Login authentication method and system, computer storage medium and computer device

A technology of login verification and computer program, applied in the fields of computer storage medium and equipment, login verification method and system, can solve problems such as poor effect, and achieve the effect of improving accuracy and improving effect

Active Publication Date: 2018-04-13
E-SURFING DIGITAL LIFE TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a login verification method and system, computer storage medium and equipment for the technical problem of poor effect of the traditional login verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method and system, computer storage medium and computer device
  • Login authentication method and system, computer storage medium and computer device
  • Login authentication method and system, computer storage medium and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solution of the present invention will be described in detail below in combination with specific embodiments and accompanying drawings, so as to make it more clear.

[0047] Such as figure 1 As shown, the present invention provides a login verification method, which may include the following steps:

[0048] S101: Determine the IP segment to which the IP address belongs according to the current IP address of the login account;

[0049] S102: Obtain abnormal IP addresses in the IP segment, and calculate the ratio of the total number of abnormal IP addresses in the IP segment;

[0050] S103: If the ratio is higher than a first ratio threshold, perform security verification on the login account.

[0051] Wherein, the IP segment is defined as a set of a series of target IP addresses with the same attribution and operator, and the IP addresses in the set may be consecutive IP addresses. Therefore, according to the current IP address, the attribution and opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a login authentication method and system, a computer storage medium and a computer device. The method comprises the steps of: determining an IP section where an IP address belongs to according to the current IP address of a login account, obtaining abnormal IP addresses in the IP section, calculating a proportion of the total amount of the abnormal IP addresses inthe IP section, and when the proportion is higher than a first proportion threshold, performing safety authentication of the login account; and analyzing an abnormal condition of the IP section wherethe current login IP address of the login account belongs to, namely determining whether the proportion of the abnormal IP addresses in the IP section is too high or not, if yes, determining that thecurrent login IP address of the login account is located in the IP section having a high risk, and performing safety authentication of the login account. Therefore, the safety and the stability of thelogin account and the login IP address thereof are improved, and an authentication effect of login authentication is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a login verification method and system, a computer storage medium and equipment. Background technique [0002] In the field of network security technology, the problem of account attack has always existed, and various confidential information in the account are facing the problem of leakage due to account security attack, so it is necessary to improve the security of the account. [0003] The traditional method to deal with attacks on account security is to perform anomaly detection when the account is logged in, that is, to obtain the login information when the account is logged in and analyze the login information, so as to determine whether the account has login exceptions based on the login information. , and perform security verification on accounts with abnormal logins, thereby improving account security. [0004] However, the traditional login verification method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 肖锋彭剑龙张颖潘浩高保庆蔡俊华余毅斌
Owner E-SURFING DIGITAL LIFE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products