Login verification method based on multi-station data, verification device and memory medium

A login verification, multi-site technology, which is applied in the fields of login verification, verification equipment and storage media based on multi-site data, and can solve the problem of not being able to better judge the behavior of credential stuffing.

Active Publication Date: 2017-10-20
贝硕科技(云南)有限公司
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a login verification method, verification device and storage medium for multi-site data, aiming to solve the technical problem of not being able to better judge credentialing behavior in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method based on multi-station data, verification device and memory medium
  • Login verification method based on multi-station data, verification device and memory medium
  • Login verification method based on multi-station data, verification device and memory medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] refer to figure 1 , figure 1 It is a schematic structural diagram of the verification device of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0039] Such as figure 1 As shown, the verification device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, the network interface 1004 may include a standard wired interface and a wireless interface (such as a WI-FI interface). ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a login verification method based on multi-station data, a verification device and a memory medium. According to the method, the device and the memory medium, login information of a target website sent by user equipment is intercepted; a corresponding current user account identifier is searched according to the login information; when the current user account identifier is searched, history login parameters of each preset website corresponding to the current user account identifier are obtained; and the legality of the login information is verified according to the history login parameters. Through setting of one user account identifier capable of identifying a user identity across a plurality of websites, the corresponding history login parameters of each preset website can be obtained, namely, the history login parameters of each preset website are gathered. Compared with the login data of the single website, the login verification method has the advantage that whether a current login behavior is legal or not can be identified accurately according to the gathered history login parameters, and the technical problem that a library hit behavior cannot be solved well is solved.

Description

technical field [0001] The invention relates to the field of big data, in particular to a login verification method based on multi-site data, a verification device and a storage medium. Background technique [0002] As people browse websites more and more frequently, the login security and usage security of websites have also received people's attention. Among them, credential stuffing attack is a relatively common technical method for hackers to attack websites, that is, hackers use the collected user name and password information to attack other websites, and generally log in in batches to increase attack frequency and success rate. effect. The so-called credential attack is the behavior of attacking other websites based on the data of one website. The main reason is that many users will register accounts on different websites. For the convenience of memory, these accounts and passwords are generally the same, or the passwords are different but There are clear patterns. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/1441H04L67/02
Inventor 许宸杰
Owner 贝硕科技(云南)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products