Method and device for judging login abnormality of account

An abnormal login and abnormal technology, applied in the computer field, can solve problems such as poor user experience and inability to confirm users, and achieve the effect of avoiding losses and improving user experience.

Active Publication Date: 2017-12-12
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this solution can avoid the loss of users to a certain extent, it is impossible to confirm whether this login behavior is a phishing login
At the same time, in this solution, as long as the user logs in at an unused login location or an unused login device, the user needs to re-authenticate, but in many cases it is the normal login of the user himself, which brings a poor user experience to the user , requires the user to operate multiple times

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for judging login abnormality of account
  • Method and device for judging login abnormality of account
  • Method and device for judging login abnormality of account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a flow chart of the method for judging account abnormality provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where the account is illegally logged in after being obtained by a phishing website. The method can be executed by the server, and specifically includes:

[0022] S101. Obtain the login association data of the currently logged-in user;

[0023] Wherein, the currently logged-in user is a user who is logging in with an account or has already logged in and is using an account. After the user logs in with the account, the obtained login-associated data of the currently logged-in user may be the login IP, login region, and login device ID at the time of current login. The login region can be automatically converted by the server from the login IP for subsequent comparison and analysis.

[0024] Here, the abnormal login device identifier may be an identification number capable of identifying a mobile term...

Embodiment 2

[0041] image 3 It is a flow chart of the method for judging account abnormality provided by Embodiment 2 of the present invention. This embodiment is an improved embodiment of the first embodiment. and figure 1 Compared with, in addition to adding S204 to S206 between S102 and S103, and modifying S103 to S103', the rest of the steps are the same as figure 1 same. Here, only S204 to S206 and S103' are described, and other steps are not repeated. After the abnormal login score of the currently logged-in user is determined in step S102, in S204, it is determined whether there is historical login verification information related to the user. Here, the historical login verification information may include login device identification information and login IP information. The historical login verification information may be all historical login verification information, or historical login verification information within a predetermined time period, such as historical login ver...

Embodiment 3

[0045] Figure 4 Shown is the flow chart of the method for judging account abnormalities provided by Embodiment 3 of the present invention. On the basis of Embodiment 1, this embodiment further adds operations to prevent repeated login processing within a certain period of time, specifically including:

[0046] S301. Obtain login association data of a currently logged-in user.

[0047] S302. Based on the login association data of the current login user and the login anomaly database, determine the login anomaly score of the current login user.

[0048] S303, based on the determined abnormal login score, determine whether the account login of the currently logged-in user is abnormal, if yes, perform S304, and if not, perform S306.

[0049] S304. When it is determined that the account login of the currently logged-in user is abnormal, determine whether corresponding processing has been performed within a predetermined time period. If no corresponding processing has been perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and device for judging the login abnormality of an account, and the method comprises the steps: obtaining the login correlation data of a current login user; determining the login abnormality score of the current login user based on the login correlation data of the current login user and a login abnormality database, wherein the login abnormality database comprises login abnormality data and the corresponding login abnormality score; judging whether the login of the account of the current login user is abnormal or not according to the determined login abnormality score. According to the scheme of the invention, the method achieves the automatic judgment whether the current login of the account is phishing login or not, effectively avoids the loss caused by the phishing login to a user, and improves the user experience.

Description

technical field [0001] Embodiments of the present invention relate to computer technology, and in particular to a method and device for judging abnormal account login. Background technique [0002] In network applications, the server needs to verify the user name, password and other related information entered by the user, and the corresponding authority can only be granted after the identity of the user is verified and confirmed. At present, there are more and more phishing websites. These phishing websites obtain relevant information such as user names and passwords of users through illegal means to log in, and then steal users' virtual assets, causing a lot of losses to users. [0003] In the prior art, in order to avoid losses caused to the user by account hijacking, usually when the server determines that the user logs in at an unused login location or an unused login device, it sends relevant verification information for further confirmation by the user. For example: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1483
Inventor 陈冉安子岩陆睿乔恩奇廉晓洋高松孟杰
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products