Identification method for network access equipment and implementation system for identification method

A technology for device identification and system implementation, applied in the field of Internet applications, can solve problems such as distrust, affect honest customer transaction experience, hurt customer conversion rate, etc., and achieve the effect of improving security

Inactive Publication Date: 2012-10-03
JIANGSU PAYEGIS TECH CO LTD
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, hackers and cheaters on the Internet are mercenary, and their methods are refurbished, and they are full of tricks. The client security technology cannot keep up with the refurbishment of cheating methods.
At the same time, too much security monitoring on the client side will bring great inconvenience and distrust to users, which will affect the trading experience of honest customers and hurt the conversion rate of customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method for network access equipment and implementation system for identification method
  • Identification method for network access equipment and implementation system for identification method
  • Identification method for network access equipment and implementation system for identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with examples of implementation and accompanying drawings.

[0031] The user of the present invention does not need to install software or a server, and only needs to use the client (or user) Internet device to access the website application program, insert HTML configuration tags and an HTTPS API call function to the client's web application server. User administrators can access the device fingerprint management platform to customize models and rules suitable for customers.

[0032] like figure 1 As shown, it is a system architecture diagram for realizing the Internet-connected device identification technology in the present invention, and the workflow of the whole Internet-connected device identification method can be summarized as the following steps through the system architecture diagram:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identification method for network access equipment and an implementation system for the identification method. The method comprises the following steps that: a user is connected with and accesses a web service layer through the network access equipment, and software embedded into an application program page of a client acquires information about the network access equipment of the user, wherein the information comprises an equipment attribute, a state packet, a real Internet protocol (IP) address and a user behavior attribute; the network access equipment is connected with an established equipment fingerprint database, and performs retrieval to identify whether the network access equipment exists or not; the user enters an application layer for access or a specific transaction function, and a cloud computing cluster-based equipment fingerprint management platform integrates a machine identification and monitoring network and risk control, performs uniqueness identification on the network access equipment according to the network attribute of the equipment, and judges whether the network access equipment has an unconscious change or a conscious deceptive behavior or not; and the operation of the user over the network access equipment is identified and recorded, and a result is stored in the equipment fingerprint database. According to the technical scheme, the functions of network access equipment query, risk early warning, equipment tracking and the like are provided for the user by fully utilizing the network attribute and the high computing and judgment capability of a cloud computing cluster, roles of two parties of a transaction can be accurately identified, and the credibility of the transaction can be quickly judged, so that the safety of the transaction is improved.

Description

technical field [0001] The invention relates to an Internet application, in particular to a method for intelligently identifying pseudo-fingerprints for Internet-connected devices and providing security for network transactions and an implementation system thereof. Background technique [0002] Online identification technology is widely used to provide risk management for online banking, payment providers, online games and e-commerce. Excellent identification technology plays a huge role in reducing online transaction fraud and protecting the interests of merchants and consumers. With the internationalization of the economy, various governments, departments, and enterprises of various sizes at home and abroad have put forward higher requirements for online security assurance. [0003] At present, in order to ensure the smooth realization of online transactions, various security technologies are used in network security, such as biometric authentication technology, encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 汪德嘉
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products