用程式的電子設備執行時,使得該電子設備執行以下操作:獲取目標用戶在歷史時間段內的多組用戶行為資料,其中,該多組用戶行為資料是從與該目標用戶關聯的多個終端設備中獲取的,該多個終端設備分別採集該目標用戶在該歷史時間段內的不同關鍵點的用戶行為資料;基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列;基於該目標用戶的多組行為特徵序列,訓練得到該目標用戶的安全認證模型,其中,基於該目標用戶在該歷史時間段內的多組用戶行為資料,獲取該目標用戶的多組行為特徵序列,包括:分別從該目標用戶在該歷史時間段內的多組用戶行為資料中,抽取該多組用戶行為資料中的多個時間點對應的指定關鍵點,其中,一個用戶在一個時間點對應於多個指定關鍵點,一組用戶行為資料對應於多個時間點;分別對該多組用戶行為資料中的多個時間點對應的指 定關鍵點進行關聯計算,以獲取該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係;基於該多組用戶行為資料在該多個時間點中的各時間點對應的指定關鍵點之間的關聯關係,獲取該目標用戶的行為特徵序列,該行為特徵序列用於描述該目標用戶在該多個時間點分別的動作,其中,該關鍵點是該目標用戶的關節,該指定關鍵點是該目標用戶的指定關節,且其中,藉由多個該指定關鍵點之間的關聯關係獲得該目標用戶在各時間點的動作。 A computer-readable storage medium, the computer-readable storage medium stores one or more programs, and when the one or more programs are executed by an electronic device including a plurality of application programs, the electronic device performs the following operations: acquire target user Multiple sets of user behavior data within a historical time period, wherein the multiple sets of user behavior data are obtained from multiple terminal devices associated with the target user, and the multiple terminal devices respectively collect User behavior data of different key points within the segment; based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavioral feature sequences of the target user are obtained; based on multiple sets of behavioral feature sequences of the target user, The security authentication model of the target user is obtained through training, wherein, based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior feature sequences of the target user are obtained, including: Among multiple sets of user behavior data within a time period, the specified key points corresponding to multiple time points in the multiple sets of user behavior data are extracted, wherein one user corresponds to multiple specified key points at one time point, and a set of user behavior data corresponds to multiple specified key points. The data correspond to multiple time points; the indicators corresponding to the multiple time points in the multiple sets of user behavior data respectively Perform associated calculations at certain key points to obtain the association relationship between the specified key points corresponding to each of the multiple time points in the multiple sets of user behavior data; based on the multiple sets of user behavior data at the multiple time points The relationship between the specified key points corresponding to each time point in , to obtain the behavior feature sequence of the target user, the behavior feature sequence is used to describe the actions of the target user at the multiple time points, wherein the key point is the joint of the target user, the specified key point is the specified joint of the target user, and wherein, the action of the target user at each time point is obtained through the association relationship between a plurality of the specified key points.
TW109114889A 2019-10-28 2020-05-05 Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium TWI788662B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911031839.0 2019-10-28
CN201911031839.0A CN110807180A (en) 2019-10-28 2019-10-28 Method and device for safety certification and training safety certification model and electronic equipment

Publications (2)

Publication Number Publication Date
TW202117568A TW202117568A (en) 2021-05-01
TWI788662B true TWI788662B (en) 2023-01-01

Family

ID=69489268

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109114889A TWI788662B (en) 2019-10-28 2020-05-05 Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium

Country Status (3)

Country Link
CN (1) CN110807180A (en)
TW (1) TWI788662B (en)
WO (1) WO2021082543A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807180A (en) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 Method and device for safety certification and training safety certification model and electronic equipment
CN115461740A (en) * 2020-06-02 2022-12-09 深圳市欢太科技有限公司 Behavior control method and device and storage medium
CN111885597B (en) * 2020-09-28 2021-01-01 上海兴容信息技术有限公司 Method and system for security authentication
CN113259368B (en) * 2021-06-01 2021-10-12 北京芯盾时代科技有限公司 Identity authentication method, device and equipment
CN113572753B (en) * 2021-07-16 2023-03-14 北京淇瑀信息科技有限公司 User equipment authentication method and device based on Newton's cooling law
CN113792341B (en) * 2021-09-15 2023-10-13 百度在线网络技术(北京)有限公司 Automatic detection method, device, equipment and medium for privacy compliance of application program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140193035A1 (en) * 2012-02-23 2014-07-10 Intel Corporation Method and Device for Head Tracking and Computer-Readable Recording Medium
US20170199969A1 (en) * 2016-01-11 2017-07-13 The Joan and Irwin Jacobs Technion-Cornell Innovation Institute System and method for monitoring gross motor behavior
CN110276189A (en) * 2019-06-27 2019-09-24 电子科技大学 A kind of method for authenticating user identity based on gait information

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148633A1 (en) * 2009-12-21 2011-06-23 Kohlenberg Tobias M Using trajectory for authentication
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
CN107018121B (en) * 2016-10-13 2021-07-20 创新先进技术有限公司 User identity authentication method and device
CN106650350B (en) * 2016-10-21 2020-02-07 中国银联股份有限公司 Identity authentication method and system
CN107016346A (en) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 gait identification method and system
FR3064090B1 (en) * 2017-03-17 2021-09-17 Valeo Comfort & Driving Assistance CONTROL MODULE FOR VEHICLE INTERIOR
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN108549806B (en) * 2018-04-11 2020-01-31 西安电子科技大学 Identity authentication method based on user sliding and clicking behaviors
CN109977639B (en) * 2018-10-26 2021-05-04 招商银行股份有限公司 Identity authentication method and device and computer readable storage medium
CN110163611B (en) * 2019-03-18 2022-12-27 腾讯科技(深圳)有限公司 Identity recognition method, device and related equipment
CN110807180A (en) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 Method and device for safety certification and training safety certification model and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140193035A1 (en) * 2012-02-23 2014-07-10 Intel Corporation Method and Device for Head Tracking and Computer-Readable Recording Medium
US20170199969A1 (en) * 2016-01-11 2017-07-13 The Joan and Irwin Jacobs Technion-Cornell Innovation Institute System and method for monitoring gross motor behavior
CN110276189A (en) * 2019-06-27 2019-09-24 电子科技大学 A kind of method for authenticating user identity based on gait information

Also Published As

Publication number Publication date
WO2021082543A1 (en) 2021-05-06
CN110807180A (en) 2020-02-18
TW202117568A (en) 2021-05-01

Similar Documents

Publication Publication Date Title
TWI788662B (en) Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium
RU2765611C2 (en) Method and device for processing claims for goods based on blockchain and electronic device
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
JP7092911B2 (en) Scan-and-pay methods and devices used in mobile devices
Li et al. Unobservable re-authentication for smartphones.
US11256793B2 (en) Method and device for identity authentication
WO2020207190A1 (en) Three-dimensional information determination method, three-dimensional information determination device, and terminal apparatus
US20170187711A1 (en) Information providing method and device
WO2020034760A1 (en) Identity information identification method and device
KR20190072563A (en) Method and apparatus for detecting facial live varnish, and electronic device
EP2904537B1 (en) Secure identification of computing device and secure identification methods
JP2020510327A (en) Multi-block chain network data processing method, apparatus, and server
WO2020038140A1 (en) Facial recognition method and device
WO2020233137A1 (en) Method and apparatus for determining value of loss function, and electronic device
US20160294835A1 (en) Initiating a Secure Action Via Physical Manipulation
CN105306202B (en) Auth method, device and server
CN107690608A (en) The certification inputted by RFID scannings to posture
CN113497807A (en) Method and device for detecting user login risk and computer readable storage medium
US10257229B1 (en) Systems and methods for verifying users based on user motion
US20150062005A1 (en) Method and system for providing user interaction when capturing content in an electronic device
CN112333165B (en) Identity authentication method, device, equipment and system
WO2021093367A1 (en) Model training and risk identification method, apparatus and device
CN112995757A (en) Video clipping method and device
CN104992085A (en) Method and device for human body in-vivo detection based on touch trace tracking
WO2020088008A1 (en) Biological characteristic information processing method and apparatus based on block chain, and terminal device