A verification method for e-commerce account based on cloud security

An e-commerce and verification method technology, applied in the Internet field, can solve problems such as occupying website server resources, slowing down website response speed, and user account theft, etc., to improve security, ensure legal validity, and prevent login attacks. Effect

Active Publication Date: 2021-10-26
上海行蕴信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most e-commerce accounts will adopt identity authentication to prevent account theft; some current authentication methods include account number and password authentication, address authentication and question authentication, etc., but the authentication data of these authentication methods is that the user registers the account It is pre-set and fixed. Once the authentication data is leaked, the user's account will face the risk of being stolen
[0003] Moreover, the login of the website is a crucial step in the safe operation of the website. One of the methods commonly used by criminals to attack the website is login attack. The criminals send invalid login information to the website server through repeated failed logins, causing the website to The server constantly checks the invalid login information of the website, which takes up a lot of resources of the website server, slows down the response speed of the website, and even causes the website to crash in severe cases.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method for e-commerce account based on cloud security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Such as figure 1 As shown, a method for verifying an e-commerce account based on cloud security includes the following steps:

[0052] Step 1: Generate an e-commerce account network access white list; according to the specific environment of the e-commerce account login, set the network IP that is allowed to access the e-commerce account and its access rights, and generate a unique network access white list for the e-commerce account. list;

[0053] Step 2: Obtain the network access malicious IP group library of e-commerce accounts; analyze the time, space characteristics and maliciousness of the existing network access IPs of e-commerce accounts, and finally generate the malicious IP group library;

[0054] Step 3: The server receives the request to enter the e-commerce account sent by the mobile terminal, and at the same time, the server intercepts and whitelists the IP that applies to access the e-commerce account; the specific steps are as follows:

[0055] S31: W...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for verifying e-commerce accounts based on cloud security, which includes: generating a white list of e-commerce account network access; acquiring a malicious IP group library for e-commerce account network access; and receiving a request sent by a mobile terminal to enter an e-commerce account by a server At the same time, the server intercepts and whitelists the IPs that apply for access to the e-commerce account; the server provides the login interface of the e-commerce account to the mobile terminal according to the request, and the server queries whether the user has failed login history data in the server cache; collects user The facial image and the corresponding sign parameter information, compare the collected sign parameter information with the corresponding predetermined sign parameter range, and determine whether the collected facial image is valid according to the comparison result, and if it is valid, the facial image The information is matched with the corresponding standard user face image in the cloud storage for verification, and if the verification is successful, the e-commerce account is successfully logged in.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for verifying e-commerce accounts based on cloud security. Background technique [0002] There are usually some funds in the e-commerce account, therefore, the e-commerce account involves financial security. How to determine the security of accounts in the virtual environment of the Internet is a key issue. Most e-commerce accounts will adopt identity authentication to prevent account theft; some current authentication methods include account number and password authentication, address authentication and question authentication, etc., but the authentication data of these authentication methods are all registered by the user. It is pre-set and fixed. Once the authentication data is leaked, the user's account will face the risk of being stolen. [0003] Moreover, the login of the website is a crucial step in the safe operation of the website. One of the methods comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q20/40
CPCG06Q20/40145H04L63/0236H04L63/083H04L63/0861H04L63/0876H04L63/102H04L63/1441
Inventor 王明泽毕明曼杨萌
Owner 上海行蕴信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products