Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information identification method, information identification equipment and user terminal

A technology for user terminal and information identification, applied in the field of mobile Internet, can solve the problems of poor security guarantee effect, insufficient security guarantee measures, and increase the cumbersome operation of users.

Inactive Publication Date: 2016-03-30
YINLIAN FINANCIAL INFORMATION SERVICE BEIJING CO LTD
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the direct result of this is that every transaction requires the customer to request a verification code and enter the verification code to trade, and the time for entering the verification code is also limited, and it will become invalid when it expires, which increases the cumbersomeness of user operations. At the same time, the user's mobile phone must be kept Power on and cannot be in arrears;
[0006] 3. Reminders for large consumption amounts. Some financial institutions will send SMS reminders to consumers for each purchase, telling consumers the transaction amount and transaction location. If there is any transaction abnormality, consumers will take the initiative to call the police or perform other operations. However, this setting is still unable to avoid fraudulent brushing after the occurrence of fraudulent brushing, and cannot increase the security of mobile payment;
[0011] To sum up, the security measures for user terminals in mobile applications in the prior art are not perfect enough, either the security effect is poor, or the operation is too complicated, which affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information identification method, information identification equipment and user terminal
  • Information identification method, information identification equipment and user terminal
  • Information identification method, information identification equipment and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Refer to attached figure 1 , an embodiment of the present invention provides an information identification method, including:

[0077] S1. Obtain a first behavior parameter of the user terminal, where the first behavior parameter includes location information of the user terminal and time information corresponding to the location information;

[0078] In one embodiment of the present invention, the first behavior parameter of the user terminal may be the previous historical behavior parameter of the user terminal, and the server may continuously obtain the user terminal's behavior parameters within a fixed period (such as one week, one month, one quarter, one year, etc.) Behavioral parameters, and conduct statistical analysis on the acquired behavioral parameters. In a preferred solution of this embodiment, the first behavior parameter includes the location information of the user terminal and the time information corresponding to the location information, such as the ...

Embodiment 2

[0113] Refer to attached figure 2 , the embodiment of the present invention also provides an information identification method, wherein:

[0114] 200. Configure the behavior analysis model of the user terminal on the server, specifically establish a matrix on the server, the matrix contains the scene factors of the user terminal in different scenarios, the row vector of the matrix can represent the identity of the user terminal, and the column vector can represent Scene ID, fill in the scene factor of the scene in the intersecting spaces of row vector and column vector, specifically:

[0115]

scene 1

scene 2

scene 3

……

Scene N

user 1

0

1

3

……

0

user 2

1

0

2

1

[0116] ……

……

……

……

……

……

user n

0

1

0

……

1

[0117] In addition, when configured on the server, all areas with a scenario factor greater than 1 are safe areas...

Embodiment 3

[0122] Refer to attached image 3 , the embodiment of the present invention also provides an information identification method, wherein:

[0123] 300. Configure the behavior analysis model of the user terminal on the server, specifically according to the aforementioned clustering method, cluster and group the user terminals stored on the server, such as clustering user terminals 2, 3, 4, and 5 into the first Group, clustering the user terminals 6, 7, 8, 9 into a second group. The security rule corresponding to the first group is that the user terminals in the group can perform all online services, and the security rule corresponding to the second group is that the user terminals in the group can only perform online payment services;

[0124] 301. When the user terminal 7 initiates an online remittance service, the server obtains the identification of the user terminal 7, and determines that the user terminal 7 is located in the second group according to the identification, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention provides an information identification method, information identification equipment and user terminal. The method includes the steps of: obtaining a first behavior parameter of a user terminal, the first behavior parameter including position information of the user terminal and time information corresponding to the position information, and building a behavior analysis model of the user terminal according to the first behavior parameter of the user terminal; obtaining a second behavior parameter of the user terminal, the second behavior parameter including position information when the user terminal executes a current on-line service and time information corresponding to the position information, and determining whether to allow the user terminal to execute the current on-line service according to the second behavior parameter of the user terminal and the behavior analysis model of the user terminal. The information identification method, information identification equipment and user terminal provided by the embodiment of the invention can effectively improve security of executing the on-line service.

Description

technical field [0001] The invention relates to the field of mobile Internet, in particular to an information identification method, an information identification device and a user terminal. Background technique [0002] With the rapid development of the mobile Internet, for example, the current 3G and 4G networks have covered most areas, and the popularity of smart terminals is getting higher and higher. More and more people use smart terminals to handle daily mobile application services, such as Office, shopping, remittance, payment of public utilities, etc. Among them, the fastest-growing online payment business brought by online shopping, such as WeChat payment, mobile phone Taobao, etc. [0003] The use of smart terminals for mobile applications, such as online payment services, is convenient and fast, but security has always attracted attention. Not only users are concerned about the security of mobile payments, but operators, banks, and merchants are also very concer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q20/40G06F17/30
Inventor 程明强耿志贤孙大勇高宝贵张佳益
Owner YINLIAN FINANCIAL INFORMATION SERVICE BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products