Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying risk of user

A user and risk technology, applied in the computer field, can solve the problems such as easy theft of user's personal information and reduce the security of business process.

Active Publication Date: 2016-10-05
ADVANCED NEW TECH CO LTD
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, device and system for identifying user risks to solve the problem in the prior art that the personal information of the user is easily stolen, thus reducing the security of the business process related to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying risk of user
  • Method and device for identifying risk of user
  • Method and device for identifying risk of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] figure 1 The process of identifying user risks provided by the embodiment of this application specifically includes the following steps:

[0039] S101: Obtain biometric data of a user.

[0040] The execution subject of the method for identifying user risks provided in the embodiment of the present application may be: a server, a terminal, or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for identifying the risk of a user. The method includes the following steps that: the biological characteristic data of the user are obtained; and when it is determined that the change state of the biological characteristic data accords with a specified condition, it is determined that a risk exists on the user. With the above method adopted, before business interaction with the current user is carried out, or in a business process, not only can the personal information of the user be verified, but also the change state of the biological characteristic data of the user can be analyzed, and / or the biological characteristic data can be subjected to matching, so that whether a risk exists on the user can be determined; and since the biological characteristic data have little possibility of being stolen, reliability is high, and therefore, the safety of a subsequent business process can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a method, device and system for identifying user risks. Background technique [0002] With the rapid development of computer technology and network technology, more and more businesses can be handled through the network. However, there are also network attacks. Illegal users may pretend to be legitimate users through various network attack methods. Threats to the security of business processes on the network. [0003] In the prior art, for services on the network, in order to prevent illegal users from pretending to be legitimate users, users can pre-register their personal information on the server of the service provider. The personal information is generally text information, such as account number, password , ID card number, mobile phone number, etc., the server saves the personal information registered by the user. After successful registration, the user bec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 郭曦
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products