Login authentication method and device

A technology for login authentication and login location, applied in the computer field

Inactive Publication Date: 2020-03-17
BANK OF CHINA
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a login authentication method and device to solve the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login authentication method and device
  • Login authentication method and device
  • Login authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The traditional login authentication method always uses the login authentication method selected by the user for login authentication. However, in different scenarios, the potential risks brought by different login methods are different. For example, when the user is sleeping at night, the fingerprint login method has Great potential risk. For another example, in the case of the user's mobile phone being lost, there is a great potential risk in the SMS verification code login method. In order to solve this technical problem, the present invention provides a login authentication method, which obtains the login feature information corresponding to the current login behavior and historical login behavior of the user; analyzes the obtained login feature information to determine the login scenario security level corresponding to the current login behavior . Then determine the login authentication method that matches the security level of the login scenario corresponding to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a login authentication method and device. According to the scheme, the login scene security level is judged by analyzing the login feature information corresponding to the loginbehavior of the user; and finally, the login authentication mode corresponding to the login scene security level of the current login behavior is determined, that is, different login authentication modes are adopted for different login scene security levels, so that the security of the login authentication mode dynamically changing according to the login scene security level is higher. The loginscene security level is determined according to the login characteristic information of the current login behavior and the historical login behavior of the user; and the login scene security level determined in this way better conforms to the actual use condition of the user, so that the determined login scene security level is more accurate, and then the login authentication mode determined according to the login scene security level is safer.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a login authentication method and device. Background technique [0002] With the widespread application of intelligent terminals (eg, smart phones, PDAs, etc.), more and more application programs are developed based on the intelligent terminals. Applications that require high login security generally require the user to perform login authentication before they can be used, for example, applications involving the user's personal property (such as mobile banking). [0003] Moreover, such applications usually have many different types of login authentication methods, such as password login, SMS verification code login, fingerprint authentication login, face recognition login, etc., and users can choose any one of them according to their usage habits. Login authentication. Afterwards, this login authentication method will be used to authenticate the user's login behav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31
CPCG06F21/316
Inventor 张静
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products