WO2021082543A1 - 安全认证以及训练安全认证模型的方法、装置及电子设备 - Google Patents

安全认证以及训练安全认证模型的方法、装置及电子设备 Download PDF

Info

Publication number
WO2021082543A1
WO2021082543A1 PCT/CN2020/103612 CN2020103612W WO2021082543A1 WO 2021082543 A1 WO2021082543 A1 WO 2021082543A1 CN 2020103612 W CN2020103612 W CN 2020103612W WO 2021082543 A1 WO2021082543 A1 WO 2021082543A1
Authority
WO
WIPO (PCT)
Prior art keywords
target user
user
security authentication
time period
multiple sets
Prior art date
Application number
PCT/CN2020/103612
Other languages
English (en)
French (fr)
Inventor
刘磊
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021082543A1 publication Critical patent/WO2021082543A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Definitions

  • This specification relates to the field of computer software technology, and in particular to a method, device and electronic equipment for security authentication and training a security authentication model.
  • the purpose of the embodiments of this specification is to provide a method, device and electronic device for security authentication and training a security authentication model, which can provide users with a more friendly and convenient security authentication method.
  • a security authentication method includes: in response to a security authentication request to the target user, obtaining user behavior data of the target user within a preset time period; and obtaining data based on the user behavior data.
  • the behavior feature sequence of the target user input the behavior feature sequence of the target user into a security authentication model to obtain the security authentication result corresponding to the behavior feature sequence; wherein, the security authentication model is based on the history of the target user It is obtained by training multiple sets of behavior feature sequences in a time period.
  • a method for training a security authentication model including: acquiring multiple sets of user behavior data of a target user in a historical time period; based on multiple sets of user behavior data of the target user in the historical time period , Acquire multiple sets of behavior characteristic sequences of the target user; based on the multiple sets of behavior characteristic sequences of the target user, train to obtain a security authentication model of the target user.
  • a security authentication device including: a data acquisition unit, which, in response to a security authentication request to the target user, acquires user behavior data of the target user within a preset time period; and a sequence acquisition unit based on all The user behavior data obtains the behavior characteristic sequence of the target user; the safety authentication unit inputs the behavior characteristic sequence into a safety authentication model to obtain a safety authentication result corresponding to the behavior characteristic sequence.
  • a training device for a security authentication model which includes: a data acquisition unit, which acquires multiple sets of user behavior data of a target user in a historical time period; and a sequence acquisition unit, which is based on the target user’s historical time Multiple sets of user behavior data in a segment to obtain multiple sets of behavior characteristic sequences of the target user; a model training unit trains to obtain a security authentication model of the target user based on the multiple sets of behavior characteristic sequences of the target user.
  • an electronic device comprising: a processor; and a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform the following operations: For the security authentication request of the target user, obtain user behavior data of the target user within a preset time period; obtain the behavior characteristic sequence of the target user based on the user behavior data; input the behavior characteristic sequence into the security authentication Model to obtain the security authentication result corresponding to the behavior characteristic sequence.
  • a computer-readable storage medium stores one or more programs that, when executed by an electronic device including multiple application programs, cause all The electronic device performs the following operations: in response to a security authentication request to the target user, obtain user behavior data of the target user within a preset time period; obtain the behavior characteristic sequence of the target user based on the user behavior data; The behavior characteristic sequence is input into a security authentication model to obtain a safety authentication result corresponding to the behavior characteristic sequence.
  • an electronic device comprising: a processor; and a memory arranged to store computer-executable instructions, which when executed, cause the processor to perform the following operations: get Multiple sets of user behavior data of the target user in the historical time period; based on the multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior characteristic sequences of the target user are acquired; based on the target user The multiple sets of behavior feature sequences of the target user are trained to obtain the security authentication model of the target user.
  • a computer-readable storage medium stores one or more programs that, when executed by an electronic device including multiple application programs, cause all The electronic device performs the following operations: acquiring multiple sets of user behavior data of the target user in a historical time period; acquiring multiple sets of behavior data of the target user based on the multiple sets of user behavior data of the target user in the historical time period Feature sequence: Based on the multiple sets of behavior feature sequences of the target user, train the security authentication model of the target user.
  • one or more embodiments provided in this specification can respond to the target
  • the user’s security authentication request obtains the user behavior data of the target user within a preset time period, and then obtains the behavior characteristic sequence of the target user based on the user behavior data, and finally enters the target user’s behavior characteristic sequence into the security authentication model to obtain the behavior
  • the security authentication result corresponding to the feature sequence, where the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user in the historical time period.
  • Fig. 1 is a method flowchart of a security authentication method provided by an embodiment of this specification.
  • Fig. 2 is an interaction flow chart of the security authentication method provided by an embodiment of this specification applied in an actual scenario.
  • Fig. 3 is a schematic diagram of collecting a feature sequence of motion trajectories provided by an embodiment of the present specification.
  • FIG. 4 is a schematic diagram of the probability of obtaining the behavior habits of the user within a preset time period in the security authentication method provided by an embodiment of the present specification.
  • Fig. 5 is a schematic diagram of the implementation process of a training method for a security authentication model provided by an embodiment of this specification.
  • Fig. 6 is a schematic structural diagram of a security authentication device provided by an embodiment of this specification.
  • Fig. 7 is a schematic structural diagram of a training device for a security authentication model provided by an embodiment of this specification.
  • Fig. 8 is a schematic structural diagram of an electronic device provided by an embodiment of this specification.
  • FIG. 9 is a schematic structural diagram of another electronic device provided by an embodiment of this specification.
  • current terminal devices mainly adopt static security authentication methods, such as fingerprint authentication, facial authentication, and password authentication.
  • static authentication information needs to be stored in the computer memory and transmitted on the network, the authentication information is at risk of being intercepted by Trojan horse programs or monitoring devices; on the other hand, users are also required to cooperate in authentication.
  • fingerprint authentication requires the user to press the finger on the fingerprint recognition module and keep the finger dry and clean.
  • Facial authentication requires the user to hold the device to collect facial images at a specific angle, which is not convenient enough for the user and will affect the user experience .
  • the embodiments of this specification aim to provide a safer authentication method that can provide users with a more friendly and convenient way.
  • Fig. 1 is a method flowchart of a security authentication method provided by an embodiment of this specification.
  • the method of FIG. 1 may include steps S102 to S106.
  • S102 In response to the security authentication request for the target user, obtain user behavior data of the target user within a preset time period.
  • the embodiments of the present specification can obtain user behavior data of the target user in a preset time period, and the user behavior data can represent the dynamic and continuous behavior data of the target user in the preset time period.
  • the preset time period includes at least one of the following: a specified time period before the security authentication request is initiated; a specified time after the security authentication request is initiated Period; the first designated time period before the safety authentication request is initiated and the second designated time period after the safety authentication request is initiated.
  • the specified time period before the security authentication request is initiated may be within a few hours before the security request is initiated; the specified time period after the security authentication request is initiated, for example, may be within 1 minute or half a minute after the security request is initiated;
  • the first specified time period before the security authentication request is initiated and the second specified time period after the security authentication request is initiated for example, may include a few hours before the security request is initiated and 1 minute or half a minute after the security request is initiated, that is, Integrating the user behavior data of the target user during these two periods, conduct security authentication on the target user, and determine whether the behavior characteristics of the target user during the two periods are abnormal from the behavior characteristics learned in the past.
  • a user usually uses multiple terminal devices at the same time.
  • the terminal devices can include, but are not limited to: PCs, mobile phones, PADs, smart bracelets, smart glasses and other common user personal devices, and such terminal devices generally have The function of collecting user behavior characteristic sequence.
  • the embodiment of this specification can obtain the user behavior data of the target user in the preset time period from the terminal device from which the target user initiates the security authentication request. It is also possible to obtain user behavior data of the target user in a preset time period from multiple terminal devices associated with the target user.
  • obtaining the user behavior data of the target user in a preset time period includes: obtaining the user behavior data of the target user in the preset time period from the terminal device from which the target user initiates a security authentication request; and/or Among the multiple terminal devices associated with the target user, the user behavior data of the target user within a preset time period is acquired.
  • FIG. 2 it is a schematic diagram of a security authentication method provided by an embodiment of this specification applied in an actual scenario.
  • multiple terminal devices associated with the target user include mobile phones, PCs, and smart bracelets.
  • the terminal device that the user initiates the security authentication request is the mobile phone, and the device that performs the security authentication operation is the cloud server. In actual applications, the security authentication should be performed.
  • the operating device may also be a terminal device designated by the user.
  • the screen unlocking requires security authentication of the target user.
  • the mobile phone sends the security authentication request to the cloud server; the cloud server responds to the security authentication request and associates with the target user.
  • the user behavior data of the target user within a preset time period is obtained from the mobile phone, PC and smart bracelet; the cloud server then performs security authentication on the target user based on the user behavior data, and feeds back the security authentication result to the mobile phone. If the user’s security authentication is passed, the screen is unlocked successfully, and if the target user’s security authentication fails, the screen fails to be unlocked.
  • S104 Obtain a behavior characteristic sequence of the target user based on the user behavior data.
  • the target user when acquiring behavioral characteristic data of the target user, can be abstracted into a specified number of key points (or specified joints). These key points can represent the complete torso of the target user after being correlated. At each point in time, the target user can be used to characterize the target user's actions at each point in time through the correlation between these key points.
  • the behavior feature sequence of the target user includes at least one of the following: a motion trajectory feature sequence of the target user; a specified joint feature sequence of the target user; a specified trunk feature sequence of the target user.
  • FIG. 3 it is a schematic diagram of collecting a feature sequence of motion trajectories provided in this embodiment of the specification.
  • these key points include the joints of the target user, and there are some association relationships between these key points, that is, the connection relationship between these key points.
  • Figure 3(b) shows a schematic diagram of dividing these key points into the upper body and lower body of the target user.
  • the first figure shows the collected actions of the target user at four consecutive time points in a period of time. The actions at these four consecutive time points constitute the target user’s actions during this period of time.
  • Action trajectory sequence the second picture is the collected lower body movements of the target user at four consecutive time points during the period; the third picture is the upper body movements of the collected target user at four consecutive time points during the period of time action.
  • the probability diagram of recording target users in four different states in the past 0-3.5s provided by this embodiment of this specification, the four states include walking state, stopping state, starting state, and standing state.
  • the probability diagrams of the four different states can reflect the behavior characteristics of the target user during this period of time, and it can be seen that the probability of the target user in the walking state during this period of time is higher than that of the other three states.
  • S106 Input the behavior feature sequence of the target user into the security authentication model to obtain a security authentication result corresponding to the behavior feature sequence; wherein the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user in a historical time period.
  • the method further includes: based on the target user The behavior characteristic sequence and the corresponding safety certification result within a preset period of time are iteratively updated the safety certification model.
  • the one or more embodiments provided in this specification are able to respond to the security authentication request of the target user to obtain the user behavior data of the target user within a preset time period when the user is authenticated safely, and then based on the user behavior data Obtain the target user's behavior feature sequence, and finally input the target user's behavior feature sequence into the security authentication model to obtain the security authentication result corresponding to the behavior feature sequence.
  • the security authentication model is based on multiple sets of behaviors of the target user in the historical time period. Obtained by feature sequence training. In this way, when the user performs security authentication, because the dynamic feature sequence within the user's preset time period is obtained, the user no longer needs too much deliberate cooperation to achieve security authentication, providing users with more friendly and convenient security authentication the way.
  • Fig. 5 is a schematic diagram of an implementation process of a method for training a security authentication model provided by an embodiment of this specification, including steps S502 to S506.
  • S502 Acquire multiple sets of user behavior data of the target user in a historical time period.
  • the multiple sets of user behavior data are multiple sets of user behavior data in different time periods.
  • S504 Acquire multiple sets of behavior characteristic sequences of the target user based on the multiple sets of user behavior data of the target user in the historical time period.
  • the user behavior data of the target user can be collected jointly based on multiple terminal devices associated with the target user.
  • a smart bracelet can collect motion trajectory data at the user's hand joints
  • smart glasses can collect data on the user's head.
  • Motion trajectory data based on multiple sets of user behavior data of the target user in the historical time period, acquiring multiple sets of behavior characteristic sequences of the target user includes:
  • the behavior characteristic sequence of the target user is obtained.
  • the designated key points can correspond to the 17 key points shown in Figure 3(a).
  • the above-mentioned set of user behavior data corresponding to multiple time points should be consecutive multiple time points.
  • the one or more embodiments provided in this specification can obtain multiple sets of user behavior data of the target user in the historical time period when training a security authentication model for authenticating the behavior of the target user, and then based on the target user’s behavior in the historical time period. Multiple sets of user behavior data, multiple sets of behavior characteristic sequences of the target user are obtained, and finally, based on the multiple sets of behavior characteristic sequences of the target user, a security authentication model of the target user is trained. Since the trained security authentication model is trained based on the dynamic behavior characteristic sequence of the target user in the historical time period, when the target user is authenticated safely, the dynamic behavior characteristic sequence of the target user during the period of time before authentication is obtained. , The security authentication of the target user can be realized, so too much deliberate cooperation of the target user is no longer required, so that a more friendly and convenient security authentication method can be provided for the user.
  • FIG. 6 is a schematic structural diagram of a security authentication device 600 provided by an embodiment of this specification.
  • the security authentication device 600 may include: a data obtaining unit 610, in response to a security authentication request to the target user, obtains user behavior data of the target user within a preset time period Sequence acquisition unit 620, based on the user behavior data to acquire the behavior characteristic sequence of the target user; security authentication unit 630, input the behavior characteristic sequence into the security authentication model to obtain the security authentication result corresponding to the behavior characteristic sequence .
  • one or more embodiments provided in this specification can respond to the security authentication request of the target user and obtain the target user’s
  • the user behavior data in the segment is then based on the user behavior data to obtain the behavior characteristic sequence of the target user, and finally the behavior characteristic sequence of the target user is input into the safety authentication model to obtain the safety authentication result corresponding to the behavior characteristic sequence, where the safety authentication model is It is trained based on multiple sets of behavior feature sequences of the target user in the historical time period.
  • the preset time period includes at least one of the following: a specified time period before the security authentication request is initiated; a specified time period after the security authentication request is initiated; A first designated time period before the safety authentication request and a second designated time period after the safety authentication request is initiated.
  • the data obtaining unit 610 is configured to: obtain from the terminal device from which the target user initiates the security authentication request that the target user is within the preset time period And/or obtain user behavior data of the target user in the preset time period from multiple terminal devices associated with the target user.
  • the behavior characteristic sequence of the target user includes at least one of the following: a motion track characteristic sequence of the target user; a specified joint characteristic sequence of the target user; the target The user's specified torso feature sequence.
  • the device further includes:
  • the model updating unit iteratively updates the security authentication model based on the behavior characteristic sequence of the target user in the preset time period and the corresponding security authentication result.
  • the security authentication device 600 can implement the methods of the method embodiments shown in FIGS. 1 to 4. For details, please refer to the security authentication method of the embodiments shown in FIGS. 1 to 4, and details are not described herein again.
  • FIG. 7 is a schematic structural diagram of a training device 700 for a security authentication model provided by an embodiment of this specification.
  • the training device 700 of the safety authentication model may include: a data acquisition unit 710, which acquires multiple sets of user behavior data of the target user in a historical time period; and a sequence acquisition unit 720, which is based on all The multiple sets of user behavior data of the target user in the historical time period are used to obtain multiple sets of behavior feature sequences of the target user; the model training unit 730 trains to obtain the multiple sets of behavior feature sequences of the target user The security authentication model of the target user.
  • the one or more embodiments provided in this specification can obtain the target user's historical time period when training the security authentication model of the target user’s behavior.
  • the trained security authentication model is trained based on the dynamic behavior characteristic sequence of the target user in the historical time period, when the target user is authenticated safely, the dynamic behavior characteristic sequence of the target user during the period of time before authentication is obtained. ,
  • the security authentication of the target user can be realized, so too much deliberate cooperation of the target user is no longer required, so that a more friendly and convenient security authentication method can be provided for the user.
  • the sequence acquiring unit 720 is configured to extract the multiple sets of user behavior data from the multiple sets of user behavior data of the target user in the historical time period. Designated key points corresponding to multiple time points in, where one user corresponds to multiple designated key points at one time point, and a set of user behavior data corresponds to multiple time points;
  • the training device 700 for the security authentication model can implement the method of the method embodiment in FIG. 5, and for details, please refer to the training method of the security authentication model in the embodiment shown in FIG. 5, which will not be repeated here.
  • Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Please refer to FIG. 8.
  • the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory.
  • the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), or may also include non-volatile memory (non-volatile memory), such as at least one disk storage.
  • RAM random access memory
  • non-volatile memory such as at least one disk storage.
  • the electronic device may also include hardware required by other services.
  • the processor, network interface, and memory can be connected to each other through an internal bus.
  • the internal bus can be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnection standard) bus, or an EISA (Extended) bus. Industry Standard Architecture, extended industry standard structure) bus, etc.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of presentation, only one bidirectional arrow is used in FIG. 8, but it does not mean that there is only one bus or one type of bus.
  • the program may include program code, and the program code includes computer operation instructions.
  • the memory may include memory and non-volatile memory, and provide instructions and data to the processor.
  • the processor reads the corresponding computer program from the non-volatile memory to the memory and then runs, forming a security authentication device on the logical level.
  • the processor executes the program stored in the memory, and is specifically configured to perform the following operations: in response to the security authentication request of the target user, obtain user behavior data of the target user within a preset time period; based on the user behavior data Obtain the behavior feature sequence of the target user; input the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence.
  • one or more of the embodiments provided in this specification can respond to the security authentication request of the target user and obtain the target user in the preset time period when performing security authentication on the user. Then, based on the user behavior data, obtain the behavior characteristic sequence of the target user, and finally input the behavior characteristic sequence of the target user into the security authentication model to obtain the security authentication result corresponding to the behavior characteristic sequence.
  • the security authentication model is based on It is obtained by training multiple sets of behavior feature sequences of the target user in the historical time period. In this way, when the user performs security authentication, because the dynamic feature sequence within the user's preset time period is obtained, the user no longer needs too much deliberate cooperation to achieve security authentication, providing users with more friendly and convenient security authentication the way.
  • the method performed by the security authentication device disclosed in the embodiments shown in FIGS. 1 to 4 of this specification can be applied to a processor or implemented by the processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • CPU central processing unit
  • NP Network Processor
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of this specification can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of this specification can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the electronic device can also execute the methods in FIGS. 1 to 4, and realize the functions of the embodiments of the security authentication device shown in FIGS. 1 to 3, which are not repeated here in the embodiments of this specification.
  • the electronic equipment in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, etc. That is to say, the execution body of the following processing flow is not limited to each logic unit. It can also be a hardware or logic device.
  • the embodiment of this specification also proposes a computer-readable storage medium that stores one or more programs, the one or more programs include instructions, and the instructions are used in a portable electronic device that includes multiple application programs.
  • the portable electronic device can be made to execute the method of the embodiment shown in FIGS. 1 to 4, and is specifically configured to perform the following operations: in response to the security authentication request of the target user, obtain the target user in the preset time period Obtain the behavior characteristic sequence of the target user based on the user behavior data; input the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
  • FIG. 9 is a schematic structural diagram of another electronic device provided by an embodiment of this specification.
  • the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory.
  • the memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), or may also include non-volatile memory (non-volatile memory), such as at least one disk storage.
  • RAM random access memory
  • non-volatile memory such as at least one disk storage.
  • the electronic device may also include hardware required by other services.
  • the processor, network interface, and memory can be connected to each other through an internal bus.
  • the internal bus can be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnection standard) bus, or an EISA (Extended) bus. Industry Standard Architecture, extended industry standard structure) bus, etc.
  • the bus can be divided into an address bus, a data bus, a control bus, and so on. For ease of presentation, only one bidirectional arrow is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.
  • the program may include program code, and the program code includes computer operation instructions.
  • the memory may include memory and non-volatile memory, and provide instructions and data to the processor.
  • the processor reads the corresponding computer program from the non-volatile memory to the memory and then runs it to form a training device for the above-mentioned safety authentication model on a logical level.
  • the processor executes the program stored in the memory, and is specifically configured to perform the following operations: obtain multiple sets of user behavior data of the target user in the historical time period; based on the multiple sets of user behavior data of the target user in the historical time period Data, acquiring multiple sets of behavior characteristic sequences of the target user; training to obtain a security authentication model of the target user based on the multiple sets of behavior characteristic sequences of the target user.
  • one or more embodiments provided in this specification can obtain multiple sets of user behavior data of the target user in the historical time period when training the security authentication model for authenticating the behavior of the target user. Then, based on the multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior characteristic sequences of the target user are obtained, and finally based on the multiple sets of behavior characteristic sequences of the target user, the security authentication model of the target user is trained. Since the trained security authentication model is trained based on the dynamic behavior characteristic sequence of the target user in the historical time period, when the target user is authenticated safely, the dynamic behavior characteristic sequence of the target user during the period of time before authentication is obtained. , The security authentication of the target user can be realized, so too much deliberate cooperation of the target user is no longer required, so that a more friendly and convenient security authentication method can be provided for the user.
  • the foregoing method for training a security authentication model disclosed in the embodiment shown in FIG. 5 of this specification may be applied to a processor or implemented by the processor.
  • the processor may be an integrated circuit chip with signal processing capabilities.
  • each step of the above method can be completed by an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (DSP), a dedicated integrated Circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • CPU central processing unit
  • NP Network Processor
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • the methods, steps, and logical block diagrams disclosed in the embodiments of this specification can be implemented or executed.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the steps of the method disclosed in the embodiments of this specification can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • the electronic equipment in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, etc. That is to say, the execution body of the following processing flow is not limited to each logic unit. It can also be a hardware or logic device.
  • the embodiment of this specification also proposes a computer-readable storage medium that stores one or more programs, and the one or more programs include instructions.
  • the portable electronic device can execute the method of the embodiment shown in FIG. 5, and is specifically used to execute the following method: Obtain the historical time of the target user Multiple sets of user behavior data in a segment; based on multiple sets of user behavior data of the target user in the historical time period, multiple sets of behavior characteristic sequences of the target user are acquired; based on multiple sets of behavior characteristics of the target user Sequence, training to obtain the security authentication model of the target user.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Social Psychology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Color Printing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种安全认证以及安全认证模型的训练方法、装置及电子设备,该方法包括:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据(S102);基于所述用户行为数据获取所述目标用户的行为特征序列(S104);将所述目标用户的行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果(S106);其中,所述安全认证模型为基于所述目标用户在历史时间段内的多组行为特征序列训练得到的。

Description

安全认证以及训练安全认证模型的方法、装置及电子设备 技术领域
本说明书涉及计算机软件技术领域,尤其涉及一种安全认证以及训练安全认证模型的方法、装置及电子设备。
背景技术
目前的终端设备主要采用静态的安全认证方式,例如指纹认证、面部认证、密码认证等。这种方式下,静态的认证信息需要存储至计算机内存,并通过网络传输,因此存在被木马程序或监听设备截获的风险。此外,这种方式还要求用户配合操作,比如指纹认证需要用户的手指保持干燥清洁,面部认证需要特定角度,密码认证需要用户输入密码信息。显然,这些安全认证方式对于用户来讲,还不够便捷,在一定程度上影响了用户的使用体验。
有鉴于此,当期亟需一种对用户更加友好且更便捷的安全认证方式。
发明内容
本说明书实施例的目的是提供一种安全认证以及训练安全认证模型的方法、装置及电子设备,能够为用户提供更加友好且更加便捷的安全认证方式。
为解决上述技术问题,本说明书实施例是通过以下方面实现的。
第一方面,提出了一种安全认证方法,该方法包括:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;基于所述用户行为数据获取所述目标用户的行为特征序列;将所述目标用户的行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果;其中,所述安全认证模型为基于所述目标用户在历史时间段内的多组行为特征序列训练得到的。
第二方面,提出了一种训练安全认证模型的方法,包括:获取目标用户在历史时间段内的多组用户行为数据;基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
第三方面,提出了一种安全认证装置,包括:数据获取单元,响应于对所述目标用 户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;序列获取单元,基于所述用户行为数据获取所述目标用户的行为特征序列;安全认证单元,将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
第四方面,提出了一种安全认证模型的训练装置,包括:数据获取单元,获取目标用户在历史时间段内的多组用户行为数据;序列获取单元,基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;模型训练单元,基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
第五方面,提出了一种电子设备,该电子设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;基于所述用户行为数据获取所述目标用户的行为特征序列;将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
第六方面,提出了一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;基于所述用户行为数据获取所述目标用户的行为特征序列;将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
第七方面,提出了一种电子设备,该电子设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:获取目标用户在历史时间段内的多组用户行为数据;基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
第八方面,提出了一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:获取目标用户在历史时间段内的多组用户行为数据;基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
由以上本说明书实施例提供的技术方案可见,本说明书实施例方案至少具备如下一种技术效果:本说明书提供的一种或多个实施例,在对用户进行安全认证时,能够响应 于对目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据,再基于用户行为数据获取目标用户的行为特征序列,最后将目标用户的行为特征序列输入到安全认证模型,得到该行为特征序列对应的安全认证结果,其中安全认证模型为基于目标用户在历史时间段内的多组行为特征序列训练得到的。这样在用户进行安全认证时,由于获取的是用户预设时间段内的动态特征序列,因此不再需要用户进行过多的刻意配合就能实现安全认证,为用户提供更加友好且便捷的安全认证方式。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本说明书的一个实施例提供的一种安全认证方法的方法流程图。
图2是本说明书的一个实施例提供的安全认证方法应用于实际场景中的交互流程图。
图3是本说明书的一个实施例提供的采集动作轨迹特征序列的示意图。
图4是本说明书的一个实施例提供的安全认证方法中获取用户在预设时间段内的行为习惯的概率示意图。
图5是本说明书的一个实施例提供的一种安全认证模型的训练方法的实现流程示意图。
图6是本说明书的一个实施例提供的一种安全认证装置的结构示意图。
图7是本说明书的一个实施例提供的一种安全认证模型的训练装置的结构示意图。
图8是本说明书的一个实施例提供的一种电子设备的结构示意图。
图9是本说明书的一个实施例提供的另一种电子设备的结构示意图。
具体实施方式
为使本说明书的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本文件一部分实施例,而不是全部的实施例。基于本文件中的实施例,本领域普通 技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本文件保护的范围。
以下结合附图,详细说明本说明书各实施例提供的技术方案。
如前所述,目前的终端设备主要采用静态的安全认证方式,例如指纹认证、面部认证、密码认证等。这种方式下,一方面会由于静态的认证信息需要在计算机内存中存储并在网络中传输,而导致认证信息存在被木马程序或监听设备截获的风险;另一方面,还会要求用户配合认证操作,比如指纹认证需要用户把手指按在指纹识别模块,并保持手指干燥清洁,面部认证需要用户手持设备采集特定角度的面部图像,这对用户而言则不够便捷,且会影响用户的使用体验。
针对上述问题,本说明书实施例旨在提供一种能够为用户提供更加友好且更加便捷的安全认证方式。
图1是本说明书的一个实施例提供的一种安全认证方法的方法流程图。图1的方法可包括步骤S102至S106。
S102,响应于对目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据。
应理解,日常生活中,用户与用户之间通常会存在习惯上的差异,比如走路的步频、步幅、跑步的姿态、速度、使用终端设备时触摸屏幕的频率、粒度、以及使用终端设备中安装的应用的习惯、使用偏好,等等,这些不同类别的行为之间的微弱差别则会形成用户个体之间的巨大差异。本说明书实施例基于这一点,可以获取目标用户在预设时间段内的用户行为数据,该用户行为数据能够表征目标用户在预设时间段内的动态且连续的行为数据。
可选地,为了获取能够表征用户在一段时间内的动态且连续的行为数据,该预设时间段包括如下至少一种:发起安全认证请求之前的指定时间段;发起安全认证请求之后的指定时间段;发起安全认证请求之前的第一指定时间段和发起安全认证请求之后的第二指定时间段。
其中,发起安全认证请求之前的指定时间段,比如可以是发起安全请求之前的几个小时内;发起安全认证请求之后的指定时间段,比如可以是发起安全请求之后的1分钟或半分钟内;发起安全认证请求之前的第一指定时间段和发起安全认证请求之后的第二指定时间段,比如可以包括发起安全请求之前的几个小时内和发起安全请求之后的1分 钟或半分钟内,即综合这两段时间内目标用户的用户行为数据,对目标用户进行安全认证,确定目标用户在这两段时间内的行为特征是否出现异常于以往学习到的行为特征。
可选地,一个用户通常会同时使用多个终端设备,该终端设备可以但不限于包括:PC、手机、PAD、智能手环、智能眼镜等常见的用户个人设备,且这类终端设备普遍具有采集用户行为特征序列的功能。为了更全面地获取目标用户在预设时间段内的用户行为数据,本说明书实施例既可以从目标用户发起安全认证请求的终端设备中,获取目标用户在预设时间段内的用户行为数据,还可以从与目标用户关联的多个终端设备中,获取目标用户在预设时间段内的用户行为数据。具体地,获取目标用户在预设时间段内的用户行为数据,包括:从目标用户发起安全认证请求的终端设备中,获取目标用户在预设时间段内的用户行为数据;和/或从与目标用户关联的多个终端设备中,获取目标用户在预设时间段内的用户行为数据。
如图2所示,为本说明书实施例提供的一种安全认证方法应用于实际场景中的示意图。其中,与目标用户关联的多个终端设备包括手机、PC和智能手环,用户发起安全认证请求的终端设备为手机,执行安全认证操作的设备为云服务器,在实际应用中,该执行安全认证操作的设备还可以是用户指定的终端设备。
当目标用户使用手机进行屏幕解锁时,该屏幕解锁需要对目标用户进行安全认证,此时,手机将该安全认证请求发送至云服务器;云服务器响应于该安全认证请求,从与目标用户相关联的手机、PC和智能手环中获取目标用户在预设时间段内的用户行为数据;云服务器再基于该用户行为数据对目标用户进行安全认证,并将安全认证结果反馈给手机,若对目标用户的安全认证通过,则屏幕解锁成功,若对目标用户的安全认证失败,则屏幕解锁失败。
S104,基于用户行为数据获取目标用户的行为特征序列。
可选地,在获取目标用户的行为特征数据时,可将目标用户抽象为指定数量的关键点(或者也可以是指定关节),这些关键点在相关关联后,能够表征目标用户的完整躯干,每个时间点,都可以将目标用户通过这些关键点之间的关联关系来表征目标用户在各时间点的动作。具体地,目标用户的行为特征序列包括下述至少一种:目标用户的运动轨迹特征序列;目标用户的指定关节特征序列;目标用户的指定躯干特征序列。
如图3所示,为本说明书实施例提供的采集动作轨迹特征序列的示意图。如图3(a)所示,为将目标用户抽象为17个关键点,这些关键点包括目标用户的关节,这些关键 点之间存在一些关联关系,即这些关键点之间的连接关系。图3(b)所示,为将这些关键点划分为目标用户的上半身和下半身的示意图。如图3(c)所示,第一个图为采集到的目标用户在一段时间内四个连续时间点的动作,这四个连续时间点的动作即组成了目标用户在该段时间内的动作轨迹序列;第二个图为采集到的目标用户在该段时间内四个连续时间点的下半身动作;第三个图为采集到的目标用户在该段时间内四个连续时间点的上半身动作。
如图4所示,为本说明书实施例提供的记录目标用户在过去0~3.5s内四种不同状态的概率示意图,该四种状态包括行走状态、停止状态、开始状态和站立状态。该四种不同状态的概率示意图则能够反应目标用户在该段时间内的行为特征,可以看出目标用户在该段时间内处于行走状态中的概率相较其他三种状态而言概率较大。
S106,将目标用户的行为特征序列输入安全认证模型,以得到行为特征序列对应的安全认证结果;其中,安全认证模型为基于目标用户在历史时间段内的多组行为特征序列训练得到的。
可选地,为了不断优化安全认证模型,提高安全认证模型的安全认证准确率,将行为特征序列输入安全认证模型,以得到行为特征序列对应的安全认证结果之后,该方法还包括:基于目标用户在预设时间段内的行为特征序列和对应的安全认证结果,迭代更新安全认证模型。
本说明书提供的一种或多个实施例,在对用户进行安全认证时,能够响应于对目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据,再基于用户行为数据获取目标用户的行为特征序列,最后将目标用户的行为特征序列输入到安全认证模型,得到该行为特征序列对应的安全认证结果,其中安全认证模型为基于目标用户在历史时间段内的多组行为特征序列训练得到的。这样在用户进行安全认证时,由于获取的是用户预设时间段内的动态特征序列,因此不再需要用户进行过多的刻意配合就能实现安全认证,为用户提供更加友好且便捷的安全认证方式。
图5是本说明书的一个实施例提供的一种训练安全认证模型的方法的实施流程示意图,包括步骤S502至S506。
S502,获取目标用户在历史时间段内的多组用户行为数据。
其中,多组用户行为数据为多组不同时间段内的用户行为数据。
S504,基于目标用户在历史时间段内的多组用户行为数据,获取目标用户的多组行 为特征序列。
可选地,可基于与目标用户相关联的多个终端设备联合对目标用户的用户行为数据进行采集,比如智能手环可采集用户手关节处的动作轨迹数据,智能眼镜可采集用户头部的动作轨迹数据。具体地,基于目标用户在历史时间段内的多组用户行为数据,获取目标用户的多组行为特征序列,包括:
分别从目标用户在历史时间段内的多组用户行为数据中,抽取多组用户行为数据中的多个时间点对应的指定关键点,其中,一个用户在一个时间点对应于多个指定关键点,一组用户行为数据对应于多个时间点;
分别对多组用户行为数据中的多个时间点对应的指定关键点进行关联计算,以获取多组用户行为数据在多个时间点中的各时间点对应的指定关键点之间的关联关系;
基于多组用户行为数据在多个时间点中的各时间点对应的指定关键点之间的关联关系,获取目标用户的行为特征序列。
其中,指定关键点可对应于图3(a)所示的17个关键点。为了能够得到动态的行为特征序列,上述一组用户行为数据对应于多个时间点应为连续的多个时间点。
S506,基于目标用户的多组行为特征序列,训练得到目标用户的安全认证模型。
本说明书提供的一种或多个实施例,在训练认证目标用户行为的安全认证模型时,能够获取目标用户在历史时间段内的多组用户行为数据,再基于目标用户在历史时间段内的多组用户行为数据,获取目标用户的多组行为特征序列,最后基于目标用户的多组行为特征序列,训练得到目标用户的安全认证模型。由于训练的安全认证模型是基于目标用户在历史时间段内的动态行为特征序列训练得到的,这样在对目标用户进行安全认证时,获取该目标用户在认证前的一段时间内的动态行为特征序列,即可实现对目标用户的安全认证,因此也就不再需要目标用户进行过多的刻意配合,从而能够为用户提供更加友好且便捷的安全认证方式。
图6是本说明书的一个实施例提供的一种安全认证装置600的结构示意图。请参考图6,在一种软件实施方式中,安全认证装置600可包括:数据获取单元610,响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;序列获取单元620,基于所述用户行为数据获取所述目标用户的行为特征序列;安全认证单元630,将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
通过图6所示的安全认证装置可以知道:本说明书提供的一种或多个实施例,在对用户进行安全认证时,能够响应于对目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据,再基于用户行为数据获取目标用户的行为特征序列,最后将目标用户的行为特征序列输入到安全认证模型,得到该行为特征序列对应的安全认证结果,其中安全认证模型为基于目标用户在历史时间段内的多组行为特征序列训练得到的。这样在用户进行安全认证时,由于获取的是用户预设时间段内的动态特征序列,因此不再需要用户进行过多的刻意配合就能实现安全认证,为用户提供更加友好且便捷的安全认证方式。
可选地,在一种实施方式中,所述预设时间段包括如下至少一种:发起所述安全认证请求之前的指定时间段;发起所述安全认证请求之后的指定时间段;发起所述安全认证请求之前的第一指定时间段和发起所述安全认证请求之后的第二指定时间段。
可选地,在一种实施方式中,所述数据获取单元610,用于:从所述目标用户发起所述安全认证请求的终端设备中,获取所述目标用户在所述预设时间段内的用户行为数据;和/或从与所述目标用户关联的多个终端设备中,获取所述目标用户在所述预设时间段内的用户行为数据。
可选地,在一种实施方式中,所述目标用户的行为特征序列,包括下述至少一种:所述目标用户的运动轨迹特征序列;所述目标用户的指定关节特征序列;所述目标用户的指定躯干特征序列。
可选地,在一种实施方式中,所述安全认证单元630将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果之后,所述装置还包括:
模型更新单元,基于所述目标用户在所述预设时间段内的行为特征序列和对应的安全认证结果,迭代更新所述安全认证模型。
安全认证装置600能够实现图1~图4的方法实施例的方法,具体可参考图1~图4所示实施例的安全认证方法,不再赘述。
图7是本说明书的一个实施例提供的一种安全认证模型的训练装置700的结构示意图。请参考图7,在一种软件实施方式中,安全认证模型的训练装置700可包括:数据获取单元710,获取目标用户在历史时间段内的多组用户行为数据;序列获取单元720,基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;模型训练单元730,基于所述目标用户的多组行为特征序列,训练得到 所述目标用户的安全认证模型。
通过图7所示的安全认证模型的训练装置可以知道:本说明书提供的一种或多个实施例,在训练认证目标用户行为的安全认证模型时,能够获取目标用户在历史时间段内的多组用户行为数据,再基于目标用户在历史时间段内的多组用户行为数据,获取目标用户的多组行为特征序列,最后基于目标用户的多组行为特征序列,训练得到目标用户的安全认证模型。由于训练的安全认证模型是基于目标用户在历史时间段内的动态行为特征序列训练得到的,这样在对目标用户进行安全认证时,获取该目标用户在认证前的一段时间内的动态行为特征序列,即可实现对目标用户的安全认证,因此也就不再需要目标用户进行过多的刻意配合,从而能够为用户提供更加友好且便捷的安全认证方式。
可选地,在一种实施方式中,所述序列获取单元720,用于:分别从所述目标用户在所述历史时间段内的多组用户行为数据中,抽取所述多组用户行为数据中的多个时间点对应的指定关键点,其中,一个用户在一个时间点对应于多个指定关键点,一组用户行为数据对应于多个时间点;
分别对所述多组用户行为数据中的多个时间点对应的指定关键点进行关联计算,以获取所述多组用户行为数据在所述多个时间点中的各时间点对应的指定关键点之间的关联关系;
基于所述多组用户行为数据在所述多个时间点中的各时间点对应的指定关键点之间的关联关系,获取所述目标用户的行为特征序列。
安全认证模型的训练装置700能够实现图5的方法实施例的方法,具体可参考图5所示实施例的安全认证模型的训练方法,不再赘述。
图8是本说明书的一个实施例电子设备的结构示意图。请参考图8,在硬件层面,该电子设备包括处理器,可选地还包括内部总线、网络接口、存储器。其中,存储器可能包含内存,例如高速随机存取存储器(Random-Access Memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少1个磁盘存储器等。当然,该电子设备还可能包括其他业务所需要的硬件。
处理器、网络接口和存储器可以通过内部总线相互连接,该内部总线可以是ISA(Industry Standard Architecture,工业标准体系结构)总线、PCI(Peripheral Component Interconnect,外设部件互连标准)总线或EISA(Extended Industry Standard Architecture,扩展工业标准结构)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为 便于表示,图8中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。
存储器,用于存放程序。具体地,程序可以包括程序代码,所述程序代码包括计算机操作指令。存储器可以包括内存和非易失性存储器,并向处理器提供指令和数据。
处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成安全认证装置。处理器,执行存储器所存放的程序,并具体用于执行以下操作:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;基于所述用户行为数据获取所述目标用户的行为特征序列;将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
通过图8所示的电子设备可以知道:本说明书提供的一种或多个实施例,在对用户进行安全认证时,能够响应于对目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据,再基于用户行为数据获取目标用户的行为特征序列,最后将目标用户的行为特征序列输入到安全认证模型,得到该行为特征序列对应的安全认证结果,其中安全认证模型为基于目标用户在历史时间段内的多组行为特征序列训练得到的。这样在用户进行安全认证时,由于获取的是用户预设时间段内的动态特征序列,因此不再需要用户进行过多的刻意配合就能实现安全认证,为用户提供更加友好且便捷的安全认证方式。
上述如本说明书图1~图4所示实施例揭示的安全认证装置执行的方法可以应用于处理器中,或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本说明书实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本说明书实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
该电子设备还可执行图1~图4的方法,并实现安全认证装置在图1~图3所示实施例的功能,本说明书实施例在此不再赘述。
当然,除了软件实现方式之外,本说明书的电子设备并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
本说明书实施例还提出了一种计算机可读存储介质,该计算机可读存储介质存储一个或多个程序,该一个或多个程序包括指令,该指令当被包括多个应用程序的便携式电子设备执行时,能够使该便携式电子设备执行图1~图4所示实施例的方法,并具体用于执行以下操作:响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;基于所述用户行为数据获取所述目标用户的行为特征序列;将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
图9是本说明书的一个实施例提供的另一种电子设备的结构示意图。请参考图9,在硬件层面,该电子设备包括处理器,可选地还包括内部总线、网络接口、存储器。其中,存储器可能包含内存,例如高速随机存取存储器(Random-Access Memory,RAM),也可能还包括非易失性存储器(non-volatile memory),例如至少1个磁盘存储器等。当然,该电子设备还可能包括其他业务所需要的硬件。
处理器、网络接口和存储器可以通过内部总线相互连接,该内部总线可以是ISA(Industry Standard Architecture,工业标准体系结构)总线、PCI(Peripheral Component Interconnect,外设部件互连标准)总线或EISA(Extended Industry Standard Architecture,扩展工业标准结构)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。
存储器,用于存放程序。具体地,程序可以包括程序代码,所述程序代码包括计算机操作指令。存储器可以包括内存和非易失性存储器,并向处理器提供指令和数据。
处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成上述安全认证模型的训练装置。处理器,执行存储器所存放的程序,并具体用于执行以下操作:获取目标用户在历史时间段内的多组用户行为数据;基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
通过图9所示的电子设备可以知道:本说明书提供的一种或多个实施例,在训练认 证目标用户行为的安全认证模型时,能够获取目标用户在历史时间段内的多组用户行为数据,再基于目标用户在历史时间段内的多组用户行为数据,获取目标用户的多组行为特征序列,最后基于目标用户的多组行为特征序列,训练得到目标用户的安全认证模型。由于训练的安全认证模型是基于目标用户在历史时间段内的动态行为特征序列训练得到的,这样在对目标用户进行安全认证时,获取该目标用户在认证前的一段时间内的动态行为特征序列,即可实现对目标用户的安全认证,因此也就不再需要目标用户进行过多的刻意配合,从而能够为用户提供更加友好且便捷的安全认证方式。
上述如本说明书图5所示实施例揭示的训练安全认证模型的方法可以应用于处理器中,或者由处理器实现。处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本说明书实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本说明书实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
应理解,本说明书实施例的电子设备可以实现上述训练安全认证模型的装置在图1所示的实施例的功能,本文不再赘述。
当然,除了软件实现方式之外,本说明书的电子设备并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
此外,本说明书实施例还提出了一种计算机可读存储介质,该计算机可读存储介质存储一个或多个程序,该一个或多个程序包括指令。
可选地,该指令当被包括多个应用程序的便携式电子设备执行时,能够使该便携式电子设备执行图5所示实施例的方法,并具体用于执行以下方法:获取目标用户在历史 时间段内的多组用户行为数据;基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
应理解,上述指令当被包括多个应用程序的便携式电子设备执行时,能够使上文所述的安全认证装置实现图1所示实施例的功能。由于原理相同,本文不再赘述。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
总之,以上所述仅为本说明书的较佳实施例而已,并非用于限定本说明书的保护范围。凡在本说明书的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本说明书的保护范围之内。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而 且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。

Claims (13)

  1. 一种安全认证方法,包括:
    响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;
    基于所述用户行为数据获取所述目标用户的行为特征序列;
    将所述目标用户的行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果;其中,所述安全认证模型为基于所述目标用户在历史时间段内的多组行为特征序列训练得到的。
  2. 如权利要求1所述的方法,所述预设时间段包括如下至少一种:
    发起所述安全认证请求之前的指定时间段;
    发起所述安全认证请求之后的指定时间段;
    发起所述安全认证请求之前的第一指定时间段和发起所述安全认证请求之后的第二指定时间段。
  3. 如权利要求1所述的方法,获取目标用户在预设时间段内的用户行为数据,包括:
    从所述目标用户发起所述安全认证请求的终端设备中,获取所述目标用户在所述预设时间段内的用户行为数据;和/或
    从与所述目标用户关联的多个终端设备中,获取所述目标用户在所述预设时间段内的用户行为数据。
  4. 如权利要求1所述的方法,所述目标用户的行为特征序列,包括下述至少一种:
    所述目标用户的运动轨迹特征序列;
    所述目标用户的指定关节特征序列;
    所述目标用户的指定躯干特征序列。
  5. 如权利要求1所述的方法,将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果之后,所述方法还包括:
    基于所述目标用户在所述预设时间段内的行为特征序列和对应的安全认证结果,迭代更新所述安全认证模型。
  6. 一种训练安全认证模型的方法,包括:
    获取目标用户在历史时间段内的多组用户行为数据;
    基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;
    基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
  7. 如权利要求6所述的方法,基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列,包括:
    分别从所述目标用户在所述历史时间段内的多组用户行为数据中,抽取所述多组用户行为数据中的多个时间点对应的指定关键点,其中,一个用户在一个时间点对应于多个指定关键点,一组用户行为数据对应于多个时间点;
    分别对所述多组用户行为数据中的多个时间点对应的指定关键点进行关联计算,以获取所述多组用户行为数据在所述多个时间点中的各时间点对应的指定关键点之间的关联关系;
    基于所述多组用户行为数据在所述多个时间点中的各时间点对应的指定关键点之间的关联关系,获取所述目标用户的行为特征序列。
  8. 一种安全认证装置,包括:
    数据获取单元,响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;
    序列获取单元,基于所述用户行为数据获取所述目标用户的行为特征序列;
    安全认证单元,将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
  9. 一种安全认证模型的训练装置,包括:
    数据获取单元,获取目标用户在历史时间段内的多组用户行为数据;
    序列获取单元,基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;
    模型训练单元,基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
  10. 一种电子设备,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
    响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;
    基于所述用户行为数据获取所述目标用户的行为特征序列;
    将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证 结果。
  11. 一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:
    响应于对所述目标用户的安全认证请求,获取目标用户在预设时间段内的用户行为数据;
    基于所述用户行为数据获取所述目标用户的行为特征序列;
    将所述行为特征序列输入安全认证模型,以得到所述行为特征序列对应的安全认证结果。
  12. 一种电子设备,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
    获取目标用户在历史时间段内的多组用户行为数据;
    基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;
    基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
  13. 一种计算机可读存储介质,所述计算机可读存储介质存储一个或多个程序,所述一个或多个程序当被包括多个应用程序的电子设备执行时,使得所述电子设备执行以下操作:
    获取目标用户在历史时间段内的多组用户行为数据;
    基于所述目标用户在所述历史时间段内的多组用户行为数据,获取所述目标用户的多组行为特征序列;
    基于所述目标用户的多组行为特征序列,训练得到所述目标用户的安全认证模型。
PCT/CN2020/103612 2019-10-28 2020-07-22 安全认证以及训练安全认证模型的方法、装置及电子设备 WO2021082543A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911031839.0 2019-10-28
CN201911031839.0A CN110807180A (zh) 2019-10-28 2019-10-28 安全认证以及训练安全认证模型的方法、装置及电子设备

Publications (1)

Publication Number Publication Date
WO2021082543A1 true WO2021082543A1 (zh) 2021-05-06

Family

ID=69489268

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/103612 WO2021082543A1 (zh) 2019-10-28 2020-07-22 安全认证以及训练安全认证模型的方法、装置及电子设备

Country Status (3)

Country Link
CN (1) CN110807180A (zh)
TW (1) TWI788662B (zh)
WO (1) WO2021082543A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792341A (zh) * 2021-09-15 2021-12-14 百度在线网络技术(北京)有限公司 应用程序的隐私合规自动化检测方法、装置、设备及介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807180A (zh) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 安全认证以及训练安全认证模型的方法、装置及电子设备
WO2021243534A1 (zh) * 2020-06-02 2021-12-09 深圳市欢太科技有限公司 一种行为控制方法及装置、存储介质
CN111885597B (zh) * 2020-09-28 2021-01-01 上海兴容信息技术有限公司 一种安全认证的方法和系统
CN113259368B (zh) * 2021-06-01 2021-10-12 北京芯盾时代科技有限公司 一种身份认证方法、装置及设备
CN113572753B (zh) * 2021-07-16 2023-03-14 北京淇瑀信息科技有限公司 基于牛顿冷却定律的用户设备认证方法和装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148633A1 (en) * 2009-12-21 2011-06-23 Kohlenberg Tobias M Using trajectory for authentication
CN106650350A (zh) * 2016-10-21 2017-05-10 中国银联股份有限公司 一种身份认证方法及系统
CN107018121A (zh) * 2016-10-13 2017-08-04 阿里巴巴集团控股有限公司 用户身份验证的方法及装置
CN107016346A (zh) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 步态身份识别方法及系统
CN108549806A (zh) * 2018-04-11 2018-09-18 西安电子科技大学 基于用户滑动和点击行为的身份认证方法
CN109977639A (zh) * 2018-10-26 2019-07-05 招商银行股份有限公司 身份认证方法、装置及计算机可读存储介质
CN110807180A (zh) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 安全认证以及训练安全认证模型的方法、装置及电子设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101257207B1 (ko) * 2012-02-23 2013-04-22 인텔 코오퍼레이션 헤드 트래킹 방법, 장치 및 컴퓨터 판독 가능한 기록 매체
CN105049421A (zh) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 基于用户使用行为特征的认证方法、服务器、终端及系统
US20170199969A1 (en) * 2016-01-11 2017-07-13 The Joan and Irwin Jacobs Technion-Cornell Innovation Institute System and method for monitoring gross motor behavior
FR3064090B1 (fr) * 2017-03-17 2021-09-17 Valeo Comfort & Driving Assistance Module de commande pour habitacle de vehicule
CN109145575A (zh) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 一种应用使用权限的分配方法及装置
CN110163611B (zh) * 2019-03-18 2022-12-27 腾讯科技(深圳)有限公司 一种身份识别方法、装置以及相关设备
CN110276189B (zh) * 2019-06-27 2022-02-11 电子科技大学 一种基于步态信息的用户身份认证方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148633A1 (en) * 2009-12-21 2011-06-23 Kohlenberg Tobias M Using trajectory for authentication
CN107018121A (zh) * 2016-10-13 2017-08-04 阿里巴巴集团控股有限公司 用户身份验证的方法及装置
CN106650350A (zh) * 2016-10-21 2017-05-10 中国银联股份有限公司 一种身份认证方法及系统
CN107016346A (zh) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 步态身份识别方法及系统
CN108549806A (zh) * 2018-04-11 2018-09-18 西安电子科技大学 基于用户滑动和点击行为的身份认证方法
CN109977639A (zh) * 2018-10-26 2019-07-05 招商银行股份有限公司 身份认证方法、装置及计算机可读存储介质
CN110807180A (zh) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 安全认证以及训练安全认证模型的方法、装置及电子设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792341A (zh) * 2021-09-15 2021-12-14 百度在线网络技术(北京)有限公司 应用程序的隐私合规自动化检测方法、装置、设备及介质
CN113792341B (zh) * 2021-09-15 2023-10-13 百度在线网络技术(北京)有限公司 应用程序的隐私合规自动化检测方法、装置、设备及介质

Also Published As

Publication number Publication date
TWI788662B (zh) 2023-01-01
TW202117568A (zh) 2021-05-01
CN110807180A (zh) 2020-02-18

Similar Documents

Publication Publication Date Title
WO2021082543A1 (zh) 安全认证以及训练安全认证模型的方法、装置及电子设备
US11983964B2 (en) Liveness detection
US10867025B2 (en) Opportunistically collecting sensor data from a mobile device to facilitate user identification
US11256793B2 (en) Method and device for identity authentication
US20220004611A1 (en) Identifying and authenticating users based on passive factors determined from sensor data
TWI681350B (zh) 用於在行動設備上進行掃碼支付的方法及裝置
US8928587B1 (en) Automatic device login based on wearable sensor fusion
Blanco‐Gonzalo et al. Performance evaluation of handwritten signature recognition in mobile environments
US20150363582A1 (en) Technologies for determining confidence of user authentication
US10339288B2 (en) User authentication for mobile devices using behavioral analysis
US9686274B2 (en) Informed implicit enrollment and identification
US20160350761A1 (en) Method and Apparatus for Managing Reference Templates for User Authentication Using Behaviometrics
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
US9721087B1 (en) User authentication
WO2021077825A1 (zh) 一种安全认证方法及相关装置
US20160294835A1 (en) Initiating a Secure Action Via Physical Manipulation
WO2020233137A1 (zh) 损失函数取值的确定方法、装置和电子设备
CN107690608A (zh) 通过rfid扫描对姿势输入的认证
CN113497807A (zh) 检测用户登录风险的方法、装置及计算机可读存储介质
US20150062005A1 (en) Method and system for providing user interaction when capturing content in an electronic device
CN111160251A (zh) 一种活体识别方法及装置
TWI584146B (zh) 基於人臉識別的整合登錄系統及方法
WO2020088008A1 (zh) 基于区块链的生物特征信息处理方法和装置、终端设备
US10685131B1 (en) User authentication
CN111178277A (zh) 一种视频流识别方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20880889

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20880889

Country of ref document: EP

Kind code of ref document: A1