Device and method for user identity authentication based on web browsing habits

A technology for user identity authentication and user identity recognition, which is applied in the field of information security to improve the detection rate and reduce the false alarm rate.

Active Publication Date: 2017-12-15
TONGJI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But these methods all have one thing in common, that is, one-time identity authentication. These methods often authenticate the user's identity when logging in. Once the authentication is passed, the user's body is legal by default before logging out. This method also has certain risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for user identity authentication based on web browsing habits
  • Device and method for user identity authentication based on web browsing habits
  • Device and method for user identity authentication based on web browsing habits

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0044] The monitor 102 of the user identity authentication device 101 based on WEB browsing habits of the present invention records the online behavior of legal users, and performs data mining on the WEB browsing records of the last month based on the sliding window principle to form a user behavior certificate based on association rules. When an illegal user logs in to a legitimate account, each webpage visited by the illegal user will be scored according to the user behavior certificate. If the score is lower than a certain threshold, we will consider the user's identity suspicious and warn for further identity verification. The whole scheme is divided into two parts: the first part is to form the user behavior certificate 103 based on the existing records, and the second part is to evaluate the user's real-time web browsing 104 based on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to device and method for authenticating user identity based on WEB browsing habits. The device comprises a monitoring module, a user behavior analyzing module and a user identity recognizing module. The method comprises the steps of (1) acquiring and recording a user WEB browsing record; (2) mining association rule based data from the WEB browsing record of the user within the set time quantum to form an user behavior certification; (3) evaluating the real-time WEB browsing behavior of the user according to the user behavior certification so as to determine whether the identity of the user is valid. Compared with the prior art, the device and method have the advantages that the concept of data mining is applied to identity authentication; the user is monitored and protected during browsing WEB, so that invalid people pretends to be the valid user by stealing the number or fishing and other manners can be effectively prevented; the behavior change of the valid user is dynamically adapted; therefore, the detection rate is increased, the false alarm rate is reduced.

Description

technical field [0001] The invention relates to the field of information security, in particular to a user identity authentication device and method based on WEB browsing habits. Background technique [0002] With the rapid development of the Internet, e-commerce is playing an increasingly important role in public life. More and more people are accustomed to online shopping and consumption, and even the mode of online payment and offline experience. Among them, electronic payment technology plays an indispensable role. [0003] The security guarantee of traditional electronic payment technology is often based on the account password mechanism, but the emergence of phishing websites has completely broken the reliability of this mechanism. Once an illegal user obtains the account password of a legitimate user and logs in, the security of funds in the account will be threatened. Today's e-commerce websites often only recognize the account password, but cannot correctly deter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/02
Inventor 蒋昌俊闫春钢陈闳中丁志军钟珺竹
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products