CN109753772A - A kind of account safety verification method and system - Google Patents

A kind of account safety verification method and system Download PDF

Info

Publication number
CN109753772A
CN109753772A CN201811443171.6A CN201811443171A CN109753772A CN 109753772 A CN109753772 A CN 109753772A CN 201811443171 A CN201811443171 A CN 201811443171A CN 109753772 A CN109753772 A CN 109753772A
Authority
CN
China
Prior art keywords
user
risk
user equipment
value
environmental information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811443171.6A
Other languages
Chinese (zh)
Inventor
王文达
陈国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Summit Network Technology Co Ltd
Original Assignee
Wuhan Summit Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Summit Network Technology Co Ltd filed Critical Wuhan Summit Network Technology Co Ltd
Priority to CN201811443171.6A priority Critical patent/CN109753772A/en
Publication of CN109753772A publication Critical patent/CN109753772A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the present invention provides a kind of account safety verification method and system, wherein provided method includes: to receive the logging request of user to obtain the corresponding environmental information of the user device type according to the user device type of the user;Effect is carried out to the logging request of the user, and calculates the value-at-risk for obtaining the user equipment according to the environmental information;According to the value-at-risk of the user, corresponding risk resolution strategy is executed;Method provided in an embodiment of the present invention authenticates user account using widely multifactor, improves the accuracy determined account safe condition, reduce the probability failed to judge.

Description

A kind of account safety verification method and system
Technical field
The present embodiments relate to technical field of network security more particularly to a kind of account safety verification method and systems
Background technique
Network technology greatly changes daily life, and to this network application, user requires to establish account. Network application account is stolen to be that current information security field is very serious and urgent problem, for example, online game account and The stolen event of game article happens occasionally.The development of internet also brings new business model to financial industry, people to The safety of line fund account has higher requirement.
Internet area Account Guard is always a stubborn problem, and traditional technical solution is generally using specific letter Breath binding judges whether the account of user is stolen.What is be often used has " logging in place " and " device identification ", when the information of user When changing, business side may require that user judges the true identity of user using the method for secondary verification.
However, conventionally, as the variability of network attack gimmick, the defense technique of traditional single-mode is very Hardly possible reply attack complicated and changeable at present frequently can lead to threaten account safety in part using single judgement information It generates and fails to judge when situation occurs, such as in the website at the end PC, can not often position determining " device identification ", if by chance hacker Location and victim are logged in the same area, the security system of account will fail at this time, while hacker may also deliberately forge The personal information of user.On the other hand, when business side, which encounters account, may face safe situation, what system of defense was taken Scheme is often fixed verifying gimmick, such as when detecting that target account occurs abnormal, can send verifying mail to presetting Mailbox in carry out login authentication, however, it often includes simultaneously that the mailbox of user or other verifyings are set that general account is stolen Stolen while standby, this authentication mode does not often have any obstruction for steal-number person, can directly pass through.
Summary of the invention
The embodiment of the present invention provides a kind of account safety verification method and system, to solve single-mode in the prior art Defense technique be difficult reply attack complicated and changeable at present, be easy to cause the behavior misjudgment to account safety is threatened The problem of.
In a first aspect, the embodiment of the present invention provides a kind of account safety verification method, comprising:
The logging request for receiving user obtains the user device type pair according to the user device type of the user The environmental information answered;
Effect is carried out to the logging request of the user, and is calculated according to the environmental information and obtains the user equipment Value-at-risk;
According to the value-at-risk of the user, corresponding risk resolution strategy is executed;
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Second aspect, the embodiment of the present invention provide a kind of account safety verifying system, comprising:
Information receiving module, according to the user device type of the user, obtains institute for receiving the logging request of user State the corresponding environmental information of user device type;
Value-at-risk evaluation module carries out effect for the logging request to the user, and according to the environmental information meter Calculate the value-at-risk for obtaining the user equipment;
Authentication module executes corresponding risk resolution strategy for the value-at-risk according to the user.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory Computer program that is upper and can running on a processor, the processor are realized when executing described program such as above-mentioned first aspect institute The step of account safety verification method of offer.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating Machine program, realizing the account safety verification method as provided by above-mentioned first aspect when which is executed by processor Step.
Account safety verification method provided in an embodiment of the present invention and equipment, using widely multifactor to user account It is authenticated, improves the accuracy determined account safe condition, reduce the probability failed to judge.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram for the account safety verification method that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram that the account safety that one embodiment of the invention provides verifies system;
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
With reference to Fig. 1, Fig. 1 is the flow diagram for the account safety verification method that one embodiment of the invention provides, and is provided Method include:
S1 receives the logging request of user, according to the user device type of the user, obtains the user device type Corresponding environmental information;
S2 carries out effect to the logging request of the user, and calculates the acquisition user according to the environmental information and set Standby value-at-risk;
S3 executes corresponding risk resolution strategy according to the value-at-risk of the user;
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Specifically, when users log on, receiving the username and password that user sends, while also receiving user environment letter Breath, wherein the environmental information of user and the type of user equipment are relative to such as when the mobile terminal that user equipment is cell phone type When, then user device geographical location, user equipment ID can be obtained, user equipment Bluetooth information etc. is used as environmental information, and works as and use When the type of family equipment is PC, then the id of user equipment can be obtained, the information such as address user equipment mac are as environmental information, originally In embodiment, environmental information, which includes at least, user device geographical location, user equipment id, user equipment language, user equipment Using number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, Yong Hushe One or more combinations in the standby address mac, user equipment Bluetooth information.
After obtaining the environmental information of user equipment, user is determined using a controllable weighting algorithm to environmental information Security risk value P, system uses different risk resolution strategies according to the size of P value, to login user, such as when user's City is logged in, when user equipment id does not change, then P value can reduce, when the user equipment of user equipment language and last login When language changes, then P value can increase, and the P value finally obtained is the value-at-risk of user, when consumer's risk value is lower than a model When enclosing, then user can be determined for low-risk state, at this time without risk resolution strategy, user is directly logined successfully, and works as risk When value is higher than a preset threshold, then the operations such as secondary verifying can be carried out to user, it is ensured that the safety of user account.
By the method, user account is authenticated using widely multifactor, is improved to account safe condition The accuracy of judgement reduces the probability failed to judge.
On the basis of the above embodiments, the logging request for receiving user, according to the user equipment class of the user Type, the step of obtaining the user device type corresponding environmental information, specifically include: obtaining the login name and key of user, together When according to the port for receiving username and password, obtain the corresponding environmental information of port type;Wherein, the port type is extremely It less include any in mobile terminal port and fixed pc port.
Specifically, obtaining the mistake of the corresponding environmental information of the user device type according to the user device type of user Cheng Zhong mainly sends the port of logging request to identify to the type of user equipment, so as to sentence by user equipment Determine the register that user is carried out by what equipment, wherein the type of port is at least divided into port and the fixation of mobile terminal The port of PC is also possible to the login-port of other types equipment.
On the basis of the above embodiments, the logging request to the user carries out effect, and according to the environment Information calculates the step of value-at-risk for obtaining the user equipment, specifically includes: to user name in the logging request and close Key carries out effect and calculates the value-at-risk of the user equipment according to the environmental information if effect is correct;If password mistake, The password errors number of the user is then recorded, and returns to password error message to the user equipment.
The password errors number for recording the user, and the step of returning to password error message to the user equipment If further include: the password errors number is greater than preset threshold, initiates re-authentication request to the user equipment.
It, first can login name to user and close specifically, the system of business side is after receiving the logging request of user Key carries out effect, after login name and key effect pass through, then carries out the value-at-risk of subsequent environmental information and calculates step, when stepping on When recording name and password authentification failure, then the information of password mistake can be returned to, while recording the number of password mistake, when password mistake When number is more than preset times, system can then initiate user re-authentication request, and usual re-authentication request, which can be, to be passed through The mailbox and mobile phone of the account binding of user are verified, to guarantee the safety of user account.
On the basis of the above embodiments, the value-at-risk according to the user executes corresponding risk resolution strategy The step of, it specifically includes:
If the value-at-risk of the user is less than the first preset threshold, determining the user, there is no risks, not to this User carries out risk resolution strategy;It is then held if the value-at-risk of the user is greater than the first preset threshold less than the second preset threshold If row the first risk resolution strategy consumer's risk value is greater than the second preset threshold, the second risk resolution strategy is executed.Institute It states environmental information to specifically include: sensitive item information and non-sensitive item information;Correspondingly, the value-at-risk of the user equipment includes quick Feel item value-at-risk and non-sensitive item value-at-risk.
Specifically, in the present embodiment, system sets risk different secure thresholds, such as Pmax1For possible wind Danger, Pmax2For serious risk, when password authentification is correct, while the value-at-risk P of user exceeds Pmax1When, then using completely self-contained Re-authentication system carries out re-authentication to user, so that it is guaranteed that the safety of user account, further, when the wind of user Danger value exceeds Pmax2When, then the account is temporarily freezed, it is desirable that it uses manual service, or is recognized after Unfreezing apparatus Card.
Further, in the present embodiment, the environmental information of user equipment is divided into sensitive item information and non-sensitive item information, Wherein, sensitive information item refers to the environmental information item that user will not change frequent occurrence, such as logs in city, the rings such as logging device id Border information refers to the possible relatively easy changed item of information of user, such as device systems language, equipment for non-sensitive item Number of applications etc. is installed.For sensitive item, after wherein having any one to change, system can assert that account faces wind Danger, can be by sensitive item value-at-risk P1Equal to Pmax1, for non-sensitive item, system will use P2=a × W1+b×W2+…+n×WnPower Restatement algorithm calculates the value-at-risk of non-sensitive item, wherein a, b ... n represent the environmental information of different non-sensitive items, and W is difference The Risk rated ratio coefficient of the environmental information of non-sensitive item, by calculating P1And P2, the final risk value P of system acquisition user, and root Risk judgement is carried out according to value-at-risk P.
By the method, according to different risk class dynamic given thresholds, and using not different disposal gimmick, rather than Fixed pure strategy, and then ensure that the safety of re-authentication so that attacker difficult to bypass secondary verifying movement come into Pirate number operation.
On the basis of the above embodiments, the method also includes: obtain preset time period in there are the account numbers of risk Amount, according to described there are the account quantity of risk, is adjusted the first preset threshold and the second preset threshold.
Specifically, system can carry out real-time statistics for the total amount of the adventure account occurred daily, it is denoted as S, when business is whole When body meets with adventure account number rapid increase, illustrate that business may occur to hit library or steal-number event, therefore, system on a large scale In include a dynamic rules, when S numerical value rise when, reduce PmaxDecision threshold, i.e. S=y-x × Pmax, pass through reasonable set Parameter y and x, to realize optimal safe verification method.
By the method, may be implemented to promote secondary verifying and account when system is by attacking for the perception of attacker Family freeze operation frequency, the expansion that attack can be prevented to influence in time improve the safety of whole station entirety user.
With reference to Fig. 2, Fig. 2 is the structural schematic diagram that the account safety that one embodiment of the invention provides verifies system, is provided System include: information receiving module 21, value-at-risk evaluation module 22, authentication module 23.
Wherein, information receiving module 21 is used to receive the logging request of user, according to the user device type of the user, Obtain the corresponding environmental information of the user device type.
Value-at-risk evaluation module 22 is used to carry out effect to the logging request of the user, and according to the environmental information meter Calculate the value-at-risk for obtaining the user equipment.
Authentication module 23 is used for the value-at-risk according to the user, executes corresponding risk resolution strategy.
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Specifically, when users log on, receiving the username and password that user sends, while also receiving user environment letter Breath, wherein the environmental information of user and the type of user equipment are relative to such as when the mobile terminal that user equipment is cell phone type When, then user device geographical location, user equipment ID can be obtained, user equipment Bluetooth information etc. is used as environmental information, and works as and use When the type of family equipment is PC, then the id of user equipment can be obtained, the information such as address user equipment mac are as environmental information, originally In embodiment, environmental information, which includes at least, user device geographical location, user equipment id, user equipment language, user equipment Using number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, Yong Hushe One or more combinations in the standby address mac, user equipment Bluetooth information.
After obtaining the environmental information of user equipment, user is determined using a controllable weighting algorithm to environmental information Security risk value P, system uses different risk resolution strategies according to the size of P value, to login user, such as when user's City is logged in, when user equipment id does not change, then P value can reduce, when the user equipment of user equipment language and last login When language changes, then P value can increase, and the P value finally obtained is the value-at-risk of user, when consumer's risk value is lower than a model When enclosing, then user can be determined for low-risk state, at this time without risk resolution strategy, user is directly logined successfully, and works as risk When value is higher than a preset threshold, then the operations such as secondary verifying can be carried out to user, it is ensured that the safety of user account.
By this system, user account is authenticated using widely multifactor, is improved to account safe condition The accuracy of judgement reduces the probability failed to judge.
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides, as shown in figure 3, electronic equipment includes: Processor (processor) 301, communication interface (Communications Interface) 302, memory (memory) 303 With bus 304, wherein processor 301, communication interface 302, memory 303 complete mutual communication by bus 304.Place Reason device 301 can call the logical order in memory 303, to execute following method, for example, the login for receiving user is asked It asks, according to the user device type of the user, obtains the corresponding environmental information of the user device type;To the user's Logging request carries out effect, and the value-at-risk for obtaining the user equipment is calculated according to the environmental information;According to the user Value-at-risk, execute corresponding risk resolution strategy.
The embodiment of the present invention discloses a kind of computer program product, and computer program product includes being stored in non-transient calculating Computer program on machine readable storage medium storing program for executing, computer program include program instruction, when program instruction is computer-executed, Computer is able to carry out method provided by above-mentioned each method embodiment, for example, the logging request for receiving user, according to institute The user device type for stating user obtains the corresponding environmental information of the user device type;To the logging request of the user Effect is carried out, and calculates the value-at-risk for obtaining the user equipment according to the environmental information;According to the value-at-risk of the user, Execute corresponding risk resolution strategy.
The present embodiment provides a kind of non-transient computer readable storage medium, non-transient computer readable storage medium storages Computer instruction, computer instruction make computer execute method provided by above-mentioned each method embodiment, for example, receive and use The logging request at family obtains the corresponding environmental information of the user device type according to the user device type of the user;It is right The logging request of the user carries out effect, and the value-at-risk for obtaining the user equipment is calculated according to the environmental information;Root According to the value-at-risk of the user, corresponding risk resolution strategy is executed.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of account safety verification method characterized by comprising
It is corresponding to obtain the user device type according to the user device type of the user for the logging request for receiving user Environmental information;
Effect is carried out to the logging request of the user, and calculates the risk for obtaining the user equipment according to the environmental information Value;
According to the value-at-risk of the user, corresponding risk resolution strategy is executed;
Wherein, the environmental information includes at least: user device geographical location, user equipment id, user equipment language, Yong Hushe It is standby to apply number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, user One or more combinations in the address equipment mac, user equipment Bluetooth information.
2. the method according to claim 1, wherein it is described receive user logging request, according to the user User device type, the step of obtaining the user device type corresponding environmental information specifically includes:
The login name and key of user are obtained, while according to the port for receiving username and password, it is corresponding to obtain port type Environmental information;
Wherein, the port type, which includes at least, has mobile terminal port and fixes any in pc port.
3. the method according to claim 1, wherein the logging request to the user carries out effect, and The step of calculating the value-at-risk for obtaining the user equipment according to the environmental information, specifically includes:
To the user name and key progress effect in the logging request, if effect is correct, according to environmental information calculating The value-at-risk of the user equipment;
If password mistake, the password errors number of the user is recorded, and return to password error message to the user equipment.
4. according to the method described in claim 3, it is characterized in that, the password errors number for recording the user, and to The user equipment returns to the step of password error message further include:
If the password errors number is greater than preset threshold, re-authentication request is initiated to the user equipment.
5. the method according to claim 1, wherein the value-at-risk according to the user, executes corresponding The step of risk resolution strategy, specifically includes:
If the value-at-risk of the user is less than the first preset threshold, determining the user, there is no risks, not to the user Carry out risk resolution strategy;
If the value-at-risk of the user, which is greater than the first preset threshold, then executes the first risk resolution plan less than the second preset threshold Slightly;
If the consumer's risk value is greater than the second preset threshold, the second risk resolution strategy is executed.
6. according to the method described in claim 5, it is characterized in that, the environmental information specifically includes: sensitive item information and non- Sensitive item information;
Correspondingly, the value-at-risk of the user equipment includes sensitive item value-at-risk and non-sensitive item value-at-risk.
7. according to the method described in claim 5, it is characterized in that, the method also includes: obtain preset time period in exist The account quantity of risk adjusts the first preset threshold and the second preset threshold according to described there are the account quantity of risk It is whole.
8. a kind of account safety verifies system characterized by comprising
Information receiving module, according to the user device type of the user, obtains the use for receiving the logging request of user The corresponding environmental information of family device type;
Value-at-risk evaluation module carries out effect for the logging request to the user, and is obtained according to environmental information calculating Obtain the value-at-risk of the user equipment;
Authentication module executes corresponding risk resolution strategy for the value-at-risk according to the user;
Wherein, the environmental information includes at least: user device geographical location, user equipment id, user equipment language, Yong Hushe It is standby to apply number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, user One or more combinations in the address equipment mac, user equipment Bluetooth information.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes that account is pacified as described in any one of claim 1 to 7 when executing described program The step of full verification method.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer It is realized when program is executed by processor as described in any one of claim 1 to 7 the step of account safety verification method.
CN201811443171.6A 2018-11-29 2018-11-29 A kind of account safety verification method and system Pending CN109753772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811443171.6A CN109753772A (en) 2018-11-29 2018-11-29 A kind of account safety verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811443171.6A CN109753772A (en) 2018-11-29 2018-11-29 A kind of account safety verification method and system

Publications (1)

Publication Number Publication Date
CN109753772A true CN109753772A (en) 2019-05-14

Family

ID=66403420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811443171.6A Pending CN109753772A (en) 2018-11-29 2018-11-29 A kind of account safety verification method and system

Country Status (1)

Country Link
CN (1) CN109753772A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681004A (en) * 2020-04-24 2020-09-18 厦门美柚股份有限公司 Business wind control method and system
CN111784352A (en) * 2020-06-30 2020-10-16 支付宝(杭州)信息技术有限公司 Authentication risk identification method and device and electronic equipment
CN112836196A (en) * 2021-02-25 2021-05-25 北京顶象技术有限公司 Verification code generation method and device and computer equipment
CN113596049A (en) * 2021-08-04 2021-11-02 杭州虎符网络有限公司 Identity authentication method and device, computer equipment and storage medium
CN114268494A (en) * 2021-12-22 2022-04-01 赛尔网络有限公司 Secure access method, system, device and medium
CN114285664A (en) * 2021-12-29 2022-04-05 赛尔网络有限公司 Abnormal user identification method, system, device and medium
CN115049392A (en) * 2022-06-20 2022-09-13 阮荣军 Duration habit verification system and method based on cloud storage
CN115529142A (en) * 2022-10-09 2022-12-27 阳光电源股份有限公司 Login management method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639669A (en) * 2015-02-04 2015-05-20 九玉(北京)科技有限公司 Method and device for configuring electronic mail box
US20160042167A1 (en) * 2009-08-05 2016-02-11 Conor Robert White Methods and systems for authenticating users
CN105933266A (en) * 2015-08-20 2016-09-07 中国银联股份有限公司 Verification method and server
CN106295349A (en) * 2015-05-29 2017-01-04 阿里巴巴集团控股有限公司 Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN106778392A (en) * 2016-12-23 2017-05-31 惠州Tcl移动通信有限公司 A kind of mobile terminal safety guard method and system
CN107665301A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 Verification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160042167A1 (en) * 2009-08-05 2016-02-11 Conor Robert White Methods and systems for authenticating users
CN104639669A (en) * 2015-02-04 2015-05-20 九玉(北京)科技有限公司 Method and device for configuring electronic mail box
CN106295349A (en) * 2015-05-29 2017-01-04 阿里巴巴集团控股有限公司 Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN105933266A (en) * 2015-08-20 2016-09-07 中国银联股份有限公司 Verification method and server
CN107665301A (en) * 2016-07-28 2018-02-06 腾讯科技(深圳)有限公司 Verification method and device
CN106778392A (en) * 2016-12-23 2017-05-31 惠州Tcl移动通信有限公司 A kind of mobile terminal safety guard method and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681004A (en) * 2020-04-24 2020-09-18 厦门美柚股份有限公司 Business wind control method and system
CN111784352A (en) * 2020-06-30 2020-10-16 支付宝(杭州)信息技术有限公司 Authentication risk identification method and device and electronic equipment
CN112836196A (en) * 2021-02-25 2021-05-25 北京顶象技术有限公司 Verification code generation method and device and computer equipment
CN113596049A (en) * 2021-08-04 2021-11-02 杭州虎符网络有限公司 Identity authentication method and device, computer equipment and storage medium
CN114268494A (en) * 2021-12-22 2022-04-01 赛尔网络有限公司 Secure access method, system, device and medium
CN114285664A (en) * 2021-12-29 2022-04-05 赛尔网络有限公司 Abnormal user identification method, system, device and medium
CN115049392A (en) * 2022-06-20 2022-09-13 阮荣军 Duration habit verification system and method based on cloud storage
CN115529142A (en) * 2022-10-09 2022-12-27 阳光电源股份有限公司 Login management method, device, equipment and medium
CN115529142B (en) * 2022-10-09 2024-09-24 阳光电源股份有限公司 Login management method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN109753772A (en) A kind of account safety verification method and system
EP3719678B1 (en) Identity verification method and apparatus
CN104519032B (en) A kind of security strategy and system of internet account number
US10516698B2 (en) Honeypot computing services that include simulated computing resources
US10467687B2 (en) Method and system for performing fraud detection for users with infrequent activity
CN110417778B (en) Access request processing method and device
US9667613B1 (en) Detecting mobile device emulation
CN107169499B (en) Risk identification method and device
CN104954350B (en) Account information protection method and system
CN107705206A (en) A kind of transaction risk appraisal procedure and device
CN107624238A (en) To the safe access control of the application based on cloud
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN108353079A (en) Detection to the Cyberthreat for application based on cloud
US9639689B1 (en) User authentication
CN110348188B (en) Core body checking method and device
CN104301286A (en) User login authentication method and device
CN109784031A (en) A kind of account authentication process method and device
CN110874743A (en) Method and device for determining account transaction risk
CN111953635B (en) Interface request processing method and computer-readable storage medium
CN111178890A (en) Account protection method, device and equipment
CN109245944A (en) Network safety evaluation method and system
WO2016048129A2 (en) A system and method for authenticating a user based on user behaviour and environmental factors
JP2019036273A (en) System and method of identifying potentially dangerous devices during interaction of user with banking services
CN110930161A (en) Method for determining operation time of business operation and self-service business operation equipment
CN111586028A (en) Abnormal login evaluation method and device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190514