Account risk identification method and device

A risk identification and account technology, applied in the field of information security, can solve the problem of low accuracy of account risk identification scheme, and achieve the effect of improving accuracy and ensuring security

Inactive Publication Date: 2017-03-22
ZHIZHESIHAIBEIJINGTECH CO LTD
View PDF5 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides an account risk identification method and device to solve the problem of low accuracy of existing account risk identification schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account risk identification method and device
  • Account risk identification method and device
  • Account risk identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a schematic flowchart of an account risk identification method provided in the first embodiment of the present invention. The method in this embodiment can be executed by an account risk identification device, where the device can be implemented by software and / or hardware. Such as figure 1 As shown, the account risk identification method provided in this embodiment specifically includes the following steps:

[0022] Step 110: Obtain behavioral data of the target account, where the behavioral data includes the device information of the current login or access to the target account, the IP address, and the number of login or access attempts.

[0023] Among them, the target account is an account that has completed user registration that can be monitored by a back-end server for a certain application or a certain web page, such as a QQ account, a WeChat account, a forum account, and a shopping website account.

[0024] When the background server detects that the t...

Embodiment 2

[0041] figure 2 It is a schematic flowchart of an account risk identification method provided in the second embodiment of the present invention. This embodiment refines the step of "determine the risk coefficient of the target account based on the matching result" in the foregoing embodiment. reference figure 2 , The embodiment of the present invention specifically includes the following steps:

[0042] Step 210: Obtain behavioral data of the target account, where the behavioral data includes the device information of the current login or access to the target account, the IP address and the number of login or access attempts.

[0043] Step 220: Match the behavior data with the historical behavior data of the target account and the preset abnormal operation identification strategy respectively.

[0044] Step 230: Identify whether the login or access behavior of the target account is a machine behavior.

[0045] Exemplarily, the machine behavior is different from the user's normal be...

Embodiment 3

[0052] image 3 It is a structural block diagram of an account risk identification device provided in the third embodiment of the present invention. The device can be implemented by software and / or hardware, and is generally integrated in a background server. Such as image 3 As shown, the device includes: a data acquisition module 310, a matching module 320, and a risk factor determination module 330.

[0053] Wherein, the data acquisition module 310 is used to acquire the behavior data of the target account. The behavior data includes the device information, IP address, and the number of login or access attempts that are currently logged in or access the target account; the matching module 320 is used to compare all The behavior data is matched with the historical behavior data of the target account and the preset abnormal operation identification strategy; the risk coefficient determination module 330 is configured to determine the risk coefficient of the target account accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an account risk identification method and device. The method comprises the following steps of: obtaining the behavior data of a target account, wherein the behavior data comprises the information, the IP (Internet Protocol) address and the login or access attempting frequency of equipment which logs in or accesses the target account at present; matching the behavior data respectively with the historical behavior data of the target account and a preset abnormal operation identification strategy; and according to a matching result, determining the risk factor of the target account. The above technical scheme can be adopted to improve target account risk identification accuracy so as to guarantee the safety of the target account.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to an account risk identification method and device. Background technique [0002] In recent years, with the increasing development of digitization and networking, the ways of dissemination of information are changing rapidly. Internet services such as mobile social networking, online shopping and games have penetrated into all aspects of people's lives and work. Users can not only use the same account to log in to different application platforms (for example, users can use the QQ account to log in to the QQ client, game web page, or other e-commerce platforms through a computer), but also can use different terminal devices to access different applications (For example, users can also use smartphones to access QQ clients, game web pages or other e-commerce web pages and other platforms through their QQ accounts). Although the use of the same account on different pl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 代哲杜旭
Owner ZHIZHESIHAIBEIJINGTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products