Identity authentication method based on Web user behavior model

An identity authentication and user technology, applied in the field of identity authentication, can solve problems such as account theft, and achieve the effect of improving accuracy and ensuring property safety.

Active Publication Date: 2013-03-13
TONGJI UNIV
View PDF2 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem that the existing web user authentication methods cannot solve the problem of account theft, the technology of the present invention adopts an identity authentication method based on web user behavior patterns, and extracts the behavior information that best represents the user by collecting the usual web page browsing records of normal web users. Build a user behavior certificate; based on the original authentication method, further judge whether the user's web browsing behavior is consistent with the behavior model constructed by the behavior certificate, and then double judge the user to ensure the security of the Web user's property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on Web user behavior model
  • Identity authentication method based on Web user behavior model
  • Identity authentication method based on Web user behavior model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technology will be further described below in conjunction with the accompanying drawings and examples.

[0015] figure 1 The overall construction process and operating mechanism of the method of the present invention are shown. It mainly includes two stages: offline and online; the work in the offline stage includes user behavior pattern mining and construction, Markov model construction, and generation of confusion probability matrix. The online stage mainly includes observation sequence implementation monitoring and Web user behavior authentication process. the following Figure 2-Figure 4 The implementation details of each part of the technology of the present invention are described separately.

[0016] figure 2 is the constructed user behavior pattern diagram, and the construction process has the following steps:

[0017] Step 1 is a data mining process; collect web page browsing records of web users for at least 30 days, and obtain the order of web page ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An identity authentication method based on a Web user behavior model comprises performing behavior modeling by collecting Web user web page browsing records on a client-side and depicting behavior characteristics of a user within a certain time period; performing web page clustering with web page contents and time series of the Web user accessing Web pages as the standard, and enabling formed classes to serve as behavior model nodes; enabling Web pages skip links among the nodes (the Web page classes) to be directed edges, and enabling linking number to be edge weight; building a directed graph with an edge weight value to serve as a behavior model graph of the Web user, and converting to a markov model. The identity authentication method can be combined with an existing Web user identity authentication mode, user identity is authenticated from two aspects, the authentication accuracy rate is improved, and property safety of the Web user is guaranteed.

Description

technical field [0001] The invention relates to an identity authentication method in the field of network security, in particular to an identity authentication method based on Web user behavior patterns. Background technique [0002] With the rapid development of the Internet and the continuous progress of computer science and technology, Internet-based network transactions are also in full swing, which not only provides a continuous impetus to the development of my country's economy, but also brings great benefits to people's lives. convenient. More and more people carry out business activities through online transactions and payment methods, and the development prospects of online transactions are very broad. [0003] However, due to the recent rise of online transaction and payment platforms, the security system of online payment is not perfect, and the credibility of online transaction processes and behaviors has become more and more prominent, which has gradually become...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 蒋昌俊陈闳中闫春钢丁志军于汪洋赵培海
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products