Abnormal login detecting method and device

A technology of abnormal login and detection method, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as low safety factor, login data verification account password, etc., to reduce workload, make accurate judgments, and improve work efficiency Effect

Inactive Publication Date: 2012-01-18
NSFOCUS INFORMATION TECHNOLOGY CO LTD
View PDF2 Cites 154 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The server side of existing service providing systems (such as online trading systems) can only verify the user's account password to identify...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal login detecting method and device
  • Abnormal login detecting method and device
  • Abnormal login detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0019] First please refer to figure 1 , figure 1 It is a flow chart of a specific embodiment of the method for detecting abnormal login based on self-learning according to the present invention, and the method includes the following steps:

[0020] Step S101, receiving the attribute data of the user's login behavior, and judging whether the behavior standard corresponding to the user can be obtained. If the behavior standard corresponding to the user can be acquired, execute step S102; otherwise, execute step S106. Specifically, the behavior standard records at least one set of historical attribute data of login behavior, and records the judgment value generated according to the statistical results of the at least one set of historical login behavior da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an abnormal login detecting method. The method comprises the following steps of: receiving the attribute data of a login behavior of a user; obtaining a behavior standard corresponding to the user, wherein the behavior standard records at least one group of history attribute data of the login behavior and records a decision value generated according to a calculating result of the at least one group of history login behavior data; comparing the decision value with a preset threshold value and detecting whether the login behavior data are abnormal or not; if the login behavior is not abnormal, normally providing service; and if the login behavior is abnormal, sending a prewarning notice or stopping providing service. Correspondingly, the invention provides an abnormal login detecting device. By applying the invention, the safety of a service providing system is improved, the workload of a service providing system administrator is reduced, and the working efficiency is increased.

Description

technical field [0001] The invention relates to the field of network system security, in particular to a method and device for detecting abnormal login behaviors in the system login process. Background technique [0002] With the development of network technology, many traditional industries provide business services on the Internet in B / S mode or C / S mode. Users can use any terminal to log in to complete the interaction with the system. For example, with the rapid development of e-commerce, users can use different devices to log in to the server of the online transaction system to complete financial activities involving physical property such as inquiries, transfers, payments, and sales. Such online systems offer convenience, but they also carry certain risks. For example, criminals use hacking technology to steal user account passwords, and then carry out illegal activities such as spying on other people's privacy, and even illegal property embezzlement. [0003] The ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06
Inventor 侯奎宇徐洋
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products