User login validation method, device and system

A login verification and user technology, applied in the Internet field, can solve problems such as user account security and business pressure threats, and achieve the effect of improving user time efficiency, reducing operations, and balancing security

Inactive Publication Date: 2015-04-29
SHENZHEN TENCENT COMP SYST CO LTD
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the security verification process is cancelled, the user experience will be smoother and better, but it will also give

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User login validation method, device and system
  • User login validation method, device and system
  • User login validation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] refer to figure 1 , which is a schematic diagram of the user login verification system provided by the first embodiment of the present invention. Such as figure 1 As shown, the above system includes: an access server 101 , an application server 102 , a data management server 103 and a verification policy server 104 .

[0041] Among them, see image 3 , the access server 101 is connected to the client 105 ( figure 2 ) and the application server 102, receive the login request information from the client 105, and transmit the login request information from the client 105 to the application server 102, and then return the result returned by the application server 102 to the client 105.

[0042] The application server 102 receives the login request information sent by the access server 101, and forwards the received login request information to the verification policy server 104 to obtain the verification policy. The verification strategy mentioned above refers to the w...

no. 2 example

[0067] This embodiment provides a user login verification method, which can be used for figure 1 The user shown is logged into the authentication system. refer to Figure 6 , the method of this embodiment includes the following steps:

[0068] Step 210, receiving login request information from the user. see also figure 2 and image 3 , the verification policy server 104 receives the login request information forwarded by the application server 102 . The login request information may include user name, password and other information used for user login verification.

[0069] Step 220: Parse the login request information to obtain a user ID, and obtain the user's historical login records according to the user ID; and parse the historical login records to obtain multiple login feature information of the user.

[0070] The above-mentioned historical login records are submitted by the data management server 103 to the verification policy server 104 . Multiple login feature ...

no. 3 example

[0080] This embodiment provides a user login verification method, which can be used for figure 1 The user shown is logged into the authentication system. refer to Figure 7 The method of this embodiment is similar to the method of the second embodiment, the difference is that it further includes: Step 310, acquiring the source application program of the login request information.

[0081] It can be understood that the above-mentioned application program refers to a collection of program modules distinguished by functions, products or requirements. Different applications should provide different functions and features. For example, an online forum and a shopping website may be different applications. Generally speaking, the URL / domain name of the web application can be used to distinguish the application. The same web application generally has part of the same domain name / URL.

[0082] In the application server 102, the source application program of the login request infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user login validation method, device and system. In one embodiment, the method comprises the following steps: receiving login request information of the user; analyzing the login request information to obtain user identification, acquiring history login records of the user according to the user identification and analyzing the history login records so as to acquire multi-item login characteristic information of the user; performing a security level determining process so as to determine the security level of the current login request according to the multi-item login characteristic information; acquiring corresponding verification strategy according to the security level; and completing user login validation according to the corresponding verification strategy. The method, the device and the system can be used for improving the efficiency and the account security of the user login validation.

Description

technical field [0001] The present invention relates to Internet technology, in particular to a user login verification method, device and system. Background technique [0002] In the Internet, security and user efficiency are a pair of contradictions. In order to ensure security, the user is required to perform some additional verification process operations in the process of using the corresponding service, making the process complicated and cumbersome, and detrimental to the user's time. For example, in the process of logging in with an Internet account, after entering the account number and password, additional verification operations such as verification codes and password questions may be encountered. [0003] If the security verification process is cancelled, the user experience will be smoother and better, but it will also give malicious users the opportunity to do evil, which will pose a serious threat to the user's account security and business pressure. Content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/08H04L63/105
Inventor 谢远辉刘金星颜国平
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products