Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method and device based on login log analysis

A verification method and verification method technology, applied in the field of information security, can solve problems such as reduced security, failure to meet user convenience and safety requirements, user inconvenience, etc.

Active Publication Date: 2016-04-20
广州密码科技有限公司
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, frequent authentication like this has the problem of inconvenience to users, and cannot meet the user's convenience and security requirements: understandably, for convenience, the logic of user authentication will inevitably be reduced, but it will lead to a decrease in security; on the contrary Ground, for the sake of security, the identity verification logic will inevitably be added, but this will lead to an increase in the verification time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device based on login log analysis
  • Verification method and device based on login log analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0046] figure 1 A structural block diagram of a verification device 100 based on login log analysis according to an exemplary embodiment of the present invention is shown. The verification device 100 may reside in various client applications of the mobile terminal, and may also reside in various web servers. For example, the client application usually allows the user to operate with the account of the application. In order to ensu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification method based on login log analysis. The method comprises: obtaining a login log of a user in a preset time period, wherein the login log comprises at least once login behavior; counting the login behavior distribution of the user in the preset time period of every time period all day according to the login log and obtaining a distribution curve; obtaining the safety levels of the subsequent login behaviors of the user according to the distribution curve; and determining the verification mode of the subsequent login behavior of this time according to the safety levels. The invention also discloses a verification device based on login log analysis.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a verification method and device based on log analysis. Background technique [0002] With the continuous development of network technology, communication technology and network applications, in a modern society with highly developed information technology, people will have a lot of needs for identity verification every day, for example, every time they enter an application program, the user needs to enter a password, gesture or voice to authenticate. However, frequent identity verification like this has the problem of bringing inconvenience to users, and cannot meet the user's convenience and security requirements: understandably, for convenience, the logic of user identity verification will inevitably be reduced, but it will lead to a decrease in security; on the contrary Ground, for the sake of security, the identity verification logic will inevitably be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L63/1425
Inventor 吴洪声
Owner 广州密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products