Attack protection method and system

A protection system and statistical table technology, applied in the transmission system, electrical components, etc., can solve the problem that the number of top posts cannot be limited, and achieve the effect of improving experience and improving operation response

Inactive Publication Date: 2012-07-11
王正伟
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Restricting the frequency of upvoting posts with a time interval of 45 seconds can indeed play a certain role in restricting, but this method cannot limit the number of upvoting posts by a netizen within a certain period of time, for example, limiting a netizen within an hour Only up to 10 posts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack protection method and system
  • Attack protection method and system
  • Attack protection method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0058] Such as figure 1 Shown is the flow chart of the first embodiment of the present invention, in this embodiment:

[0059] Firstly, in step 101, a rejection threshold is set, and an operation count table is set to record the operator's operation count.

[0060] Here, the rejection threshold can be set separately according to different operators; or only one common rejection threshold can be set for all operators. To simplify the description, in this embodiment, the rejection threshold is set for all operators.

[0061] Here, the operation times statistics table includes an operator field and an operation times field, as shown in Table 1.

[0062] According to different applications, the setting method of the number of operations statistics table may be different. For example, for the prevention and control of the problem of top posting irrigation in the website community, the setting operation count table can add a statistical field in the netizen registration data tabl...

no. 1 example

[0080] Such as Figure 1A Shown is the flowchart of the first embodiment of the first embodiment of the present invention, in this embodiment:

[0081] Firstly, in step 1101, a rejection threshold is set, and a statistical table of calling operation times is set, as shown in Table 2.

[0082] Step 1102, receiving a voice call, and obtaining a calling number.

[0083] Step 1103, according to the calling number and the calling number statistics table, judge whether the number of operations corresponding to the calling party reaches the set rejection threshold, if yes, end the process; otherwise, execute step 1104.

[0084] Here, according to the calling number, the corresponding record is searched from the statistics table of the number of calling operations. If found, the number of operations corresponding to the calling can be obtained; if not found, the corresponding operation of the calling The number of times is 0, that is, no queue number has been applied for.

[0085] ...

no. 2 example

[0093] Such as Figure 1B Shown is the flowchart of the second embodiment of the first embodiment of the present invention, in this embodiment:

[0094] First in step 1201, set the storage box information table, as shown in Table 3, establish the corresponding relationship between the communication number and the storage box through this table; set the rejection threshold, and set the statistics table of calling operation times, as shown in Table 2.

[0095] Step 1202, receive a voice call, and obtain a calling number.

[0096] Step 1203, according to the calling number and the calling number of operations statistics table, judge whether the number of operations of the calling party reaches the set rejection threshold, if yes, end the process; otherwise, execute step 1204.

[0097] Here, according to the calling number, the corresponding record is searched from the statistics table of the number of calling operations. If found, the number of operations corresponding to the ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an attack protection method. According to the method, operation information of an operator is collected and whether corresponding operation is executed or not is decided according to the collected information before relevant operation is executed, thus suspected malicious operation is controlled. The invention also provides an attack protection system. According to the attack protection system, relevant equipment or system based on the attack protection system has an attack protection performance, thereby guaranteeing the operation quality of the equipment or the system.

Description

technical field [0001] The present invention relates to an attack protection method and an attack protection system based on the method, more specifically, relates to the prevention and control of malicious operations in communications, the Internet of Things, and the Internet. Background technique [0002] According to the invention patent of "Storage Box Control Method and Device" with the application number 201010563495.0, the customer applies for a storage box in the locker to store items by calling the locker phone, and opens the requested storage box by calling the phone again. Take out the stored items from the storage box. This method eliminates the trouble of constantly adding printing paper to the combination locker. [0003] According to the invention patent of "queuing method, system and device" with application number 201010580212.3, customers can get a short message reply containing the queuing number by dialing the queuing phone. The method is convenient for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王正伟
Owner 王正伟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products