Authentication risk detection method and system

A technology of risk detection and authentication, which is applied in the computer field to achieve the effect of improving the technical effect

Active Publication Date: 2021-03-09
北京安泰伟奥信息技术有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current authentication method always has the security threat of attackers forging or stealing the user's identity credentials to log in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication risk detection method and system
  • Authentication risk detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions in the embodiments of the present invention are clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0021] Such as figure 1 As shown, the present application provides an authentication risk detection system, including: at least one login device and a server.

[0022] Wherein, at least one login device 110 is: used to send a login request; receive an authentication data acquisition instruction, and send the authentication data to the server.

[0023] Server 120: for performing the following steps:

[0024] Receive a login request, where the login request include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication risk detection method and system, and the system comprises at least one piece of login equipment and a server. The at least one piece of login equipment is used for sending a login request, acquiring and receiving an authentication data acquisition instruction and sending authentication data to the server; the server is used for executing the following steps that a login request is received, and the login request at least comprises account information and equipment information; determining an authentication mode according to the login request; obtaining authentication data according to the authentication mode, and processing the authentication data to obtain an authentication result; and generating a login result according to the authentication result, and storing the login result as a historical login result. The invention has the technical effects that the authentication risk is dynamically identified, and further management and control measures are realized according to the authentication risk, so that the authentication security is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an authentication risk detection method and system thereof. Background technique [0002] Generally, users need to provide identity credentials to the identity authentication system to prove their identity before using network applications, so the security of identity authentication is the basis of network application security. In order to ensure the security of identity authentication, various authentication methods are provided in different identity authentication systems, such as: user name / password, digital certificate, biometric feature and dynamic password, etc. [0003] However, the current authentication method always has the security threat of an attacker forging or stealing the user's identity credentials to log in. Contents of the invention [0004] The purpose of this application is to provide an authentication risk detection method and its system, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/36G06F21/46G06F21/64G06Q10/06
CPCG06F21/32G06F21/36G06F21/46G06F21/64G06Q10/0635
Inventor 刘铜强
Owner 北京安泰伟奥信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products