Clustering algorithm based financial terminal security protection method and system

A clustering algorithm and financial terminal technology, applied in the electronic field, can solve problems such as reducing efficiency and user experience, and achieve the effect of improving security performance, diversified operation experience, and friendly operation experience

Inactive Publication Date: 2017-11-24
GUANGDONG YOUMAI INFORMATION COMM TECH
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

More importantly, repeated cumbersome password verification will greatly reduce user experience and efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Clustering algorithm based financial terminal security protection method and system
  • Clustering algorithm based financial terminal security protection method and system
  • Clustering algorithm based financial terminal security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Below in conjunction with accompanying drawing and specific embodiment, the present invention will be further described:

[0046] See figure 1 , the embodiment of the present invention relates to a financial terminal security protection method based on a clustering algorithm, and its preferred implementation method includes:

[0047] Step S101 , when the number of login operations performed by the user using the financial terminal reaches a preset value, the historical feature data of the user is acquired.

[0048] Among them, in order to obtain enough sample data, it is required that the number of successful login operations by the user using the financial terminal reaches a preset value. Here, the user's historical feature data is sample data, that is, the user's behavioral operation feature data at each login, such as historical login time points, historical login locations, or historical login devices.

[0049] Step S102 , according to the number of login operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a clustering algorithm based financial terminal security protection method and system. The clustering algorithm based financial terminal security protection method comprises the steps of obtaining historical characteristic data of a user when the login frequency of the user by using the financial terminal reaches to a preset value; carrying out coordinate classification on the historical characteristic data of the user based on the login frequency of the user and the clustering algorithm to obtain K result point group (K is greater than or equal to 1); calculating and comparing a distance value from the position of the current characteristic data of the user to the position of a seed point of each result point group to obtain a minimum distance value; judging whether the minimum distance value is greater than a standard value corresponding to the risk level where the user currently is, wherein different risk levels correspond to different standard values; if so, increasing the risk level where the user currently is by one preset level. The clustering algorithm based financial terminal security protection method can improve the security performance of the financial terminal and can provide a safer, more diversified and more friendly operating experience for the user.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a financial terminal security protection method and system based on a clustering algorithm. Background technique [0002] In traditional financial terminal systems, the login system mainly relies on user names and passwords for user authentication. However, once the user name and password method leaks the user account and password network or other reasons, the thief will be able to easily bypass the system verification. Although the real identity of the user can be further determined by using the USB-shield / mobile phone SMS verification code, etc., this is still an upgraded version of the password method, and there are also cases of changing the mobile phone SIM card by stealing the USB-shield / pseudo base station / mobile business hall, etc. means to deceive the user or the system. More importantly, multiple cumbersome password verifications will greatly reduce user experienc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06K9/62G06F17/30
CPCH04L63/0838H04L63/105H04L63/18H04L63/205G06F16/285G06F16/35G06F18/23213
Inventor 陈强傅聪张腾创黄进英
Owner GUANGDONG YOUMAI INFORMATION COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products