CN110807180A - Method and device for safety certification and training safety certification model and electronic equipment - Google Patents

Method and device for safety certification and training safety certification model and electronic equipment Download PDF

Info

Publication number
CN110807180A
CN110807180A CN201911031839.0A CN201911031839A CN110807180A CN 110807180 A CN110807180 A CN 110807180A CN 201911031839 A CN201911031839 A CN 201911031839A CN 110807180 A CN110807180 A CN 110807180A
Authority
CN
China
Prior art keywords
target user
user
time period
behavior data
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911031839.0A
Other languages
Chinese (zh)
Inventor
刘磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911031839.0A priority Critical patent/CN110807180A/en
Publication of CN110807180A publication Critical patent/CN110807180A/en
Priority to TW109114889A priority patent/TWI788662B/en
Priority to PCT/CN2020/103612 priority patent/WO2021082543A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Social Psychology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Collating Specific Patterns (AREA)
  • Color Printing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification discloses a security certification and a method, a device and an electronic device for training a security certification model, wherein the method comprises the following steps: responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period; acquiring a behavior characteristic sequence of the target user based on the user behavior data; inputting the behavior characteristic sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence; the safety certification model is obtained by training based on a plurality of groups of behavior characteristic sequences of the target user in a historical time period.

Description

Method and device for safety certification and training safety certification model and electronic equipment
Technical Field
The present disclosure relates to the field of computer software technologies, and in particular, to a method, an apparatus, and an electronic device for security authentication and security authentication model training.
Background
The current terminal device mainly adopts a static security authentication mode, such as fingerprint authentication, face authentication, password authentication, and the like. In this way, the static authentication information needs to be stored in the computer memory and transmitted through the network, so that there is a risk of being intercepted by the trojan horse program or the monitoring device. In addition, this approach requires user cooperation, such as fingerprint authentication, which requires the user's fingers to be kept dry and clean, face authentication, which requires a specific angle, and password authentication, which requires the user to input password information. Obviously, the security authentication methods are not convenient enough for users, and influence the use experience of the users to a certain extent.
In view of the above, a security authentication method that is more user-friendly and more convenient is needed.
Disclosure of Invention
An object of an embodiment of the present disclosure is to provide a method, an apparatus, and an electronic device for security authentication and training a security authentication model, which can provide a more friendly and more convenient security authentication method for a user.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
in a first aspect, a security authentication method is provided, where the method includes:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
inputting the behavior characteristic sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence; the safety certification model is obtained by training based on a plurality of groups of behavior characteristic sequences of the target user in a historical time period.
In a second aspect, a method for training a security certification model is provided, including:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
In a third aspect, a security authentication apparatus is provided, including:
the data acquisition unit is used for responding to the security authentication request of the target user and acquiring user behavior data of the target user in a preset time period;
the sequence acquisition unit is used for acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and the safety authentication unit is used for inputting the behavior characteristic sequence into a safety authentication model so as to obtain a safety authentication result corresponding to the behavior characteristic sequence.
In a fourth aspect, a training apparatus for a security certification model is provided, including:
the data acquisition unit is used for acquiring a plurality of groups of user behavior data of a target user in a historical time period;
the sequence acquisition unit is used for acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and the model training unit is used for training to obtain the safety certification model of the target user based on the plurality of groups of behavior characteristic sequences of the target user.
In a fifth aspect, an electronic device is provided, which includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
In a sixth aspect, a computer-readable storage medium is presented, storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
In a seventh aspect, an electronic device is provided, which includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
In an eighth aspect, a computer-readable storage medium is presented, the computer-readable storage medium storing one or more programs that, when executed by an electronic device that includes a plurality of application programs, cause the electronic device to:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
As can be seen from the technical solutions provided in the embodiments of the present specification, the embodiments of the present specification have at least one of the following technical effects:
one or more embodiments provided in this specification can, when performing security authentication on a user, respond to a security authentication request for a target user, obtain user behavior data of the target user within a preset time period, then obtain a behavior feature sequence of the target user based on the user behavior data, and finally input the behavior feature sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, where the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user within a historical time period. Therefore, when the user performs the safety authentication, the dynamic characteristic sequence in the user preset time period is obtained, so that the safety authentication can be realized without excessive deliberate cooperation of the user, and a more friendly and convenient safety authentication mode is provided for the user.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a method of a security authentication method according to an embodiment of the present disclosure.
Fig. 2 is an interaction flowchart of a security authentication method applied in an actual scenario according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram of a feature sequence of an acquired motion trajectory provided in an embodiment of the present specification.
Fig. 4 is a schematic diagram of probability of acquiring behavior habits of a user in a preset time period in a security authentication method provided in an embodiment of the present specification.
Fig. 5 is a schematic flow chart of an implementation of a method for training a security certification model according to an embodiment of the present specification.
Fig. 6 is a schematic structural diagram of a security authentication apparatus according to an embodiment of the present disclosure.
Fig. 7 is a schematic structural diagram of a training apparatus for a security certification model according to an embodiment of the present disclosure.
Fig. 8 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Fig. 9 is a schematic structural diagram of another electronic device provided in an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present specification clearer, the technical solutions in the present specification will be clearly and completely described below with reference to the specific embodiments of the present specification and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of this document, and not all embodiments. All other embodiments obtained by a person skilled in the art without making creative efforts based on the embodiments in this document belong to the protection scope of this document.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
As mentioned above, the current terminal devices mainly adopt static security authentication methods, such as fingerprint authentication, face authentication, password authentication, and the like. In this way, on one hand, the static authentication information needs to be stored in a computer memory and transmitted in a network, so that the risk that the authentication information is intercepted by a trojan program or a monitoring device exists; on the other hand, the user is also required to cooperate with the authentication operation, for example, fingerprint authentication requires the user to press a finger on the fingerprint identification module and keep the finger dry and clean, and facial authentication requires the user to hold a device to collect a facial image at a specific angle, which is not convenient for the user and affects the use experience of the user.
In view of the above problems, embodiments of the present specification aim to provide a secure authentication method that can provide a user with more friendliness and convenience.
Fig. 1 is a flowchart of a method of a security authentication method according to an embodiment of the present disclosure. The method of fig. 1 may include:
s102, responding to a security authentication request of a target user, and acquiring user behavior data of the target user in a preset time period.
It should be understood that in daily life, there are usually habit differences between users, such as walking frequency, stride, running posture, speed, frequency and granularity of touching the screen when using the terminal device, and habit of using applications installed in the terminal device, usage preference, etc., and a slight difference between these different categories of behaviors forms a huge difference between users. Based on this point, the embodiment of the present specification may obtain user behavior data of the target user in a preset time period, where the user behavior data can represent dynamic and continuous behavior data of the target user in the preset time period.
Optionally, in order to obtain data capable of characterizing the dynamic and continuous behavior of the user over a period of time, the preset time period includes at least one of the following:
a specified time period prior to initiating a security authentication request;
a specified time period after the initiation of the security authentication request;
a first specified time period before initiating the secure authentication request and a second specified time period after initiating the secure authentication request.
The specified time period before the security authentication request is initiated may be, for example, several hours before the security authentication request is initiated; a specified time period after the initiation of the security authentication request, such as within 1 minute or half minute after the initiation of the security request; the first specified time period before the security authentication request is initiated and the second specified time period after the security authentication request is initiated may include, for example, within several hours before the security authentication request is initiated and within 1 minute or half minute after the security authentication request is initiated, that is, user behavior data of the target user in the two periods are integrated, security authentication is performed on the target user, and it is determined whether behavior characteristics of the target user in the two periods are abnormal to behavior characteristics learned in the past.
Optionally, a user will usually use a plurality of terminal devices at the same time, and the terminal devices may include but are not limited to: common user personal equipment such as PC, cell-phone, PAD, intelligent bracelet, smart glasses, and this type of terminal equipment generally has the function of gathering user's action characteristic sequence. In order to more fully acquire user behavior data of a target user within a preset time period, in the embodiments of the present specification, user behavior data of the target user within the preset time period may be acquired from a terminal device where the target user initiates a security authentication request, or may be acquired from a plurality of terminal devices associated with the target user within the preset time period. Specifically, acquiring user behavior data of a target user in a preset time period includes:
acquiring user behavior data of a target user within a preset time period from terminal equipment for initiating a security authentication request by the target user; and/or
And acquiring user behavior data of the target user in a preset time period from a plurality of terminal devices associated with the target user.
As shown in fig. 2, a schematic diagram of a security authentication method applied in an actual scene provided in the embodiment of the present specification is shown. The plurality of terminal devices associated with the target user comprise a mobile phone, a PC (personal computer) and an intelligent bracelet, the terminal device of the user initiating the security authentication request is the mobile phone, the device executing the security authentication operation is the cloud server, and in practical application, the device executing the security authentication operation can also be the terminal device appointed by the user.
When a target user uses the mobile phone to unlock the screen, the screen unlocking needs to perform security authentication on the target user, and at the moment, the mobile phone sends the security authentication request to the cloud server; the cloud server responds to the security authentication request, and user behavior data of the target user in a preset time period are acquired from a mobile phone, a PC and an intelligent bracelet which are associated with the target user; and the cloud server performs security authentication on the target user based on the user behavior data, feeds back a security authentication result to the mobile phone, successfully unlocks the screen if the security authentication on the target user passes, and fails to unlock the screen if the security authentication on the target user fails.
And S104, acquiring a behavior characteristic sequence of the target user based on the user behavior data.
Optionally, when acquiring the behavior feature data of the target user, the target user may be abstracted into a specified number of key points (or may also be specified joints), the key points, after being associated with each other, may represent the complete trunk of the target user, and at each time point, the target user may represent the action of the target user at each time point through the association relationship between the key points. Specifically, the behavior feature sequence of the target user includes at least one of the following:
a motion trail characteristic sequence of the target user;
a specified joint feature sequence of the target user;
a specified torso feature sequence of the target user.
Fig. 3 is a schematic diagram of a feature sequence of an acquired motion trajectory provided in the embodiment of the present disclosure. As shown in fig. 3(a), to abstract the target user into 17 key points, which include joints of the target user, there are some associations between the key points, i.e., connections between the key points. Fig. 3(b) is a schematic diagram showing the division of these key points into the upper body and the lower body of the target user. As shown in fig. 3(c), the first graph is the collected actions of the target user at four consecutive time points within a period of time, and the actions at the four consecutive time points form an action track sequence of the target user within the period of time; the second graph is the collected lower body movements of the target user at four continuous time points in the period of time; the third graph is the collected upper body movements of the target user at four consecutive time points within the period of time.
As shown in fig. 4, a schematic diagram for recording probabilities of four different states of a target user in the past 0-3.5 s is provided for the embodiment of the present specification, where the four states include a walking state, a stop state, a start state, and a standing state. The probability diagrams of the four different states can reflect the behavior characteristics of the target user in the period of time, and it can be seen that the probability that the target user is in the walking state in the period of time is higher than the probabilities of the other three states.
S106, inputting the behavior characteristic sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence; the safety certification model is obtained by training based on multiple groups of behavior characteristic sequences of the target user in a historical time period.
Optionally, in order to continuously optimize the security authentication model and improve the security authentication accuracy of the security authentication model, after the behavior feature sequence is input into the security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, the method further includes:
and iteratively updating the security authentication model based on the behavior characteristic sequence of the target user in the preset time period and the corresponding security authentication result.
One or more embodiments provided in this specification can, when performing security authentication on a user, respond to a security authentication request for a target user, obtain user behavior data of the target user within a preset time period, then obtain a behavior feature sequence of the target user based on the user behavior data, and finally input the behavior feature sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, where the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user within a historical time period. Therefore, when the user performs the safety authentication, the dynamic characteristic sequence in the user preset time period is obtained, so that the safety authentication can be realized without excessive deliberate cooperation of the user, and a more friendly and convenient safety authentication mode is provided for the user.
Fig. 5 is a schematic implementation flow diagram of a method for training a security certification model according to an embodiment of the present specification, including:
s502, acquiring multiple groups of user behavior data of the target user in the historical time period.
The plurality of groups of user behavior data are user behavior data in a plurality of groups of different time periods.
S504, based on the multiple groups of user behavior data of the target user in the historical time period, multiple groups of behavior feature sequences of the target user are obtained.
Optionally, the user behavior data of the target user may be collected based on a plurality of terminal devices associated with the target user in combination, for example, the smart band may collect motion trajectory data at the joints of the user's hands, and the smart glasses may collect motion trajectory data of the user's head. Specifically, acquiring multiple groups of behavior feature sequences of the target user based on multiple groups of user behavior data of the target user in a historical time period includes:
respectively extracting specified key points corresponding to a plurality of time points in the plurality of groups of user behavior data from a plurality of groups of user behavior data of a target user in a historical time period, wherein one user corresponds to the specified key points at one time point, and one group of user behavior data corresponds to the time points;
respectively carrying out association calculation on designated key points corresponding to a plurality of time points in the plurality of groups of user behavior data to acquire association relations between the designated key points corresponding to each time point in the plurality of time points of the plurality of groups of user behavior data;
and acquiring a behavior feature sequence of the target user based on the incidence relation between the designated key points corresponding to the time points in the multiple time points of the multiple groups of user behavior data.
Among them, the specified keypoints may correspond to the 17 keypoints shown in fig. 3 (a). In order to obtain a dynamic behavior feature sequence, the set of user behavior data corresponds to a plurality of time points which should be continuous.
S506, training to obtain a safety certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
In one or more embodiments provided in this specification, when training a security authentication model that authenticates behaviors of a target user, multiple sets of user behavior data of the target user in a historical time period may be obtained, multiple sets of behavior feature sequences of the target user may be obtained based on the multiple sets of user behavior data of the target user in the historical time period, and finally, the security authentication model of the target user may be obtained based on the multiple sets of behavior feature sequences of the target user. The trained safety certification model is obtained by training based on the dynamic behavior characteristic sequence of the target user in the historical time period, so that when the target user is subjected to safety certification, the dynamic behavior characteristic sequence of the target user in a period of time before certification is obtained, and the safety certification of the target user can be realized, so that the target user is not required to be subjected to excessive deliberate cooperation, and a more friendly and convenient safety certification mode can be provided for the user.
Fig. 6 is a schematic structural diagram of a security authentication apparatus 600 according to an embodiment of the present disclosure. Referring to fig. 6, in a software implementation, the security authentication apparatus 600 may include:
the data acquisition unit 610 is used for responding to a security authentication request of the target user and acquiring user behavior data of the target user in a preset time period;
a sequence obtaining unit 620, configured to obtain a behavior feature sequence of the target user based on the user behavior data;
the security authentication unit 630 inputs the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence.
As can be seen from the security authentication apparatus shown in fig. 6: one or more embodiments provided in this specification can, when performing security authentication on a user, respond to a security authentication request for a target user, obtain user behavior data of the target user within a preset time period, then obtain a behavior feature sequence of the target user based on the user behavior data, and finally input the behavior feature sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, where the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user within a historical time period. Therefore, when the user performs the safety authentication, the dynamic characteristic sequence in the user preset time period is obtained, so that the safety authentication can be realized without excessive deliberate cooperation of the user, and a more friendly and convenient safety authentication mode is provided for the user.
Optionally, in an embodiment, the preset time period includes at least one of:
a specified time period prior to initiating the secure authentication request;
a specified time period after the initiation of the secure authentication request;
a first specified time period before the initiation of the secure authentication request and a second specified time period after the initiation of the secure authentication request.
Optionally, in an embodiment, the data obtaining unit 610 is configured to:
acquiring user behavior data of the target user in the preset time period from the terminal equipment of the target user initiating the security authentication request; and/or
And acquiring user behavior data of the target user in the preset time period from a plurality of terminal devices associated with the target user.
Optionally, in an embodiment, the behavior feature sequence of the target user includes at least one of:
the motion trail characteristic sequence of the target user;
a specified sequence of joint features of the target user;
a specified torso feature sequence of the target user.
Optionally, in an embodiment, after the security authentication unit 630 inputs the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, the apparatus further includes:
and the model updating unit 640 iteratively updates the security authentication model based on the behavior feature sequence of the target user in the preset time period and the corresponding security authentication result.
The security authentication apparatus 600 can implement the method of the embodiment of the method shown in fig. 1 to fig. 4, and specifically refer to the security authentication method of the embodiment shown in fig. 1 to fig. 4, which is not described again.
Fig. 7 is a schematic structural diagram of a training apparatus 700 for a security certification model according to an embodiment of the present disclosure. Referring to fig. 7, in a software implementation, the training apparatus 700 for the security certification model may include:
the data acquisition unit 710 is used for acquiring a plurality of groups of user behavior data of a target user in a historical time period;
a sequence obtaining unit 720, configured to obtain multiple sets of behavior feature sequences of the target user based on multiple sets of user behavior data of the target user in the historical time period;
and a model training unit 730 for training to obtain the security certification model of the target user based on the plurality of groups of behavior feature sequences of the target user.
As can be seen from the training apparatus of the security certification model shown in fig. 7: in one or more embodiments provided in this specification, when training a security authentication model that authenticates behaviors of a target user, multiple sets of user behavior data of the target user in a historical time period may be obtained, multiple sets of behavior feature sequences of the target user may be obtained based on the multiple sets of user behavior data of the target user in the historical time period, and finally, the security authentication model of the target user may be obtained based on the multiple sets of behavior feature sequences of the target user. The trained safety certification model is obtained by training based on the dynamic behavior characteristic sequence of the target user in the historical time period, so that when the target user is subjected to safety certification, the dynamic behavior characteristic sequence of the target user in a period of time before certification is obtained, and the safety certification of the target user can be realized, so that the target user is not required to be subjected to excessive deliberate cooperation, and a more friendly and convenient safety certification mode can be provided for the user.
Optionally, in an embodiment, the sequence obtaining unit 720 is configured to:
respectively extracting specified key points corresponding to a plurality of time points in the plurality of groups of user behavior data from a plurality of groups of user behavior data of the target user in the historical time period, wherein one user corresponds to the specified key points at one time point, and one group of user behavior data corresponds to the time points;
respectively carrying out association calculation on designated key points corresponding to a plurality of time points in the plurality of groups of user behavior data so as to obtain association relations between the designated key points corresponding to each time point in the plurality of time points of the plurality of groups of user behavior data;
and acquiring the behavior characteristic sequence of the target user based on the incidence relation between the designated key points corresponding to the time points in the multiple time points of the multiple groups of user behavior data.
The training apparatus 700 of the security authentication model can implement the method of the embodiment of the method in fig. 5, and specifically refer to the training method of the security authentication model of the embodiment shown in fig. 5, which is not described again.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present specification. Referring to fig. 8, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 8, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program, and forms a security authentication device on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
As can be appreciated by the electronic device shown in fig. 8: one or more embodiments provided in this specification can, when performing security authentication on a user, respond to a security authentication request for a target user, obtain user behavior data of the target user within a preset time period, then obtain a behavior feature sequence of the target user based on the user behavior data, and finally input the behavior feature sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, where the security authentication model is obtained by training based on multiple sets of behavior feature sequences of the target user within a historical time period. Therefore, when the user performs the safety authentication, the dynamic characteristic sequence in the user preset time period is obtained, so that the safety authentication can be realized without excessive deliberate cooperation of the user, and a more friendly and convenient safety authentication mode is provided for the user.
The method performed by the security authentication apparatus disclosed in the embodiments of fig. 1 to 4 in this specification may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present specification may be embodied directly in a hardware decoding processor, or in a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may further execute the methods shown in fig. 1 to fig. 4, and implement the functions of the security authentication apparatus in the embodiments shown in fig. 1 to fig. 3, which are not described herein again in this specification.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Embodiments of the present specification also provide a computer-readable storage medium storing one or more programs, the one or more programs including instructions, which when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform the method of the embodiments shown in fig. 1-4, and are specifically configured to:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
Fig. 9 is a schematic structural diagram of another electronic device provided in an embodiment of the present specification. Referring to fig. 9, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 9, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the training device of the security certification model on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
As can be appreciated by the electronic device shown in fig. 9: in one or more embodiments provided in this specification, when training a security authentication model that authenticates behaviors of a target user, multiple sets of user behavior data of the target user in a historical time period may be obtained, multiple sets of behavior feature sequences of the target user may be obtained based on the multiple sets of user behavior data of the target user in the historical time period, and finally, the security authentication model of the target user may be obtained based on the multiple sets of behavior feature sequences of the target user. The trained safety certification model is obtained by training based on the dynamic behavior characteristic sequence of the target user in the historical time period, so that when the target user is subjected to safety certification, the dynamic behavior characteristic sequence of the target user in a period of time before certification is obtained, and the safety certification of the target user can be realized, so that the target user is not required to be subjected to excessive deliberate cooperation, and a more friendly and convenient safety certification mode can be provided for the user.
The method for training the security certification model disclosed in the embodiment of fig. 5 of the present specification may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present specification may be embodied directly in a hardware decoding processor, or in a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
It should be understood that the electronic device according to the embodiment of the present disclosure may implement the functions of the apparatus for training a security authentication model shown in fig. 1, and details are not described herein.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Furthermore, the present specification embodiments also propose a computer-readable storage medium storing one or more programs, the one or more programs including instructions.
Optionally, the instructions, when executed by a portable electronic device comprising a plurality of application programs, can cause the portable electronic device to perform the method of the embodiment shown in fig. 5, and in particular to perform the following method:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
It will be appreciated that the above instructions, when executed by a portable electronic device comprising a plurality of applications, enable the security authentication apparatus described above to carry out the functions of the embodiment shown in figure 1. Since the principle is the same, the detailed description is omitted here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

Claims (13)

1. A security authentication method, comprising:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
inputting the behavior characteristic sequence of the target user into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence; the safety certification model is obtained by training based on a plurality of groups of behavior characteristic sequences of the target user in a historical time period.
2. The method of claim 1, the preset time period comprising at least one of:
a specified time period prior to initiating the secure authentication request;
a specified time period after the initiation of the secure authentication request;
a first specified time period before the initiation of the secure authentication request and a second specified time period after the initiation of the secure authentication request.
3. The method of claim 1, wherein obtaining user behavior data of a target user within a preset time period comprises:
acquiring user behavior data of the target user in the preset time period from the terminal equipment of the target user initiating the security authentication request; and/or
And acquiring user behavior data of the target user in the preset time period from a plurality of terminal devices associated with the target user.
4. The method of claim 1, the sequence of behavioral characteristics of the target user comprising at least one of:
the motion trail characteristic sequence of the target user;
a specified sequence of joint features of the target user;
a specified torso feature sequence of the target user.
5. The method of claim 1, after inputting the behavior feature sequence into a security authentication model to obtain a security authentication result corresponding to the behavior feature sequence, the method further comprising:
and iteratively updating the safety authentication model based on the behavior characteristic sequence of the target user in the preset time period and the corresponding safety authentication result.
6. A method of training a security certification model, comprising:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
7. The method of claim 6, wherein obtaining multiple sets of behavior feature sequences of the target user based on multiple sets of user behavior data of the target user over the historical time period comprises:
respectively extracting specified key points corresponding to a plurality of time points in the plurality of groups of user behavior data from a plurality of groups of user behavior data of the target user in the historical time period, wherein one user corresponds to the specified key points at one time point, and one group of user behavior data corresponds to the time points;
respectively carrying out association calculation on designated key points corresponding to a plurality of time points in the plurality of groups of user behavior data so as to obtain association relations between the designated key points corresponding to each time point in the plurality of time points of the plurality of groups of user behavior data;
and acquiring the behavior characteristic sequence of the target user based on the incidence relation between the designated key points corresponding to the time points in the multiple time points of the multiple groups of user behavior data.
8. A security authentication apparatus comprising:
the data acquisition unit is used for responding to the security authentication request of the target user and acquiring user behavior data of the target user in a preset time period;
the sequence acquisition unit is used for acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and the safety authentication unit is used for inputting the behavior characteristic sequence into a safety authentication model so as to obtain a safety authentication result corresponding to the behavior characteristic sequence.
9. A training apparatus for a security certification model, comprising:
the data acquisition unit is used for acquiring a plurality of groups of user behavior data of a target user in a historical time period;
the sequence acquisition unit is used for acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and the model training unit is used for training to obtain the safety certification model of the target user based on the plurality of groups of behavior characteristic sequences of the target user.
10. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
11. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
responding to the security authentication request of the target user, and acquiring user behavior data of the target user in a preset time period;
acquiring a behavior characteristic sequence of the target user based on the user behavior data;
and inputting the behavior characteristic sequence into a security authentication model to obtain a security authentication result corresponding to the behavior characteristic sequence.
12. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
13. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
acquiring a plurality of groups of user behavior data of a target user in a historical time period;
acquiring a plurality of groups of behavior characteristic sequences of the target user based on a plurality of groups of user behavior data of the target user in the historical time period;
and training to obtain a security certification model of the target user based on the multiple groups of behavior characteristic sequences of the target user.
CN201911031839.0A 2019-10-28 2019-10-28 Method and device for safety certification and training safety certification model and electronic equipment Pending CN110807180A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201911031839.0A CN110807180A (en) 2019-10-28 2019-10-28 Method and device for safety certification and training safety certification model and electronic equipment
TW109114889A TWI788662B (en) 2019-10-28 2020-05-05 Security authentication method, method for training security authentication model, security authentication device, training device for security authentication model, electronic device, and computer-readable storage medium
PCT/CN2020/103612 WO2021082543A1 (en) 2019-10-28 2020-07-22 Security authentication method and apparatus, security authentication model training method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911031839.0A CN110807180A (en) 2019-10-28 2019-10-28 Method and device for safety certification and training safety certification model and electronic equipment

Publications (1)

Publication Number Publication Date
CN110807180A true CN110807180A (en) 2020-02-18

Family

ID=69489268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911031839.0A Pending CN110807180A (en) 2019-10-28 2019-10-28 Method and device for safety certification and training safety certification model and electronic equipment

Country Status (3)

Country Link
CN (1) CN110807180A (en)
TW (1) TWI788662B (en)
WO (1) WO2021082543A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111885597A (en) * 2020-09-28 2020-11-03 上海兴容信息技术有限公司 Method and system for security authentication
WO2021082543A1 (en) * 2019-10-28 2021-05-06 支付宝(杭州)信息技术有限公司 Security authentication method and apparatus, security authentication model training method and apparatus, and electronic device
CN113259368A (en) * 2021-06-01 2021-08-13 北京芯盾时代科技有限公司 Identity authentication method, device and equipment
CN113572753A (en) * 2021-07-16 2021-10-29 北京淇瑀信息科技有限公司 User equipment authentication method and device based on Newton's cooling law
WO2021243534A1 (en) * 2020-06-02 2021-12-09 深圳市欢太科技有限公司 Behavior control method and apparatus and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792341B (en) * 2021-09-15 2023-10-13 百度在线网络技术(北京)有限公司 Automatic detection method, device, equipment and medium for privacy compliance of application program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
FR3064090A1 (en) * 2017-03-17 2018-09-21 Valeo Comfort And Driving Assistance CONTROL MODULE FOR A VEHICLE
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN110163611A (en) * 2019-03-18 2019-08-23 腾讯科技(深圳)有限公司 A kind of personal identification method, device and relevant device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148633A1 (en) * 2009-12-21 2011-06-23 Kohlenberg Tobias M Using trajectory for authentication
KR101257207B1 (en) * 2012-02-23 2013-04-22 인텔 코오퍼레이션 Method, apparatus and computer-readable recording medium for head tracking
US20170199969A1 (en) * 2016-01-11 2017-07-13 The Joan and Irwin Jacobs Technion-Cornell Innovation Institute System and method for monitoring gross motor behavior
CN107018121B (en) * 2016-10-13 2021-07-20 创新先进技术有限公司 User identity authentication method and device
CN106650350B (en) * 2016-10-21 2020-02-07 ***股份有限公司 Identity authentication method and system
CN107016346A (en) * 2017-03-09 2017-08-04 中国科学院计算技术研究所 gait identification method and system
CN108549806B (en) * 2018-04-11 2020-01-31 西安电子科技大学 Identity authentication method based on user sliding and clicking behaviors
CN110276189B (en) * 2019-06-27 2022-02-11 电子科技大学 User identity authentication method based on gait information
CN110807180A (en) * 2019-10-28 2020-02-18 支付宝(杭州)信息技术有限公司 Method and device for safety certification and training safety certification model and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049421A (en) * 2015-06-24 2015-11-11 百度在线网络技术(北京)有限公司 Authentication method based on use behavior characteristic of user, server, terminal, and system
FR3064090A1 (en) * 2017-03-17 2018-09-21 Valeo Comfort And Driving Assistance CONTROL MODULE FOR A VEHICLE
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN110163611A (en) * 2019-03-18 2019-08-23 腾讯科技(深圳)有限公司 A kind of personal identification method, device and relevant device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王奎: "一种基于特征曲线匹配的快速步态识别方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021082543A1 (en) * 2019-10-28 2021-05-06 支付宝(杭州)信息技术有限公司 Security authentication method and apparatus, security authentication model training method and apparatus, and electronic device
WO2021243534A1 (en) * 2020-06-02 2021-12-09 深圳市欢太科技有限公司 Behavior control method and apparatus and storage medium
CN111885597A (en) * 2020-09-28 2020-11-03 上海兴容信息技术有限公司 Method and system for security authentication
CN111885597B (en) * 2020-09-28 2021-01-01 上海兴容信息技术有限公司 Method and system for security authentication
CN113259368A (en) * 2021-06-01 2021-08-13 北京芯盾时代科技有限公司 Identity authentication method, device and equipment
CN113259368B (en) * 2021-06-01 2021-10-12 北京芯盾时代科技有限公司 Identity authentication method, device and equipment
CN113572753A (en) * 2021-07-16 2021-10-29 北京淇瑀信息科技有限公司 User equipment authentication method and device based on Newton's cooling law
CN113572753B (en) * 2021-07-16 2023-03-14 北京淇瑀信息科技有限公司 User equipment authentication method and device based on Newton's cooling law

Also Published As

Publication number Publication date
TW202117568A (en) 2021-05-01
WO2021082543A1 (en) 2021-05-06
TWI788662B (en) 2023-01-01

Similar Documents

Publication Publication Date Title
CN110807180A (en) Method and device for safety certification and training safety certification model and electronic equipment
US11256793B2 (en) Method and device for identity authentication
EP3780541B1 (en) Identity information identification method and device
TWI681350B (en) Method and device for code scanning payment on mobile equipment
EP2904537B1 (en) Secure identification of computing device and secure identification methods
CN110011954B (en) Homomorphic encryption-based biological identification method, device, terminal and business server
CN104318147A (en) Information processing method and electronic device
CN107294999B (en) Information verification processing method, device and system, client and server
KR20190085543A (en) Method and apparatus for generating security questions and verifying identities
CN106228054A (en) Auth method and device
US10824891B2 (en) Recognizing biological feature
WO2018107727A1 (en) Method and device for information processing, and terminal
US10747657B2 (en) Methods, systems, apparatuses and devices for facilitating execution of test cases
CN105337739B (en) Safe login method, device, server and terminal
CN105306202B (en) Auth method, device and server
CN111160251B (en) Living body identification method and device
CN106484614A (en) A kind of method of verification picture processing effect, device and mobile terminal
RU2651250C1 (en) Method and device for fingerprints recognition
CN110929240A (en) Login management method, terminal and computer storage medium
US20150062005A1 (en) Method and system for providing user interaction when capturing content in an electronic device
Dandachi et al. A novel identification/verification model using smartphone's sensors and user behavior
CN113342170A (en) Gesture control method, device, terminal and storage medium
WO2020088008A1 (en) Biological characteristic information processing method and apparatus based on block chain, and terminal device
CN111931148A (en) Image processing method and device and electronic equipment
CN111324879A (en) Login state control method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200218

RJ01 Rejection of invention patent application after publication