Search

CN-115664817-B - Data processing system for acquiring abnormal login information of user

CN115664817BCN 115664817 BCN115664817 BCN 115664817BCN-115664817-B

Abstract

The invention provides a data processing system for acquiring abnormal login information of a user, which is characterized in that login request information and a key user login request information set are packaged and sent to a server corresponding to an actual IP address corresponding to a virtual IP address requested to be accessed in a login request, so that the problem that one of the servers corresponding to the actual IP address corresponding to the virtual IP address requested to be accessed fails, so that data cannot be stored and data cannot be called is solved, when the user request information is required to be stored or called, all relevant data corresponding to the login request information can be stored or called through the key user login request information set, and when one of the servers corresponding to the actual IP address corresponding to the virtual IP address requested to be accessed in the login request fails or is regularly maintained, all request information data can be stored or called by other servers, thereby meeting the user requirements.

Inventors

  • HE BENBIAO
  • Shan Mengyao
  • MIAO WEIJIE

Assignees

  • 杭州中电安科现代科技有限公司

Dates

Publication Date
20260508
Application Date
20221026

Claims (7)

  1. 1. A data processing system for acquiring abnormal login information of a user is characterized by comprising an initial user information list A= { A 1 ,A 2 ,…,A i ,…,A m }, a processor and a memory for storing a computer program, wherein the ith initial user information A i =(ZA i ,PA i0 ,PA i1 ,PA i2 ,…,PA ic ,…,PA iv(i) ,XA i ),ZA i is an ith initial user name, PA i0 is a virtual IP address accessed by the ith initial user, PA ic is a c-th actual IP address corresponding to PA i0 accessed by the ith initial user, XA i is a protocol ID used for accessing the virtual IP address and the actual IP address, i has a value of 1 to m, m is the number of initial user information, c has a value of 1 to v (i), v (i) is the number of actual IP addresses corresponding to the virtual IP address accessed by the ith initial user, and when the computer program is executed by the processor, the following steps are realized: S10, based on A, acquiring a target user information list P= { P 1 ,P 2 ,…,P i ,…,P m }, i target user information P i =(ZP i ,EP i ,FP i1 ,FP i2 ,…,FP ic ,…,FP iv(i) ), wherein i target user identification ZP i is an i initial user name, EP i is a first target information character string corresponding to ZP i , FP ic is a c second target information character string corresponding to ZP i , the first target information EP i is a character string generated by encrypting ZA i 、PA i0 and XA i , and the second target information FP ic is a character string generated by encrypting ZA i 、PA ic and XA i ; S20, when a login request is detected to be sent by any target user, acquiring a key user login request information set R= (ZR, ER, FR 1 ,FR 2 ,…,FR c ,…,FR v(i) ), wherein a key user identifier ZR is a target user identifier for sending the login request, ER is a first key information character string corresponding to ZR, FR c is a c second key information character string corresponding to ZR, the first key information character string ER is a character string generated by carrying out encryption processing on the key user identifier ZR, a virtual IP address requested to be accessed in the login request and a protocol ID used when the virtual IP address is accessed in the login request, and the second key information character string FR c is a character string generated by carrying out encryption processing on a c actual IP address corresponding to the virtual IP address requested to be accessed in the key user identifier ZR and the login request and a protocol ID used when the c actual IP address is accessed in the login request, wherein the encryption processing in the step S20 is the same as the encryption processing in the step S10; S30, according to R traversal P, obtaining end user information P 0 , wherein the end user information P 0 is target user information corresponding to a target user identification identical to a key user identification for sending a login request; S40, carrying out similarity calculation on the P 0 and the R to obtain similarity Z, and when Z is more than or equal to Z 0 , responding to a login request sent by a key user and sending login success prompt information to a server of the key user, wherein Z 0 is a preset key information character string similarity threshold.
  2. 2. The system of claim 1, wherein in S40, Z 0 = 1.
  3. 3. The system of claim 1, further comprising the step of, after S40: S50, when Z is smaller than Z 0 , not receiving a login request sent by a key user and sending login failure prompt information to a server of the key user; S60, respectively sending the login request sent by the key user and the R to a server corresponding to an actual IP address corresponding to the virtual IP address in the login request sent by the key user, and respectively storing the request information corresponding to the login request sent by the key user to a server corresponding to the actual IP address corresponding to the virtual IP address in the login request sent by the key user.
  4. 4. The system of claim 1, wherein when the initial user passes directly through the actual IP address without passing through the virtual IP address, the following steps are performed: S100, based on A, acquiring arranged initial user information CA={CA 11 ,CA 12 ,…,CA 1v(1) ,…,CA i1 ,CA i2 ,…,CA iw ,…,CA iv(i) ,CA m1 ,CA m2 ,…,CA mv(m) },, wherein arranged initial user information CA iw =(ZA iw ,PA iw ,XA iw ),ZA iw of an ith initial user is a user name corresponding to the ith initial user, PA iw is a w actual IP address accessed by the ith initial user, XA iw is a protocol ID used for accessing PA iw , and x is more than or equal to 1 and less than or equal to v (i); S200, based on CA, acquiring first user information CB iw =(ZB iw ,FB iw of the ith initial user of the first user information list CB={CB 11 ,CB 12 ,…,CB 1v(1) ,…,CB i1 ,CB i2 ,…,CB iw ,…,CB iv(i) ,CB m1 ,CB m2 ,…,CB mv(m) },, wherein the first user identifier ZB iw is a user name corresponding to the ith initial user, and FB iw corresponding to ZB iw is a first information character string generated by encrypting CA iw ; S300, when any first user sends a login request, acquiring a second user information set C= (ZC, FC), wherein the second user identification ZC is a first user identification for sending the login request, FC is a second information character string corresponding to the ZC, and the second information character string is a character string generated after encryption processing is carried out on the second user identification, an IP address accessed in the login request and a protocol ID used when the IP address is accessed in the login request, wherein the encryption processing in the step is the same as the encryption processing in the step S100; S400, traversing the CB according to the ZC to obtain third user information B 0 , wherein the third user information B 0 is first user information corresponding to a first user identification which is the same as a second user identification for sending a login request; S500, similarity calculation is carried out on the B 0 and the C to obtain similarity EZ, when EZ is more than or equal to D 0 , a login request sent by a target user is responded, login success prompt information is sent to a server of the target user, and D 0 is a preset second information character string similarity threshold value.
  5. 5. The system of claim 4, wherein the first information string is obtained by: S110, according to CA, a fourth user information list K={K 11 ,K 12 ,…,K 1v(1) ,…,K i1 ,K i2 ,…,K iw ,…,K iv(i) ,K m1 ,K m2 ,…,K mv(m) }, is obtained, wherein the fourth user information K iw =(ZK iw ,FK iw ,PK iw ) is obtained, a fourth user identifier ZK iw is a user name corresponding to an ith initial user, FK iw is a fourth information character string obtained by processing CA iw by adopting a first encryption algorithm, PK iw is a w actual IP address of a ZK iw access server, and the w actual IP address is the same as PA iw ; S120, based on K, acquiring a random value list E={E 11 ,E 12 ,…,E 1v(1) ,…,E i1 ,E i2 ,…,E iw ,…,E iv(i) ,E m1 ,E m2 ,…,E mv(m) },E iw as a random value of a character string in FK iw , and acquiring according to PK iw ; S130, based on K and E, obtaining FB iw , wherein FB iw is composed of FK iw and E iw .
  6. 6. The system of claim 5, wherein E iw is obtained by: S121, based on PK iw , acquiring an IP address data list F iw ={F iw1 ,F iw2 ,…,F iwj ,…,F iwn , wherein F iwj is the j-th bit data in PK iw , the value of j is 1 to n, and n is the total number of data in PK iw ; s123, based on F iwj , acquiring E iw , wherein E iw meets the following conditions: N 0 is a preset random value threshold, Representing a rounding down.
  7. 7. The system of claim 4, wherein in S500, D 0 =1.

Description

Data processing system for acquiring abnormal login information of user Technical Field The invention relates to the technical field of abnormal login information verification, in particular to a data processing system for acquiring abnormal login information of a user. Background At present, most methods for detecting abnormal login of a user judge through a mode that a user name corresponds to a user name password, and a time interval for modifying the user name password is not specified for the user, so that the security of a system is not high, the user end password is easy to be stolen by other people to log in the system, a user end login server comprises two or more servers, when a user sends a login request, the user can only access one server and only the accessed server stores user login record information, the user information stored in the accessible server corresponding to the user end is asynchronous, and the user information is required to be processed incompletely, so that a user information checking system is required to be capable of improving the security of the system and solving the information storage and extraction of two or more servers corresponding to the user end. Disclosure of Invention Aiming at the technical problems, the invention adopts the following technical scheme: A data processing system for acquiring abnormal login information of a user comprises an initial user information list A= { A 1,A2,…,Ai,…,Am }, a processor and a memory for storing a computer program, wherein the ith initial user information Ai=(ZAi,PAi0,PAi1,PAi2,…,PAic,…,PAiv(i),XAi),ZAi is the ith initial user name, PA i0 is a virtual IP address accessed by the ith initial user, PA ic is the c-th actual IP address corresponding to PA i0 accessed by the ith initial user, XA i is a protocol ID used for accessing the virtual IP address and the actual IP address, i is 1 to m, m is the number of initial user information, c is 1 to v (i), v (i) is the number of actual IP addresses corresponding to the virtual IP address accessed by the ith initial user, and when the computer program is executed by the processor, the following steps are realized: s10, based on A, a target user information list P= { P 1,P2,…,Pi,…,Pm }, i target user information P i=(ZPi,EPi,FPi1,FPi2,…,FPic,…,FPiv(i)) is obtained, i target user identification ZP i is i initial user name, EP i is a first target information character string corresponding to ZP i, FP ic is a c second target information character string corresponding to ZP i, the first target information EP i is a character string generated by encrypting ZA i、PAi0 and XA i, and the second target information FP ic is a character string generated by encrypting ZA i、PAic and XA i. S20, when a login request is detected to be sent by any target user, a key user login request information set R= (ZR, ER, FR 1,FR2,…,FRc,…,FRv(i)) is obtained, wherein the key user identifier ZR is a target user identifier for sending the login request, ER is a first key information character string corresponding to the ZR, FR c is a c second key information character string corresponding to the ZR, the first key information character string ER is a character string generated by carrying out encryption processing on the key user identifier ZR, a virtual IP address requested to be accessed in the login request and a protocol ID used when the virtual IP address is accessed in the login request, and the second key information character string FR c is a character string generated by carrying out encryption processing on the key user identifier ZR, a c actual IP address corresponding to the virtual IP address requested to be accessed in the login request and a protocol ID used when the c actual IP address is accessed in the login request, wherein the encryption processing in the step is the same as the encryption processing in the step S10. S30, according to R traversal P, end user information P 0 is obtained, and end user information P 0 is target user information corresponding to a target user identification identical to the key user identification sending the login request. S40, carrying out similarity calculation on the P 0 and the R to obtain similarity Z, and when Z is more than or equal to Z 0, responding to a login request sent by a key user and sending login success prompt information to a server of the key user, wherein Z 0 is a preset key information character string similarity threshold. The invention has at least the following beneficial effects: (1) By acquiring the first information character string set, when any first user sends a login request, acquiring a second user information set, so as to acquire a third user information set corresponding to a third user identification identical to the second user identification, then acquiring the similarity between the second user information set and the third user information set, and when the similarity between the second user information set and the third use