An identity authentication system and method based on user habitual behavior characteristics

A technology of identity authentication and behavior, which is applied in the field of identity authentication system, can solve problems such as behavior changes that cannot identify the user himself, capture subtle changes in user habitual behavior, etc., and achieve the effect of reducing the risk of passing authentication and improving security

Active Publication Date: 2018-11-20
SHENZHEN ALL IN ONE NEW TECH LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve the following technical problems in various current user behavior-based identity authentication methods: 1. Only rely on one-time collection in the initial stage to obtain user behavior characteristics, and cannot capture subtle changes in user habitual behavior over time, resulting in behavior The problem that the user cannot be identified when the change exceeds the critical value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication system and method based on user habitual behavior characteristics
  • An identity authentication system and method based on user habitual behavior characteristics
  • An identity authentication system and method based on user habitual behavior characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0108] The specific implementation process of this method in the offline micropayment application is as follows:

[0109] S1, starting from the user installing the offline micropayment application, the following raw behavioral data samples are continuously collected: the merchant, time point, single consumption amount of the user each time, and gestures when approaching the payment terminal, recorded as: u( x, y, z, t), where x represents the single consumption amount, y represents the merchant, t represents the consumption time, and z represents the gesture feature value;

[0110] S2, continuous collection for one week to obtain 20 effective samples, U={u 1 , u 2 ,...,u 20}

[0111] S21, calculate the standard deviation of the four dimensions of single consumption amount x, merchant y, consumption time t, and gesture action characteristic value z, respectively recorded as Set the variance threshold to be There are the following discrimination results:

[0112]

[0...

Embodiment 2

[0131] S1 extracts all sensing parameters on the user's mobile terminal;

[0132] S2 collects business data that completes specified business actions;

[0133] S3 saves the collected business data into the corresponding type of original behavior data sample set;

[0134] S4 judges whether habitual behavior characteristics have been found out;

[0135] If the habitual behavior feature is found, it is judged whether the value range of the user's habitual behavior degree is within the range of the habitual behavior feature;

[0136] If it is within the range, the authorization is successfully authenticated and the authorization level is increased at the same time;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication system and method based on user habit behavior features. The identity authentication system comprises a configuration module, a collecting muddle, a sample processing module, a sample quantity judging module, a variance calculation module, a combined dimension module, a habit behavior dimension composition module and an authentication module, wherein besides dimensions such as gestures and shaking, dimensions such as activity regions, acting tracks, touch force and trading behaviors are also collected by the collecting module; then, a plurality of behavior habits are extracted through data mining for identity recognition. The problems that in the prior art, the user behavior features are collected only through once collection at the initial stage, and the generated slight change of the user habit behaviors cannot be caught along with the timelapse, so that the user per se cannot be recognized when the behavior change exceeds the critical value are solved. The risk that the gesture action is imitated or an unauthenticated user passes through the authentication due to sampling is further reduced.

Description

technical field [0001] The invention relates to an identity authentication system and method based on user habitual behavior characteristics. Background technique [0002] With the popularization of mobile Internet, smartphones are widely used in scenarios such as offline micropayment, access control, bus and subway due to their portability, exclusivity and privacy. While bringing convenience, there are still security issues , For example: non-users use the mobile phone due to the loss of the mobile phone or theft of information, resulting in property loss. [0003] In order to improve security, user identity needs to be identified and authenticated in the above application scenarios. Commonly used methods are divided into three categories: password-based identification technology (such as: digital password, gesture password), biometric-based identification technology (such as facial recognition, fingerprint recognition, iris recognition, voiceprint recognition), and recogn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06Q20/38G06Q20/40
CPCG06F21/316G06Q20/382G06Q20/4014
Inventor 刘明晶张璐
Owner SHENZHEN ALL IN ONE NEW TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products