Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A cloud security account management method and cloud security platform based on big data

A security account management and big data technology, which is applied in the field of cloud security account management and cloud security platform based on big data, can solve the problems of inaccurate and efficient detection, and cannot guarantee the security of user assets, so as to improve detection accuracy, The effect of enriching detection dimensions

Active Publication Date: 2021-12-14
深圳亚桐荟科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing technology, when there is a transaction behavior that needs to be paid attention to in the user's transaction account, such as a large transaction operation, the corresponding platform will often use the method of sending a verification code to the user terminal to achieve security verification, and realize the pass according to the security verification result. Or reject the current transaction behavior. This relatively traditional account transaction behavior management method is relatively more dependent on the user terminal. It is an account management method for the user terminal, and this method is no longer applicable in the increasingly complex financial environment. Once the user terminal is lost, stolen, or installed with malicious software, the transaction behavior generated by the user's transaction account cannot guarantee the safety of the user's assets, which makes the detection of abnormal transaction behavior of the user account inaccurate and efficient. As an emerging data processing method with high credibility, big data has not been used in account security management scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud security account management method and cloud security platform based on big data
  • A cloud security account management method and cloud security platform based on big data
  • A cloud security account management method and cloud security platform based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the specific implementation manners of the present invention will be described in detail below in conjunction with the drawings in the embodiments of the present invention.

[0022] figure 1 It is an interactive schematic diagram of a cloud security account management system based on big data provided by an embodiment of the present disclosure. The cloud security account management system based on big data may include a computer device 100 , a block chain 300 and a user terminal 200 connected in communication with the computer device 100 . figure 1 The shown cloud security account management system based on big data is only a feasible example, and in other feasible embodiments, the cloud security account management system based on big data may also only include figure 1 Some of the components shown may also include other components.

[0023] In this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud security account management method and a cloud security platform based on big data, and relates to the technical field of cloud security. The cloud security account management method based on big data includes: obtaining the transaction behavior of the transaction account to be monitored and obtaining the corresponding target transaction operation, generating a corresponding target transaction behavior vector set according to the target transaction operation; comparing the target transaction behavior vector and the comparative transaction behavior vector The security transaction parameters are obtained by matching, and the target security transaction result corresponding to the transaction behavior of the transaction account to be monitored is calculated; the security status of the transaction behavior of the transaction account to be monitored is determined based on the reference security transaction result and the target security transaction result. Compared with the existing technology that only monitors the user's transaction behavior in the form of a simple verification code, the above steps improve the detection accuracy and detection efficiency of the transaction behavior of the abnormal transaction account, and realize more secure monitoring of the user's cloud security account. management.

Description

technical field [0001] The present invention relates to the technical field of cloud security, in particular to a big data-based cloud security account management method and a cloud security platform. Background technique [0002] Whether it is traditional financial transactions (stocks, funds, etc.), or digital currency transactions that are getting more and more attention, all kinds of transaction operations involve the security of users' property. However, in the existing technology, when there is a transaction behavior that needs to be paid attention to in the user's transaction account, such as a large transaction operation, the corresponding platform will often use the method of sending a verification code to the user terminal to achieve security verification, and realize the pass according to the security verification result. Or reject the current transaction behavior. This relatively traditional account transaction behavior management method is relatively more depend...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q40/04G06K9/62
CPCG06Q20/382G06Q40/04G06F18/23G06F18/22G06F18/24323
Inventor 邹威
Owner 深圳亚桐荟科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products