CN106357657A - Method and device for managing sign initiating user - Google Patents

Method and device for managing sign initiating user Download PDF

Info

Publication number
CN106357657A
CN106357657A CN201610865576.3A CN201610865576A CN106357657A CN 106357657 A CN106357657 A CN 106357657A CN 201610865576 A CN201610865576 A CN 201610865576A CN 106357657 A CN106357657 A CN 106357657A
Authority
CN
China
Prior art keywords
sign
described
user
initiates
risk
Prior art date
Application number
CN201610865576.3A
Other languages
Chinese (zh)
Inventor
曹海
Original Assignee
广州鹤互联网科技有限公司
广州鹤一互联网科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广州鹤互联网科技有限公司, 广州鹤一互联网科技有限公司 filed Critical 广州鹤互联网科技有限公司
Priority to CN201610865576.3A priority Critical patent/CN106357657A/en
Publication of CN106357657A publication Critical patent/CN106357657A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Abstract

The embodiment of the invention provides a method and a device for managing a sign initiating user, and applied to an electronic signing process. The method for managing the sign initiating user comprises: judging whether the login environment of the sign initiating user is abnormal or not when receiving a login request of the sign initiating user; if the judgment result is yes, judging whether a network behavior of the sign initiating user is in risks or not; if the judgment result is yes, inhibiting the sign initiating user to initiate any operation after login. Thereby, through the method, the security of the electronic signing process is increased, and the use experience of the user is ensured.

Description

A kind of sign-off initiates user management method and equipment

Technical field

The present invention relates to networking technology area, initiate user management method and equipment particularly to a kind of sign-off.

Background technology

In the prior art, the sign-off of file usually manually to be carried out, and within a particular process, needing will be corresponding File printout out, and is passed to each in the way of artificial and needs at the approved officer of sign-off, and operating process is loaded down with trivial details, time-consuming takes Power, inefficiency;And when certain approved officer not when, being normally carried out of whole flow process will be stopped over.

For this reason, have at present mentioning a kind of mode of approving electronic, but this mode safety is not high, the body of impact user Test.

Content of the invention

For defect of the prior art, the present invention proposes a kind of sign-off and initiates user management method and equipment, in order to Overcome defect of the prior art, improve the safety of approving electronic, ensure the experience of user.

Specifically, the present invention proposes embodiment in detail below:

The embodiment of the present invention proposes a kind of sign-off and initiates user management method, is applied to approving electronic process, comprising:

When receiving the logging request that sign-off initiates user, judge whether the login environment of described sign-off initiation user is different Often;

If the determination result is YES, judge that described sign-off initiates the network behavior of user with the presence or absence of risk;

If the determination result is YES, forbid that described sign-off is initiated user and initiated any operation after login.

Further, in a specific embodiment, described " judge whether described sign-off initiates the network behavior of user There is risk ", comprising:

Obtain described sign-off and initiate network behavior in preset time period for the user;

For each network behavior, assess the value-at-risk corresponding to each network behavior;

Comprehensive all value-at-risks, determine total risk value;

If total risk value is more than default risk threshold value, judge that the network behavior of described sign-off initiation user has risk;

If total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user does not have risk.

Further, in a specific embodiment, described " forbid that described sign-off is initiated user and initiated after login to appoint What operates ", comprising:

Obtain described sign-off and initiate the accounts information in the logging request that user sends;

Account in described accounts information is added in operation blacklist.

Further, in a specific embodiment, described login environment specifically includes login ip;

Described " when receiving the logging request that sign-off initiates user, judge the login environment of described sign-off initiation user Whether abnormal ", comprising:

When receiving the logging request that sign-off initiates user, obtain the login ip that sign-off initiates user;

Determine the value-at-risk of described login ip based on the ip in described login ip and default abnormal ip data base;

If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;

If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.

Further, in a specific embodiment, described login environment specifically includes registration terminal;

Described " when receiving the logging request that sign-off initiates user, judge the login environment of described sign-off initiation user Whether abnormal ", comprising:

Obtain described sign-off and initiate the end message that user sends the terminal of logging request;

Judge that described end message whether there is to have verified that in terminal information database in prestore;

If the determination result is YES it is determined that described sign-off initiates the login environment of user not extremely;

If judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.

The embodiment of the present invention also proposed a kind of sign-off and initiates user management device, is applied to approving electronic process, comprising:

First judge module, for when receiving the logging request that sign-off initiates user, judging that described sign-off initiates use Whether the login environment at family is abnormal;

Second judge module, for when the judged result of the first judge module is to be, judging that described sign-off initiates user Network behavior whether there is risk;

Processing module, for when the judged result of the second judge module is to be, forbidding that described sign-off is initiated user and stepped on Any operation is initiated after record.

Further, in a specific embodiment, described second judge module, it is used for:

Obtain described sign-off and initiate network behavior in preset time period for the user;

For each network behavior, assess the value-at-risk corresponding to each network behavior;

Comprehensive all value-at-risks, determine total risk value;

If total risk value is more than default risk threshold value, judge that the network behavior of described sign-off initiation user has risk;

If total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user does not have risk.

Further, in a specific embodiment, described processing module, it is used for:

Obtain described sign-off and initiate the accounts information in the logging request that user sends;

Account in described accounts information is added in operation blacklist.

Further, in a specific embodiment, described login environment specifically includes login ip;

Described first judge module, is used for:

When receiving the logging request that sign-off initiates user, obtain the login ip that sign-off initiates user;

Determine the value-at-risk of described login ip based on the ip in described login ip and default abnormal ip data base;

If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;

If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.

Further, in a specific embodiment, described login environment specifically includes registration terminal;

Described first judge module, is used for:

Obtain described sign-off and initiate the end message that user sends the terminal of logging request;

Judge that described end message whether there is to have verified that in terminal information database in prestore;

If the determination result is YES it is determined that described sign-off initiates the login environment of user not extremely;

If judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.

Compared with prior art, the embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, application In approving electronic process, wherein, this sign-off is initiated user management method and is included: when the logging request receiving sign-off initiation user When, judge whether extremely described sign-off initiates the login environment of user;If the determination result is YES, judge that described sign-off initiates user Network behavior whether there is risk;If the determination result is YES, forbid that described sign-off is initiated user and initiated any behaviour after login Make.With this, by said method, improve the safety of approving electronic process, ensured the experience of user.

Brief description

In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be attached to use required in embodiment Figure is briefly described it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.

A kind of sign-off that Fig. 1 proposes for the embodiment of the present invention initiates user management method schematic flow sheet;

A kind of method flow whether login environment is estimated extremely that Fig. 2 proposes for the embodiment of the present invention is illustrated Figure;

A kind of method flow whether login environment is estimated extremely that Fig. 3 proposes for the embodiment of the present invention is illustrated Figure;

The network behavior initiating user to sign-off that Fig. 4 proposes for the embodiment of the present invention is estimated with the presence or absence of risk Method flow schematic diagram;

A kind of sign-off that Fig. 5 proposes for the embodiment of the present invention initiates the structural representation of user management device.

Specific embodiment

Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Generally Can be arranged with various different configurations and design with the assembly of the embodiment of the present invention shown described in the accompanying drawing herein.Cause This, be not intended to limit claimed invention to the detailed description of the embodiments of the invention providing in the accompanying drawings below Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing The every other embodiment being obtained on the premise of going out creative work, broadly falls into the scope of protection of the invention.

For defect of the prior art, the inventors discovered that in actual application, sign-off initiates the peace that user occurs Full problem is larger, for this reason, the present invention proposes a kind of sign-off initiates user management method and equipment, is applied to approving electronic mistake Journey, in order to improve the safety of approving electronic process.

Specifically, the present invention proposes embodiment in detail below:

The embodiment of the present invention 1 proposes a kind of sign-off and initiates user management method, is applied to approving electronic process, such as Fig. 1 Shown, comprise the following steps:

Step 101, when receiving the logging request that sign-off initiates user, judge the login ring of described sign-off initiation user Whether border is abnormal;

Step 102, if the determination result is YES, judges that described sign-off is initiated the network behavior of user and be whether there is risk;

Step 103, if the determination result is YES, forbids that described sign-off is initiated user and initiated any operation after login.

In a specific embodiment, such as certain employee in a company wants to ask for leave, namely wants to initiate one Sign-off application, this employee is accomplished by initiating the flow process of a sign-off application, and in this process, this employee just initiates to use as sign-off Family.And in addition to the sign-off application with regard to asking for leave, sign-off application can also have a lot of other embodiments, such as with regard to reimbursement Approving electronic, and approving electronic etc. with regard to order of being transferred and promoted, and corresponding, the user initiating sign-off process is sign-off Initiate user.

Sign-off initiates user firstly the need of login, could initiate sign-off process, and therefore sign-off initiation user can step at one Record interface input account, the log-on message such as password, in a specific embodiment, the environment of input account and password is Log in environment.And follow-up sign-off application is also to initiate in same environment, the safety therefore logging in environment can affect Safety to sign-off application;For this reason, being accomplished by login environment is detected, to determine the intensity of anomaly logging in environment, I.e. unsafe degree.

It is contemplated that logging in the environment that environment is network in a specific embodiment, critically important as one by this ip Network identity, the safety to place network environment has very strong reference significance, just allowing for this point, can be based on stepping on Record ip whether login environment is estimated extremely.A kind of specific embodiment with regard to step 101, it is as shown in Fig. 2 can To comprise the steps:

Step 11, when receive sign-off initiate user logging request when, obtain sign-off initiate user login ip;

Step 12, determine the risk of described login ip based on the ip in described login ip and default abnormal ip data base Value;

If step 13 value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;

If the low excessively default risk threshold value of step 14 value-at-risk, determine that described login environment is not abnormal.

Specifically, based on ip (internet protocol, the agreement of interconnection between network) come judged, first Get sign-off initiate user be located log in environment login ip, and and in the abnormal ip data base of the abnormal ip that is stored with inquire about There is related ip to determine the value-at-risk logging in ip with this login ip.For example can be by judging in abnormal ip data base There are the value-at-risk that the ip quantity being directly connected to carry out judging to log in ip, with regard to step 101, described login ring with logging in ip Border specifically includes login ip;

More than, the data of abnormal ip, and the data life based on this abnormal ip in the particular embodiment, can be got in advance Become abnormal ip data base, specifically abnormal ip data can be obtained, with this abnormal ip meeting from the data base with regard to safety There is directly or indirectly relation with the such as behavior such as swindle, can be existed with this risky.

Thus, by judging whether the login ip that sign-off initiates during user's transmission logging request is to pass through during risky ip Judging to log in ip with the presence or absence of to carry out in abnormal ip data base, if log in ip being present in abnormal ip data base, saying Bright login ip is abnormal ip, and then may determine that login environmental abnormality, conversely, then explanation logs in environment not extremely, is just Normal.

Additionally, in other specific embodiments, for example can also by judge in abnormal ip data base with step on Record ip there are the ip quantity being directly connected to carry out judge log in ip value-at-risk, specifically, be directly connected to can be for example The website of access exception ip under the network scenarios logging in ip;Quantity is more, and corresponding value-at-risk is bigger.

In another specific embodiment, it is also contemplated that specific abnormal ip itself in addition to considering to connect Hazardness, authorize harm weight to each abnormal ip based on hazardness, during further evaluation, except consider quantity in addition to, for Each abnormal ip being directly connected to, in addition it is also necessary to harm weight in view of this abnormal ip, is come jointly by this two factors with this Judge to log in the value-at-risk of ip, a kind of specific determination mode can be that for example value-at-risk can be the sum of the value of harm weight.

And after determining the value-at-risk logging in ip, based on this value-at-risk and risk threshold value relatively determining login ring Whether border is abnormal.In a specific embodiment, such as value-at-risk is 1, and risk threshold value is 5, then can determine login environment Not abnormal.

In another specific embodiment, described login environment specifically includes registration terminal;In the case, step 101, namely described " when receiving the logging request that sign-off initiates user, judge the login environment of described sign-off initiation user Whether abnormal ", as shown in figure 3, comprising the following steps:

Step 21, the described sign-off of acquisition initiate the end message that user sends the terminal of logging request;

Step 22, judge described end message whether there is have verified that in terminal information database in prestore;

Step 23, if the determination result is YES it is determined that the described sign-off login environment of initiating user is abnormal;

If step 24 judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.

In in this specific embodiment, can verify in advance or authorize a collection of terminal as having verified that terminal, it is right The end message answered then forms and has verified that terminal information database, and specific end message can include the mark of terminal, is Identification code of terminal setting etc..

Subsequently when being verified, extract sign-off and initiate the end message that user sends the terminal of logging request, and with Have verified that stored in terminal information database has verified that end message is mated, if can match, illustrate that sign-off is sent out The login environment playing user place is to have verified that login environment, namely it is abnormal to log in environment;Conversely, then can determine that sign-off is sent out The login environment playing user place is not to have verified that login environment, namely logs in environmental abnormality.

More than, it is to logging in whether environment judges extremely, if judged result, for logging in environment extremely, is walked Rapid 104, namely allow sign-off to initiate the normal operating processes such as user's initiation sign-off application.

And if judgement logs in environmental abnormality, carry out step 103, namely judge that described sign-off initiates the network behavior of user With the presence or absence of risk, specific judge process is as shown in figure 4, comprise the following steps:

Step 31, the described sign-off of acquisition initiate network behavior in preset time period for the user;

Step 32, be directed to each network behavior, assess the value-at-risk corresponding to each network behavior;

Step 33, comprehensive all value-at-risks, determine total risk value;

If step 34 total risk value is more than default risk threshold value, judge that described sign-off initiates the network behavior presence of user Risk.

If step 35 total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user is not deposited In risk.

More than, preset time period can be initiated in the time period of User logs in for sign-off, due to the network row to user for the meeting For being monitored always, therefore when determined between after section, the network behavior of user in this time period can be extracted, specific meeting Get multiple network behaviors, for example, access website behavior, payment behavior etc., for each network behavior, be analyzed commenting Estimate, determine the value-at-risk of each network behavior corresponding based on degree of danger, for example, access the behavior substantially including wooden horse website Will have very high degree of danger.

After determining the value-at-risk of each each network behavior, carry out synthesis, to determine overall risk value, specifically may be used Total risk value is obtained with direct addition;For example have 3 value-at-risks, respectively 1.1,0.1,3.3, corresponding total risk value is then For: 1.1+0.1+3.3=4.5;In advance weight can also be set for each network behavior, based on different network behaviors, be based on Weight and corresponding value-at-risk to determine total risk value jointly;Still taking above-mentioned as a example to illustrate, 3 value-at-risks are corresponding Weight is respectively 0.3,0.1,0.1, then corresponding total risk value can be 0.3 × 1.1+0.1 × 0.1+0.1 × 3.3=0.67.

, to there being different default risk threshold values, here is with total risk value for 4.5 for the determination mode of different total risk value As a example illustrating, if default risk threshold value is 2, due to 4.5 > 2, therefore may determine that sign-off initiates the network row of user For there is risk;And if default risk threshold value is 5, due to 4.5 < 5 it can be determined that sign-off initiates the network behavior of user not There is risk.

However, it is determined that the network behavior that sign-off initiates user does not have risk in the judge process of step 102, then allow to sign Core is initiated user and is initiated sign-off process and other operation according to normal flow;And if it is determined that sign-off initiates the network row of user For there is risk, then execution step 103, that is, forbid that described sign-off is initiated user and initiated any operation after login.

In a specific embodiment, forbid that described sign-off is initiated user and initiated any operation after login, comprising:

Obtain described sign-off and initiate the accounts information in the logging request that user sends;

Account in described accounts information is added in operation blacklist.

In this specific embodiment, after operating the account that the effect of blacklist is stored in thereon cannot execute login Any operation, therefore can add operation blacklist to forbid that sign-off initiates user by sign-off is initiated the corresponding account of user Operation.Further, it is also possible to there be other modes, such as refusal sign-off initiates the login of user so that sign-off initiation user cannot Log in, naturally cannot execute any operation after login.

The embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, is applied to approving electronic process, Wherein, this sign-off initiation user management method includes: when receiving the logging request that sign-off initiates user, judges described sign-off Whether the login environment initiating user is abnormal;If the determination result is YES, judge whether described sign-off initiates the network behavior of user There is risk;If the determination result is YES, forbid that described sign-off is initiated user and initiated any operation after login.With this, by upper State method, improve the safety of approving electronic process, ensure the experience of user.

In order to be further detailed to the present invention, the embodiment of the present invention 2 also discloses a kind of sign-off and initiates user's pipe Reason equipment, is applied to approving electronic process, as shown in Figure 5, comprising:

First judge module 201, for when receiving the logging request that sign-off initiates user, judging that described sign-off is initiated Whether the login environment of user is abnormal;

Second judge module 202, for when the judged result of the first judge module is to be, judging that described sign-off initiates to use The network behavior at family whether there is risk;

Processing module 203, for when the judged result of the second judge module is to be, forbidding that described sign-off is initiated user and existed Any operation is initiated after login.

In a specific embodiment, described second judge module 202, it is used for:

Obtain described sign-off and initiate network behavior in preset time period for the user;

For each network behavior, assess the value-at-risk corresponding to each network behavior;

Comprehensive all value-at-risks, determine total risk value;

If total risk value is more than default risk threshold value, judge that the network behavior of described sign-off initiation user has risk;

If total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user does not have risk.

In a specific embodiment, described processing module 203, it is used for:

Obtain described sign-off and initiate the accounts information in the logging request that user sends;

Account in described accounts information is added in operation blacklist.

In a specific embodiment, described login environment specifically includes login ip;

Described first judge module 201, is used for:

When receiving the logging request that sign-off initiates user, obtain the login ip that sign-off initiates user;

Determine the value-at-risk of described login ip based on the ip in described login ip and default abnormal ip data base;

If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;

If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.

In a specific embodiment, described login environment specifically includes registration terminal;

Described first judge module 201, is used for:

Obtain described sign-off and initiate the end message that user sends the terminal of logging request;

Judge that described end message whether there is to have verified that in terminal information database in prestore;

If the determination result is YES it is determined that described sign-off initiates the login environment of user not extremely;

If judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.

Compared with prior art, the embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, application In approving electronic process, wherein, this sign-off is initiated user management method and is included: when the logging request receiving sign-off initiation user When, judge whether extremely described sign-off initiates the login environment of user;If the determination result is YES, judge that described sign-off initiates user Network behavior whether there is risk;If the determination result is YES, forbid that described sign-off is initiated user and initiated any behaviour after login Make.With this, by said method, improve the safety of approving electronic process, ensured the experience of user.

It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram being preferable to carry out scene, the module in accompanying drawing or Flow process is not necessarily implemented necessary to the present invention.

It will be appreciated by those skilled in the art that module in device in implement scene can according to implement scene describe into Row is distributed in the device of implement scene it is also possible to carry out one or more dresses that respective change is disposed other than this implement scene In putting.The module of above-mentioned implement scene can merge into a module it is also possible to be further split into multiple submodule.

The invention described above sequence number is for illustration only, does not represent the quality of implement scene.

Only the several of the present invention disclosed above are embodied as scene, but, the present invention is not limited to this, Ren Heben What the technical staff in field can think change all should fall into protection scope of the present invention.

Claims (10)

1. a kind of sign-off initiates user management method it is characterised in that being applied to approving electronic process, comprising:
When receiving the logging request that sign-off initiates user, judge whether extremely described sign-off initiates the login environment of user;
If the determination result is YES, judge that described sign-off initiates the network behavior of user with the presence or absence of risk;
If the determination result is YES, forbid that described sign-off is initiated user and initiated any operation after login.
2. sign-off as claimed in claim 1 initiates user management method it is characterised in that described " judge that described sign-off is initiated The network behavior of user whether there is risk ", comprising:
Obtain described sign-off and initiate network behavior in preset time period for the user;
For each network behavior, assess the value-at-risk corresponding to each network behavior;
Comprehensive all value-at-risks, determine total risk value;
If total risk value is more than default risk threshold value, judge that the network behavior of described sign-off initiation user has risk;
If total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user does not have risk.
3. sign-off as claimed in claim 1 initiates user management method it is characterised in that described " forbid that described sign-off is initiated User initiates any operation after login ", comprising:
Obtain described sign-off and initiate the accounts information in the logging request that user sends;
Account in described accounts information is added in operation blacklist.
4. sign-off as claimed in claim 1 initiates user management method it is characterised in that described login environment specifically includes Log in ip;
Described " when receiving the logging request that sign-off initiates user, whether judge the login environment of described sign-off initiation user Abnormal ", comprising:
When receiving the logging request that sign-off initiates user, obtain the login ip that sign-off initiates user;
Determine the value-at-risk of described login ip based on the ip in described login ip and default abnormal ip data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
5. sign-off as claimed in claim 1 initiates user management method it is characterised in that described login environment specifically includes and steps on Record terminal;
Described " when receiving the logging request that sign-off initiates user, whether judge the login environment of described sign-off initiation user Abnormal ", comprising:
Obtain described sign-off and initiate the end message that user sends the terminal of logging request;
Judge that described end message whether there is to have verified that in terminal information database in prestore;
If the determination result is YES it is determined that described sign-off initiates the login environment of user not extremely;
If judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.
6. a kind of sign-off initiates user management device it is characterised in that being applied to approving electronic process, comprising:
First judge module, for when receiving the logging request that sign-off initiates user, judging that described sign-off initiates user's Whether abnormal log in environment;
Second judge module, for when the judged result of the first judge module is to be, judging that described sign-off initiates the net of user Network behavior whether there is risk;
Processing module, for when the judged result of the second judge module is to be, forbidding that described sign-off initiates user after login Initiate any operation.
7. sign-off as claimed in claim 6 initiates user management device it is characterised in that described second judge module, is used for:
Obtain described sign-off and initiate network behavior in preset time period for the user;
For each network behavior, assess the value-at-risk corresponding to each network behavior;
Comprehensive all value-at-risks, determine total risk value;
If total risk value is more than default risk threshold value, judge that the network behavior of described sign-off initiation user has risk;
If total risk value is less than default risk threshold value, judge that the network behavior of described sign-off initiation user does not have risk.
8. sign-off as claimed in claim 6 initiates user management device it is characterised in that described processing module, is used for:
Obtain described sign-off and initiate the accounts information in the logging request that user sends;
Account in described accounts information is added in operation blacklist.
9. sign-off as claimed in claim 5 initiates user management device it is characterised in that described login environment specifically includes and steps on Record ip;
Described first judge module, is used for:
When receiving the logging request that sign-off initiates user, obtain the login ip that sign-off initiates user;
Determine the value-at-risk of described login ip based on the ip in described login ip and default abnormal ip data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
10. sign-off as claimed in claim 6 initiates user management device it is characterised in that described login environment specifically wraps Include registration terminal;
Described first judge module, is used for:
Obtain described sign-off and initiate the end message that user sends the terminal of logging request;
Judge that described end message whether there is to have verified that in terminal information database in prestore;
If the determination result is YES it is determined that described sign-off initiates the login environment of user not extremely;
If judged result is no it is determined that described sign-off initiates the login environmental abnormality of user.
CN201610865576.3A 2016-09-29 2016-09-29 Method and device for managing sign initiating user CN106357657A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610865576.3A CN106357657A (en) 2016-09-29 2016-09-29 Method and device for managing sign initiating user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610865576.3A CN106357657A (en) 2016-09-29 2016-09-29 Method and device for managing sign initiating user

Publications (1)

Publication Number Publication Date
CN106357657A true CN106357657A (en) 2017-01-25

Family

ID=57867215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610865576.3A CN106357657A (en) 2016-09-29 2016-09-29 Method and device for managing sign initiating user

Country Status (1)

Country Link
CN (1) CN106357657A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172104A (en) * 2017-07-17 2017-09-15 顺丰科技有限公司 One kind logs in method for detecting abnormality, system and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020055997A1 (en) * 2000-03-29 2002-05-09 Nigel Pinnell Method and system for providing status indication and control to a computer network user
CN1719768A (en) * 2004-07-09 2006-01-11 千乡万才科技(中国)有限公司 Electronic authorizing and signing protection system and method thereof
US20110296036A1 (en) * 2010-05-25 2011-12-01 International Business Machines Corporation Method and apparatus for single sign-off using cookie tracking in a proxy
CN103577991A (en) * 2012-08-03 2014-02-12 阿里巴巴集团控股有限公司 User identification method and device
US20140257874A1 (en) * 2013-03-10 2014-09-11 State Farm Mutual Automobile Insurance Company System and Method for Determining and Monitoring Auto Insurance Incentives
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020055997A1 (en) * 2000-03-29 2002-05-09 Nigel Pinnell Method and system for providing status indication and control to a computer network user
CN1719768A (en) * 2004-07-09 2006-01-11 千乡万才科技(中国)有限公司 Electronic authorizing and signing protection system and method thereof
US20110296036A1 (en) * 2010-05-25 2011-12-01 International Business Machines Corporation Method and apparatus for single sign-off using cookie tracking in a proxy
CN103577991A (en) * 2012-08-03 2014-02-12 阿里巴巴集团控股有限公司 User identification method and device
US20140257874A1 (en) * 2013-03-10 2014-09-11 State Farm Mutual Automobile Insurance Company System and Method for Determining and Monitoring Auto Insurance Incentives
CN105528535A (en) * 2015-12-25 2016-04-27 北京奇虎科技有限公司 Log information based user behavior analysis method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172104A (en) * 2017-07-17 2017-09-15 顺丰科技有限公司 One kind logs in method for detecting abnormality, system and equipment

Similar Documents

Publication Publication Date Title
US20080016005A1 (en) Systems and methods for performing secure online transactions
US8508332B2 (en) Access control
KR20090037538A (en) Method for risk analysis using information asset modelling
CN105405296B (en) Wagon control disengaging system and method based on Car license recognition
US20130042298A1 (en) System and method for generating trust among data network users
AU2013204965B2 (en) A system, method, computer program and data signal for the registration, monitoring and control of machines and devices
DE102012208842A1 (en) Access control method, information processing device and access control program
US9392456B2 (en) Call center SMS verification system and method
CN102484640B (en) A method and apparatus to address the threat detected for
CN106233663B (en) System and method for carrying strong authentication event on the different channels
CN103379099B (en) Hostile attack identification method and system
CN104238883B (en) Message read method and device on intelligent terminal
US10432643B2 (en) System and method for validating users using social network information
US9202183B2 (en) Auditing system and method
WO2015035895A1 (en) Methods, devices, and systems for account login
DE112008000298T5 (en) A method for generating a digital fingerprint by means of a pseudorandom number code
CN104158824B (en) Genuine cyber identification authentication method and system
EP2474140B1 (en) Checking a configuration modification for an ied
EP2933981B1 (en) Method and system of user authentication
US20140207629A1 (en) System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations
CN105207775B (en) The read method and device of verification information
CN104253818B (en) Server, terminal authentication method and server, terminal
US10296893B2 (en) Methods for secure transactions
CN108830070A (en) The device authorization of unmanned participation and safety
Jo et al. Advanced Information Security Management Evaluation System.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190219

Address after: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000

Applicant after: Hengda Wisdom Technology Co., Ltd.

Address before: 510000 Room 3601, 78 Huangpu Avenue West, Tianhe District, Guangzhou City, Guangdong Province

Applicant before: Guangzhou crane Internet Technology Co., Ltd.