A security detection method and system for remote login risk control

A technology of security detection and risk control, applied in the field of network security, can solve problems such as being easily logged in by others, email security issues, and inability to judge, so as to reduce the risk of theft and improve the user experience

Active Publication Date: 2021-02-19
陕西绝顶人峰网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are certain security issues in e-mail, especially the problem of secure login. When the user name and password are stolen, it is easy to be logged in by others, and personal information cannot be guaranteed.
The existing verification methods cannot judge whether the operation is performed by the user himself or not based on the user's operating habits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security detection method and system for remote login risk control
  • A security detection method and system for remote login risk control
  • A security detection method and system for remote login risk control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] refer to Figure 1-8 .

[0067] A safety detection method for remote login risk control, comprising:

[0068] Obtain the login location of the current user, and verify whether the current login location is the user's usual login location. The login location includes the user's login IP address. If the user's current login IP address is inconsistent with the usual address, it is a remote login. As an implementation, the current location of the device can be verified, and if the current location is inconsistent with the usual login location, it is a remote login.

[0069] If it is not the user's usual login location, it is detected whether the user's login device is a commonly used device. Commonly used equipment detection is the identification code of the detection equipment, and the equipment has a unique identification code.

[0070] If it is not the user's frequently used device, obtain the current location of the user's frequently used device. If there is no use...

Embodiment 2

[0099] A safety detection method and system for remote login risk control, comprising:

[0100] The login location obtaining module is configured to obtain the user's login location.

[0101] The device detection module is used to detect whether the currently logged-in device is a common device.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety detection method and system for remote login risk control. The method comprises the following steps of acquiring a login site of a current user, and verifying whetherthe current login site is a common login site of the user or not; if the current login site is not the common login site of the user, detecting whether user login equipment is the common equipment ornot; if the user login equipment is not the common equipment, acquiring the current position of the common equipment of the user; if the common equipment of the user does not exist in the preset range of the current equipment, judging that a dangerous login behavior exists at present; if the current user inputs login information, detecting whether the current user inputs a remote login special character or not; if the current user does not enter the remote login special character, judging that the dangerous login behavior exists at present; if the preset number of dangerous login behaviors exist in the single login, judging that the login is the abnormal login, recording the login behavior and exiting the login.

Description

technical field [0001] The present invention relates to network security, in particular to a security detection method and system for remote login risk control. Background technique [0002] E-mail is one of the most widely used services on the Internet. Through the e-mail system of the network, users can quickly contact with network users in any corner of the world. The content of the e-mail can be text, image, sound and so on. [0003] With the development of Internet technology, the ways of sending and receiving e-mails have become more and more abundant. For example, a user can send and receive emails through a general-purpose browser (for example, Google's Chrome), using the HTTP protocol, where the client is a Web browser; the user can also install a mailbox on a PC (Personal Computer, personal computer) The client software uses the installed mailbox client to send and receive emails; and with the development of mobile Internet technology, there are also mailbox cli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/107
Inventor 徐建红
Owner 陕西绝顶人峰网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products