CN109753772A - A kind of account safety verification method and system - Google Patents
A kind of account safety verification method and system Download PDFInfo
- Publication number
- CN109753772A CN109753772A CN201811443171.6A CN201811443171A CN109753772A CN 109753772 A CN109753772 A CN 109753772A CN 201811443171 A CN201811443171 A CN 201811443171A CN 109753772 A CN109753772 A CN 109753772A
- Authority
- CN
- China
- Prior art keywords
- user
- risk
- user equipment
- value
- environmental information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the present invention provides a kind of account safety verification method and system, wherein provided method includes: to receive the logging request of user to obtain the corresponding environmental information of the user device type according to the user device type of the user;Effect is carried out to the logging request of the user, and calculates the value-at-risk for obtaining the user equipment according to the environmental information;According to the value-at-risk of the user, corresponding risk resolution strategy is executed;Method provided in an embodiment of the present invention authenticates user account using widely multifactor, improves the accuracy determined account safe condition, reduce the probability failed to judge.
Description
Technical field
The present embodiments relate to technical field of network security more particularly to a kind of account safety verification method and systems
Background technique
Network technology greatly changes daily life, and to this network application, user requires to establish account.
Network application account is stolen to be that current information security field is very serious and urgent problem, for example, online game account and
The stolen event of game article happens occasionally.The development of internet also brings new business model to financial industry, people to
The safety of line fund account has higher requirement.
Internet area Account Guard is always a stubborn problem, and traditional technical solution is generally using specific letter
Breath binding judges whether the account of user is stolen.What is be often used has " logging in place " and " device identification ", when the information of user
When changing, business side may require that user judges the true identity of user using the method for secondary verification.
However, conventionally, as the variability of network attack gimmick, the defense technique of traditional single-mode is very
Hardly possible reply attack complicated and changeable at present frequently can lead to threaten account safety in part using single judgement information
It generates and fails to judge when situation occurs, such as in the website at the end PC, can not often position determining " device identification ", if by chance hacker
Location and victim are logged in the same area, the security system of account will fail at this time, while hacker may also deliberately forge
The personal information of user.On the other hand, when business side, which encounters account, may face safe situation, what system of defense was taken
Scheme is often fixed verifying gimmick, such as when detecting that target account occurs abnormal, can send verifying mail to presetting
Mailbox in carry out login authentication, however, it often includes simultaneously that the mailbox of user or other verifyings are set that general account is stolen
Stolen while standby, this authentication mode does not often have any obstruction for steal-number person, can directly pass through.
Summary of the invention
The embodiment of the present invention provides a kind of account safety verification method and system, to solve single-mode in the prior art
Defense technique be difficult reply attack complicated and changeable at present, be easy to cause the behavior misjudgment to account safety is threatened
The problem of.
In a first aspect, the embodiment of the present invention provides a kind of account safety verification method, comprising:
The logging request for receiving user obtains the user device type pair according to the user device type of the user
The environmental information answered;
Effect is carried out to the logging request of the user, and is calculated according to the environmental information and obtains the user equipment
Value-at-risk;
According to the value-at-risk of the user, corresponding risk resolution strategy is executed;
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id
Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model,
One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Second aspect, the embodiment of the present invention provide a kind of account safety verifying system, comprising:
Information receiving module, according to the user device type of the user, obtains institute for receiving the logging request of user
State the corresponding environmental information of user device type;
Value-at-risk evaluation module carries out effect for the logging request to the user, and according to the environmental information meter
Calculate the value-at-risk for obtaining the user equipment;
Authentication module executes corresponding risk resolution strategy for the value-at-risk according to the user.
The third aspect, the embodiment of the present invention provides a kind of electronic equipment, including memory, processor and is stored in memory
Computer program that is upper and can running on a processor, the processor are realized when executing described program such as above-mentioned first aspect institute
The step of account safety verification method of offer.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, are stored thereon with calculating
Machine program, realizing the account safety verification method as provided by above-mentioned first aspect when which is executed by processor
Step.
Account safety verification method provided in an embodiment of the present invention and equipment, using widely multifactor to user account
It is authenticated, improves the accuracy determined account safe condition, reduce the probability failed to judge.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram for the account safety verification method that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram that the account safety that one embodiment of the invention provides verifies system;
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
With reference to Fig. 1, Fig. 1 is the flow diagram for the account safety verification method that one embodiment of the invention provides, and is provided
Method include:
S1 receives the logging request of user, according to the user device type of the user, obtains the user device type
Corresponding environmental information;
S2 carries out effect to the logging request of the user, and calculates the acquisition user according to the environmental information and set
Standby value-at-risk;
S3 executes corresponding risk resolution strategy according to the value-at-risk of the user;
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id
Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model,
One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Specifically, when users log on, receiving the username and password that user sends, while also receiving user environment letter
Breath, wherein the environmental information of user and the type of user equipment are relative to such as when the mobile terminal that user equipment is cell phone type
When, then user device geographical location, user equipment ID can be obtained, user equipment Bluetooth information etc. is used as environmental information, and works as and use
When the type of family equipment is PC, then the id of user equipment can be obtained, the information such as address user equipment mac are as environmental information, originally
In embodiment, environmental information, which includes at least, user device geographical location, user equipment id, user equipment language, user equipment
Using number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, Yong Hushe
One or more combinations in the standby address mac, user equipment Bluetooth information.
After obtaining the environmental information of user equipment, user is determined using a controllable weighting algorithm to environmental information
Security risk value P, system uses different risk resolution strategies according to the size of P value, to login user, such as when user's
City is logged in, when user equipment id does not change, then P value can reduce, when the user equipment of user equipment language and last login
When language changes, then P value can increase, and the P value finally obtained is the value-at-risk of user, when consumer's risk value is lower than a model
When enclosing, then user can be determined for low-risk state, at this time without risk resolution strategy, user is directly logined successfully, and works as risk
When value is higher than a preset threshold, then the operations such as secondary verifying can be carried out to user, it is ensured that the safety of user account.
By the method, user account is authenticated using widely multifactor, is improved to account safe condition
The accuracy of judgement reduces the probability failed to judge.
On the basis of the above embodiments, the logging request for receiving user, according to the user equipment class of the user
Type, the step of obtaining the user device type corresponding environmental information, specifically include: obtaining the login name and key of user, together
When according to the port for receiving username and password, obtain the corresponding environmental information of port type;Wherein, the port type is extremely
It less include any in mobile terminal port and fixed pc port.
Specifically, obtaining the mistake of the corresponding environmental information of the user device type according to the user device type of user
Cheng Zhong mainly sends the port of logging request to identify to the type of user equipment, so as to sentence by user equipment
Determine the register that user is carried out by what equipment, wherein the type of port is at least divided into port and the fixation of mobile terminal
The port of PC is also possible to the login-port of other types equipment.
On the basis of the above embodiments, the logging request to the user carries out effect, and according to the environment
Information calculates the step of value-at-risk for obtaining the user equipment, specifically includes: to user name in the logging request and close
Key carries out effect and calculates the value-at-risk of the user equipment according to the environmental information if effect is correct;If password mistake,
The password errors number of the user is then recorded, and returns to password error message to the user equipment.
The password errors number for recording the user, and the step of returning to password error message to the user equipment
If further include: the password errors number is greater than preset threshold, initiates re-authentication request to the user equipment.
It, first can login name to user and close specifically, the system of business side is after receiving the logging request of user
Key carries out effect, after login name and key effect pass through, then carries out the value-at-risk of subsequent environmental information and calculates step, when stepping on
When recording name and password authentification failure, then the information of password mistake can be returned to, while recording the number of password mistake, when password mistake
When number is more than preset times, system can then initiate user re-authentication request, and usual re-authentication request, which can be, to be passed through
The mailbox and mobile phone of the account binding of user are verified, to guarantee the safety of user account.
On the basis of the above embodiments, the value-at-risk according to the user executes corresponding risk resolution strategy
The step of, it specifically includes:
If the value-at-risk of the user is less than the first preset threshold, determining the user, there is no risks, not to this
User carries out risk resolution strategy;It is then held if the value-at-risk of the user is greater than the first preset threshold less than the second preset threshold
If row the first risk resolution strategy consumer's risk value is greater than the second preset threshold, the second risk resolution strategy is executed.Institute
It states environmental information to specifically include: sensitive item information and non-sensitive item information;Correspondingly, the value-at-risk of the user equipment includes quick
Feel item value-at-risk and non-sensitive item value-at-risk.
Specifically, in the present embodiment, system sets risk different secure thresholds, such as Pmax1For possible wind
Danger, Pmax2For serious risk, when password authentification is correct, while the value-at-risk P of user exceeds Pmax1When, then using completely self-contained
Re-authentication system carries out re-authentication to user, so that it is guaranteed that the safety of user account, further, when the wind of user
Danger value exceeds Pmax2When, then the account is temporarily freezed, it is desirable that it uses manual service, or is recognized after Unfreezing apparatus
Card.
Further, in the present embodiment, the environmental information of user equipment is divided into sensitive item information and non-sensitive item information,
Wherein, sensitive information item refers to the environmental information item that user will not change frequent occurrence, such as logs in city, the rings such as logging device id
Border information refers to the possible relatively easy changed item of information of user, such as device systems language, equipment for non-sensitive item
Number of applications etc. is installed.For sensitive item, after wherein having any one to change, system can assert that account faces wind
Danger, can be by sensitive item value-at-risk P1Equal to Pmax1, for non-sensitive item, system will use P2=a × W1+b×W2+…+n×WnPower
Restatement algorithm calculates the value-at-risk of non-sensitive item, wherein a, b ... n represent the environmental information of different non-sensitive items, and W is difference
The Risk rated ratio coefficient of the environmental information of non-sensitive item, by calculating P1And P2, the final risk value P of system acquisition user, and root
Risk judgement is carried out according to value-at-risk P.
By the method, according to different risk class dynamic given thresholds, and using not different disposal gimmick, rather than
Fixed pure strategy, and then ensure that the safety of re-authentication so that attacker difficult to bypass secondary verifying movement come into
Pirate number operation.
On the basis of the above embodiments, the method also includes: obtain preset time period in there are the account numbers of risk
Amount, according to described there are the account quantity of risk, is adjusted the first preset threshold and the second preset threshold.
Specifically, system can carry out real-time statistics for the total amount of the adventure account occurred daily, it is denoted as S, when business is whole
When body meets with adventure account number rapid increase, illustrate that business may occur to hit library or steal-number event, therefore, system on a large scale
In include a dynamic rules, when S numerical value rise when, reduce PmaxDecision threshold, i.e. S=y-x × Pmax, pass through reasonable set
Parameter y and x, to realize optimal safe verification method.
By the method, may be implemented to promote secondary verifying and account when system is by attacking for the perception of attacker
Family freeze operation frequency, the expansion that attack can be prevented to influence in time improve the safety of whole station entirety user.
With reference to Fig. 2, Fig. 2 is the structural schematic diagram that the account safety that one embodiment of the invention provides verifies system, is provided
System include: information receiving module 21, value-at-risk evaluation module 22, authentication module 23.
Wherein, information receiving module 21 is used to receive the logging request of user, according to the user device type of the user,
Obtain the corresponding environmental information of the user device type.
Value-at-risk evaluation module 22 is used to carry out effect to the logging request of the user, and according to the environmental information meter
Calculate the value-at-risk for obtaining the user equipment.
Authentication module 23 is used for the value-at-risk according to the user, executes corresponding risk resolution strategy.
Wherein, the environmental information includes at least: user device geographical location, user equipment language, is used user equipment id
Family equipment application number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model,
One or more combinations in the address user equipment mac, user equipment Bluetooth information.
Specifically, when users log on, receiving the username and password that user sends, while also receiving user environment letter
Breath, wherein the environmental information of user and the type of user equipment are relative to such as when the mobile terminal that user equipment is cell phone type
When, then user device geographical location, user equipment ID can be obtained, user equipment Bluetooth information etc. is used as environmental information, and works as and use
When the type of family equipment is PC, then the id of user equipment can be obtained, the information such as address user equipment mac are as environmental information, originally
In embodiment, environmental information, which includes at least, user device geographical location, user equipment id, user equipment language, user equipment
Using number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, Yong Hushe
One or more combinations in the standby address mac, user equipment Bluetooth information.
After obtaining the environmental information of user equipment, user is determined using a controllable weighting algorithm to environmental information
Security risk value P, system uses different risk resolution strategies according to the size of P value, to login user, such as when user's
City is logged in, when user equipment id does not change, then P value can reduce, when the user equipment of user equipment language and last login
When language changes, then P value can increase, and the P value finally obtained is the value-at-risk of user, when consumer's risk value is lower than a model
When enclosing, then user can be determined for low-risk state, at this time without risk resolution strategy, user is directly logined successfully, and works as risk
When value is higher than a preset threshold, then the operations such as secondary verifying can be carried out to user, it is ensured that the safety of user account.
By this system, user account is authenticated using widely multifactor, is improved to account safe condition
The accuracy of judgement reduces the probability failed to judge.
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides, as shown in figure 3, electronic equipment includes:
Processor (processor) 301, communication interface (Communications Interface) 302, memory (memory) 303
With bus 304, wherein processor 301, communication interface 302, memory 303 complete mutual communication by bus 304.Place
Reason device 301 can call the logical order in memory 303, to execute following method, for example, the login for receiving user is asked
It asks, according to the user device type of the user, obtains the corresponding environmental information of the user device type;To the user's
Logging request carries out effect, and the value-at-risk for obtaining the user equipment is calculated according to the environmental information;According to the user
Value-at-risk, execute corresponding risk resolution strategy.
The embodiment of the present invention discloses a kind of computer program product, and computer program product includes being stored in non-transient calculating
Computer program on machine readable storage medium storing program for executing, computer program include program instruction, when program instruction is computer-executed,
Computer is able to carry out method provided by above-mentioned each method embodiment, for example, the logging request for receiving user, according to institute
The user device type for stating user obtains the corresponding environmental information of the user device type;To the logging request of the user
Effect is carried out, and calculates the value-at-risk for obtaining the user equipment according to the environmental information;According to the value-at-risk of the user,
Execute corresponding risk resolution strategy.
The present embodiment provides a kind of non-transient computer readable storage medium, non-transient computer readable storage medium storages
Computer instruction, computer instruction make computer execute method provided by above-mentioned each method embodiment, for example, receive and use
The logging request at family obtains the corresponding environmental information of the user device type according to the user device type of the user;It is right
The logging request of the user carries out effect, and the value-at-risk for obtaining the user equipment is calculated according to the environmental information;Root
According to the value-at-risk of the user, corresponding risk resolution strategy is executed.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member
It is physically separated with being or may not be, component shown as a unit may or may not be physics list
Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs
In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness
Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of account safety verification method characterized by comprising
It is corresponding to obtain the user device type according to the user device type of the user for the logging request for receiving user
Environmental information;
Effect is carried out to the logging request of the user, and calculates the risk for obtaining the user equipment according to the environmental information
Value;
According to the value-at-risk of the user, corresponding risk resolution strategy is executed;
Wherein, the environmental information includes at least: user device geographical location, user equipment id, user equipment language, Yong Hushe
It is standby to apply number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, user
One or more combinations in the address equipment mac, user equipment Bluetooth information.
2. the method according to claim 1, wherein it is described receive user logging request, according to the user
User device type, the step of obtaining the user device type corresponding environmental information specifically includes:
The login name and key of user are obtained, while according to the port for receiving username and password, it is corresponding to obtain port type
Environmental information;
Wherein, the port type, which includes at least, has mobile terminal port and fixes any in pc port.
3. the method according to claim 1, wherein the logging request to the user carries out effect, and
The step of calculating the value-at-risk for obtaining the user equipment according to the environmental information, specifically includes:
To the user name and key progress effect in the logging request, if effect is correct, according to environmental information calculating
The value-at-risk of the user equipment;
If password mistake, the password errors number of the user is recorded, and return to password error message to the user equipment.
4. according to the method described in claim 3, it is characterized in that, the password errors number for recording the user, and to
The user equipment returns to the step of password error message further include:
If the password errors number is greater than preset threshold, re-authentication request is initiated to the user equipment.
5. the method according to claim 1, wherein the value-at-risk according to the user, executes corresponding
The step of risk resolution strategy, specifically includes:
If the value-at-risk of the user is less than the first preset threshold, determining the user, there is no risks, not to the user
Carry out risk resolution strategy;
If the value-at-risk of the user, which is greater than the first preset threshold, then executes the first risk resolution plan less than the second preset threshold
Slightly;
If the consumer's risk value is greater than the second preset threshold, the second risk resolution strategy is executed.
6. according to the method described in claim 5, it is characterized in that, the environmental information specifically includes: sensitive item information and non-
Sensitive item information;
Correspondingly, the value-at-risk of the user equipment includes sensitive item value-at-risk and non-sensitive item value-at-risk.
7. according to the method described in claim 5, it is characterized in that, the method also includes: obtain preset time period in exist
The account quantity of risk adjusts the first preset threshold and the second preset threshold according to described there are the account quantity of risk
It is whole.
8. a kind of account safety verifies system characterized by comprising
Information receiving module, according to the user device type of the user, obtains the use for receiving the logging request of user
The corresponding environmental information of family device type;
Value-at-risk evaluation module carries out effect for the logging request to the user, and is obtained according to environmental information calculating
Obtain the value-at-risk of the user equipment;
Authentication module executes corresponding risk resolution strategy for the value-at-risk according to the user;
Wherein, the environmental information includes at least: user device geographical location, user equipment id, user equipment language, Yong Hushe
It is standby to apply number, user equipment plug number, user device system model, user equipment brand, user equipment CPU model, user
One or more combinations in the address equipment mac, user equipment Bluetooth information.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes that account is pacified as described in any one of claim 1 to 7 when executing described program
The step of full verification method.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer
It is realized when program is executed by processor as described in any one of claim 1 to 7 the step of account safety verification method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811443171.6A CN109753772A (en) | 2018-11-29 | 2018-11-29 | A kind of account safety verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811443171.6A CN109753772A (en) | 2018-11-29 | 2018-11-29 | A kind of account safety verification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109753772A true CN109753772A (en) | 2019-05-14 |
Family
ID=66403420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811443171.6A Pending CN109753772A (en) | 2018-11-29 | 2018-11-29 | A kind of account safety verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109753772A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111681004A (en) * | 2020-04-24 | 2020-09-18 | 厦门美柚股份有限公司 | Business wind control method and system |
CN111784352A (en) * | 2020-06-30 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Authentication risk identification method and device and electronic equipment |
CN112836196A (en) * | 2021-02-25 | 2021-05-25 | 北京顶象技术有限公司 | Verification code generation method and device and computer equipment |
CN113596049A (en) * | 2021-08-04 | 2021-11-02 | 杭州虎符网络有限公司 | Identity authentication method and device, computer equipment and storage medium |
CN114268494A (en) * | 2021-12-22 | 2022-04-01 | 赛尔网络有限公司 | Secure access method, system, device and medium |
CN114285664A (en) * | 2021-12-29 | 2022-04-05 | 赛尔网络有限公司 | Abnormal user identification method, system, device and medium |
CN115049392A (en) * | 2022-06-20 | 2022-09-13 | 阮荣军 | Duration habit verification system and method based on cloud storage |
CN115529142A (en) * | 2022-10-09 | 2022-12-27 | 阳光电源股份有限公司 | Login management method, device, equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104639669A (en) * | 2015-02-04 | 2015-05-20 | 九玉(北京)科技有限公司 | Method and device for configuring electronic mail box |
US20160042167A1 (en) * | 2009-08-05 | 2016-02-11 | Conor Robert White | Methods and systems for authenticating users |
CN105933266A (en) * | 2015-08-20 | 2016-09-07 | 中国银联股份有限公司 | Verification method and server |
CN106295349A (en) * | 2015-05-29 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen |
CN106778392A (en) * | 2016-12-23 | 2017-05-31 | 惠州Tcl移动通信有限公司 | A kind of mobile terminal safety guard method and system |
CN107665301A (en) * | 2016-07-28 | 2018-02-06 | 腾讯科技(深圳)有限公司 | Verification method and device |
-
2018
- 2018-11-29 CN CN201811443171.6A patent/CN109753772A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160042167A1 (en) * | 2009-08-05 | 2016-02-11 | Conor Robert White | Methods and systems for authenticating users |
CN104639669A (en) * | 2015-02-04 | 2015-05-20 | 九玉(北京)科技有限公司 | Method and device for configuring electronic mail box |
CN106295349A (en) * | 2015-05-29 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen |
CN105933266A (en) * | 2015-08-20 | 2016-09-07 | 中国银联股份有限公司 | Verification method and server |
CN107665301A (en) * | 2016-07-28 | 2018-02-06 | 腾讯科技(深圳)有限公司 | Verification method and device |
CN106778392A (en) * | 2016-12-23 | 2017-05-31 | 惠州Tcl移动通信有限公司 | A kind of mobile terminal safety guard method and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111681004A (en) * | 2020-04-24 | 2020-09-18 | 厦门美柚股份有限公司 | Business wind control method and system |
CN111784352A (en) * | 2020-06-30 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Authentication risk identification method and device and electronic equipment |
CN112836196A (en) * | 2021-02-25 | 2021-05-25 | 北京顶象技术有限公司 | Verification code generation method and device and computer equipment |
CN113596049A (en) * | 2021-08-04 | 2021-11-02 | 杭州虎符网络有限公司 | Identity authentication method and device, computer equipment and storage medium |
CN114268494A (en) * | 2021-12-22 | 2022-04-01 | 赛尔网络有限公司 | Secure access method, system, device and medium |
CN114285664A (en) * | 2021-12-29 | 2022-04-05 | 赛尔网络有限公司 | Abnormal user identification method, system, device and medium |
CN115049392A (en) * | 2022-06-20 | 2022-09-13 | 阮荣军 | Duration habit verification system and method based on cloud storage |
CN115529142A (en) * | 2022-10-09 | 2022-12-27 | 阳光电源股份有限公司 | Login management method, device, equipment and medium |
CN115529142B (en) * | 2022-10-09 | 2024-09-24 | 阳光电源股份有限公司 | Login management method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109753772A (en) | A kind of account safety verification method and system | |
EP3719678B1 (en) | Identity verification method and apparatus | |
CN104519032B (en) | A kind of security strategy and system of internet account number | |
US10516698B2 (en) | Honeypot computing services that include simulated computing resources | |
US10467687B2 (en) | Method and system for performing fraud detection for users with infrequent activity | |
CN110417778B (en) | Access request processing method and device | |
US9667613B1 (en) | Detecting mobile device emulation | |
CN107169499B (en) | Risk identification method and device | |
CN104954350B (en) | Account information protection method and system | |
CN107705206A (en) | A kind of transaction risk appraisal procedure and device | |
CN107624238A (en) | To the safe access control of the application based on cloud | |
CN106295349A (en) | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen | |
CN108353079A (en) | Detection to the Cyberthreat for application based on cloud | |
US9639689B1 (en) | User authentication | |
CN110348188B (en) | Core body checking method and device | |
CN104301286A (en) | User login authentication method and device | |
CN109784031A (en) | A kind of account authentication process method and device | |
CN110874743A (en) | Method and device for determining account transaction risk | |
CN111953635B (en) | Interface request processing method and computer-readable storage medium | |
CN111178890A (en) | Account protection method, device and equipment | |
CN109245944A (en) | Network safety evaluation method and system | |
WO2016048129A2 (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
JP2019036273A (en) | System and method of identifying potentially dangerous devices during interaction of user with banking services | |
CN110930161A (en) | Method for determining operation time of business operation and self-service business operation equipment | |
CN111586028A (en) | Abnormal login evaluation method and device, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190514 |