Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method based on user behavior authentication, and storage medium

A behavior and user technology, applied in the field of data processing, can solve problems such as poor user experience, waste of time, wrong passwords, etc., and achieve the effects of simplifying authentication steps, reminding risk information, and reducing frequency of use

Inactive Publication Date: 2018-12-07
CHINA CONSTRUCTION BANK
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen from this that traditional security authentication methods require user intervention during the security authentication process, and user intervention means that password errors may occur, resulting in waste of time, inconvenient transaction processes, and poor user experience.
[0009] 4) In order to ensure the timeliness and certification strength of security certification methods, financial institutions need to spend a lot of energy and financial resources on issuing or replacing security certification hardware, resulting in a large expenditure on operating costs
[0010] 5) Once the security authentication method is breached, financial institutions generally further improve it by urgently replacing the security authentication method, temporarily notifying users of relevant risk information, or using composite security authentication methods, etc. big impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method based on user behavior authentication, and storage medium
  • System and method based on user behavior authentication, and storage medium
  • System and method based on user behavior authentication, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0040] figure 1 It is a schematic structural diagram of a system 1 based on user behavior authentication according to an embodiment of the present invention. See figure 1 , The system 1 includes:

[0041] The behavior file module 100 is used to store a discrete set of data of user equipment information, geographic location information commonly used in transactions, and user transaction habits and behavior information;

[0042] The behavior data collection module 200 is used to collect and monitor user behavior data in real time through a web page plug-in or an application client;

[0043] The behavior authentication arbitration module 300 is configured to arbitrate the data factors provided by the behavior archive module and the behavior data colle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method based on user behavior authentication, and a storage medium. The system comprises a behavior file module, a behavior data acquisition module, a behavior authentication arbitration module and a behavior authentication module, wherein the behavior file module is used for storing the data discrete set of user common device information, transaction common geographical location information, and user transaction habit behavior information; the behavior data acquisition module is used for collecting and monitoring user behavior data in real time through webpage plug-ins or an application program client; the behavior authentication arbitration module is used to carry out arbitration processing on data factors provided by the behavior file module and the behavior data acquisition module so as to obtain an authentication factor; and the behavior authentication module is used to match the current behavior data of the user with the authentication factor, and if matching is successful, the authentication is passed. In the invention, the matching result of the current behavior data of the user and a user behavior file is taken as the basis of a usersafety certification management and control strategy, and the authentication mode of a dynamic distribution strategy and a full-order comparison method is adopted to realize authentication processingbased on a user behavior.

Description

Technical field [0001] The present invention relates to the field of data processing, in particular to a system and method based on user behavior authentication, and a storage medium. Background technique [0002] Online finance is an integral part of the contemporary financial industry. Through online financial transactions, it can effectively reduce transaction costs, provide users with better financial services, and at the same time create broader business development space for financial institutions and enhance the competitiveness of financial institutions. [0003] But at the same time, with the rapid development of network technology, there are many security risks in the processing of online financial services, such as Trojan horse attacks, man-in-the-middle attacks, phishing attacks, and malicious code attacks. [0004] In order to cope with the various risks in online banking, various methods are generally adopted in China to ensure the security of online financial clients, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02G06Q40/04G06Q20/38
CPCG06Q20/382G06Q40/04G06Q40/03
Inventor 陈建孝何毅勇吴定健余挈郑杰烈李佐群周岚赵龙海陈少静
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products