User identity continuous authentication method and system based on behavior map

A technology of user identity and behavior, applied in the field of identity authentication, can solve problems such as user identity authentication

Pending Publication Date: 2021-04-16
北京市首都公路发展集团有限公司 +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a user identity continuous authentication method and system based

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity continuous authentication method and system based on behavior map
  • User identity continuous authentication method and system based on behavior map
  • User identity continuous authentication method and system based on behavior map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0048] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity continuous authentication method and system based on a behavior map, and the method comprises the steps: carrying out the depiction of a historical access habit of a user to form a user access behavior map, and obtaining an abnormal behavior of the user deviating from the historical access habit through the comparison of a current access behavior and a historical access behavior; adopting an abnormal behavior detection mode based on behaviors, abnormal behaviors can be detected without setting a strategy in advance, and the characteristics and habits of the user individuals are fully considered; generating a user access time sequence map based on the access time interval of the source IP to each URL corresponding module of the destination site, obtaining an abnormal behavior that the user deviates from a historical access habit through comparison between the current access time interval and a historical access time interval, triggering identity verification failure, and performing access abnormality alarm; due to the fact that the user behavior atlas is dynamically changed, the longer the time is, the more accurate the depiction of the user behaviors is, and the accuracy of identity authentication can be guaranteed through the method.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, and more specifically, to a method and system for continuous authentication of user identity based on a behavior graph. Background technique [0002] User identity authentication refers to the process of confirming the identity of the operator in the computer and computer network system, and is a basic security mechanism. Traditional user identity authentication is generally user name and password authentication, and the latest research results support user authentication through biometric features such as fingerprints, facial recognition, and iris. These authentications all belong to instantaneous "snapshot" authentication. The so-called "snapshot" authentication refers to verifying whether the user's identity is legal through a user input (including biometric input) at a point in time. However, under certain conditions, these authentication methods based on fixed passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/45G06F16/955H04L29/08
Inventor 徐飞徐志斌高军安柳辉李志刚苑丽娜
Owner 北京市首都公路发展集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products