Web system malicious polyphonic ringtone ordering preventing method and server

A server and ring tone technology, applied in the communication field, can solve problems such as weak control ability, inability to meet the quality and security requirements of CRBT web services, and achieve the effect of improving security and preventing repeated sending

Inactive Publication Date: 2012-10-31
ZTE CORP
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to its open environment, the CRBT Web service of the current B / S architecture will inevitably be affected by some negative factors. Malicious ordering of ring tones is an important content of security protection, but due to the limitations of the characteristics of Web services, in The control ability in this link is relatively weak. With the deepening of the ring back tone business, the existing web system cannot meet the quality and security requirements of the ring back tone web service.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web system malicious polyphonic ringtone ordering preventing method and server
  • Web system malicious polyphonic ringtone ordering preventing method and server
  • Web system malicious polyphonic ringtone ordering preventing method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The main idea of ​​the solution in the embodiment of the present invention is: because the malicious ordering behavior of ringtones mostly presents the following main features: abnormality in behavior, such as behavior that ordinary users rarely or almost impossible to do; regularity in behavior, such as the same Or be the operating time cycle of a certain sequence; The regularity on the data, such as the natural sequence relationship of all ordered ring tone numbers, etc., therefore, the present embodiment aims at the above situation, and the program simulation robot pretends to be a legitimate user to log in and cause In order to solve the problem of ordering malicious ring tones, the path tracking technology of the stack mechanism is introduced; for malicious ring tones ordered by browser address access and legitimate login users through multiple submissions, a request filter similar to the token ring mechanism is introduced to prevent ring tones Effectively control t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a web system malicious polyphonic ringtone ordering preventing method and a server. The method includes: allowing the server to record activity route information of steps supposed to be selected by users in the ringtone ordering process, and pressing the activity route information into stack sensitive information; receiving ordering requests inputted by the users, and pressing the ordering requests into the stack sensitive information; calculating credibility indexes of the ordering requests by means of the preset association iterative algorithm based on the stack sensitive information; and filtering the ordering requests when the credibility indexes exceed a preset threshold. By introducing a stack mechanism and a like token ring mechanism, various malicious polyphonic ringtone ordering ways such as pretending legal user login by program simulated robots, accessing through browser addresses, multiple-time submitting by legal login users and the like can be effectively subjected to safety control, and accordingly, safety of the Web system is improved while common benefits among polyphonic ringtone users, operators and polyphonic ringtone content providers are guaranteed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and a server for preventing malicious ordering of ring tones in a ring tone Web system with a Browser / Server (B / S) architecture. Background technique [0002] With the continuous development of intelligent network services, the CRBT service is more and more widely used. Among them, a series of operations such as displaying, listening to, ordering and presenting CRBT based on the Web server are all carried out through the Internet. The openness of the network makes the security and effectiveness of the network interaction on this basis very important. [0003] Due to its open environment, the CRBT Web service of the current B / S architecture will inevitably be affected by some negative factors. Malicious ordering of ring tones is an important content of security protection, but due to the limitations of the characteristics of Web services, in The control capability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04M3/42
CPCH04L29/08H04L63/1483H04L29/0809H04M3/42
Inventor 令周扬
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products