Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User credibility authentication system and method based on user behaviors

A reliable and user-friendly technology, applied in the fields of digital data authentication, instruments, electronic digital data processing, etc., can solve the problem of illegal account/password misappropriation, and achieve the effect of ensuring security and improving accuracy.

Active Publication Date: 2014-03-19
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF3 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Nowadays, in the most important online payment link in e-commerce, the identification of user identity is usually realized through account / password verification, account binding and other authentication methods. However, due to the inherent openness and resource sharing of the network, account / password Passwords are often stolen illegally. Therefore, the security problems of online transactions are becoming more and more prominent. The traditional account / password verification and account binding authentication methods are obviously unable to meet the current security requirements. How to build a credible The transaction environment, ensuring the credibility of user identities and behaviors, is receiving more and more attention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User credibility authentication system and method based on user behaviors
  • User credibility authentication system and method based on user behaviors
  • User credibility authentication system and method based on user behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] As we all know, because everyone's job type, income, consumption habits, living environment and other factors are different, although there will be certain fluctuations due to emergencies or changes in habits, the consumption behavior and operation behavior of a trusted user It will maintain a certain fixed characteristic for a long period of time, showing a certain pattern, and it is difficult to be stolen. Therefore, user credibility authentication based on user behavior can not only greatly improve the identification rate of user identities, effectively prevent criminals from stealing other people's legitimate accounts for network fraud, but also prevent legal users, especially system managers, from illegally operating To a certain extent, alleviate the loss of corporate and personal property caused by the imperfect security system of online transactions.

[0048] Based on the above principles, the present invention provides a user credibility authentication syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user credibility authentication system and method based on user behaviors. The system comprises a user identity and behavior model determination module, a user behavior collection module, a user behavior mining module, a user behavior sequence matching and credibility authentication module and a local security policy module. The method comprises the steps as follows: the user behavior mining module performs behavior mining on user behavior logs; a personal user behavior characteristic sequence is established; the user behavior sequence matching and credibility authentication module performs sequence similarity calculation on the personal user behavior characteristic sequence and a to-be-matched sequence, so that a user credibility grade is obtained, and a corresponding security policy is started using. According to the invention, a sequence pattern mining manner is adopted to collect real-time user behaviors so as to establish the to-be-matched sequence, the similarity matching of the behavior sequence is performed, accordingly, the real-time user behaviors are subjected to credibility authentication, the accurate rate of authentication is improved, and enterprise and personal property safety is guaranteed.

Description

technical field [0001] The invention relates to electronic commerce, in particular to a user credibility authentication system and method based on user behavior. Background technique [0002] With the rapid development of network technology and information technology, online transactions have increasingly become a new business model, and more and more enterprises and individual users rely on e-commerce for fast and efficient transactions. The emergence of online transactions not only provides a new opportunity for the development and growth of the Internet, but also injects enormous energy into the business world. [0003] Nowadays, in the most important online payment link in e-commerce, the identification of user identity is usually realized through account / password verification, account binding and other authentication methods. However, due to the inherent openness and resource sharing of the network, account / password Passwords are often stolen illegally. Therefore, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 庞善臣刘婷代丰李毯
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products