-
1.
公开(公告)号:US20230027527A1
公开(公告)日:2023-01-26
申请号:US17958746
申请日:2022-10-03
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
IPC: G06F21/31
Abstract: This application discloses an identity authentication method, a method and an apparatus for training an identity authentication model, and a computer-readable medium in the artificial intelligence field to improve accuracy of identity authentication. The identity authentication method includes: obtaining first operation behavior data and second operation behavior data of a to-be-authenticated user; obtaining, by using a first authentication model by inputting the first operation behavior data, a first recognition result output by the first authentication model; obtaining, by using a second authentication model by inputting the second operation behavior data, a second recognition result output by the second authentication model, where the first authentication model and the second authentication model are an anomaly detection model and a classification model respectively; and inputting the first recognition result and the second recognition result into a decision fusion model to obtain an output identity authentication result.
-
公开(公告)号:US20210334356A1
公开(公告)日:2021-10-28
申请号:US17371712
申请日:2021-07-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Ji LI , Leting REN , Li DUAN , Jun XIA
Abstract: This application provides an authentication credential protection method and system. The protection method includes the following steps: generating authentication secret information based on a lock screen password and hardware secret information of a first device; randomly generating, by the first device, a symmetric key, and using the symmetric key as an encryption key for the authentication secret information; splitting the encryption key into at least two first key segments by using a multi-party data splitting algorithm, where one of the at least two first key segments is stored on the first device; and sending, by the first device, another first key segment to a trusted device. In the foregoing technical solution, the authentication secret information is generated by using the lock screen password and the hardware secret information, increasing information complexity. In addition, different trusted devices are used to store the split key segments, improving security of the encryption key.
-