Unlock instant, AI-driven research and patent intelligence for your innovation.

Web system malicious polyphonic ringtone ordering preventing method and server

A server and ring tone technology, applied in the field of communication, can solve the problems of weak control ability, unable to meet the service quality and security requirements of the color ring back tones Web service, etc., and achieve the effect of improving security and preventing repeated transmission.

Inactive Publication Date: 2015-04-01
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to its open environment, the CRBT Web service of the current B / S architecture will inevitably be affected by some negative factors. Malicious ordering of ring tones is an important content of security protection, but due to the limitations of the characteristics of Web services, in The control ability in this link is relatively weak. With the deepening of the ring back tone business, the existing web system cannot meet the quality and security requirements of the ring back tone web service.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web system malicious polyphonic ringtone ordering preventing method and server
  • Web system malicious polyphonic ringtone ordering preventing method and server
  • Web system malicious polyphonic ringtone ordering preventing method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The main idea of ​​the solution in the embodiment of the present invention is: because the malicious ordering behavior of ringtones mostly presents the following main features: abnormality in behavior, such as behavior that ordinary users rarely or almost impossible to do; regularity in behavior, such as the same Or be the operating time cycle of a certain sequence; The regularity on the data, such as the natural sequence relationship of all ordered ring tone numbers, etc., therefore, the present embodiment aims at the above situation, and the program simulation robot pretends to be a legitimate user to log in and cause In order to solve the problem of ordering malicious ring tones, the path tracking technology of the stack mechanism is introduced; for malicious ring tones ordered by browser address access and legitimate login users through multiple submissions, a request filter similar to the token ring mechanism is introduced to prevent ring tones Effectively control t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and a server in a color ring Web system for preventing vicious ring tone subscriptions. The method includes: the server records active path information of necessary steps in a ring tone subscription process, and compresses the active path information into stack sensitive information (S101); receives the subscription request inputted by a user, and compresses the subscription request into stack sensitive information (S102); based on the stack sensitive information, using a predetermined association iterative algorithm, calculates a reliability index of the subscription request (S103); and filters the subscription request when the reliability index exceeds a preset threshold (S104). By importing the stack mechanism and the token-ring-similar mechanism, the present invention can effectively perform security control to plurality of ways of vicious ring tone subscriptions, such as login by a program simulated robot imitating a legal user, access through a browser address, and repetitious submission by a legal login user, thereby improving security of the Web system, and ensuring the together profit among the color ring users, the operator and the color ring content provider.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and a server for preventing malicious ordering of ring tones in a ring tone Web system with a Browser / Server (B / S) architecture. Background technique [0002] With the continuous development of intelligent network services, the CRBT service is more and more widely used. Among them, a series of operations such as displaying, listening to, ordering and presenting CRBT based on the Web server are all carried out through the Internet. The openness of the network makes the security and effectiveness of the network interaction on this basis very important. [0003] Due to its open environment, the CRBT Web service of the current B / S architecture will inevitably be affected by some negative factors. Malicious ordering of ring tones is an important content of security protection, but due to the limitations of the characteristics of Web services, in The control capability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04M3/42
CPCH04L63/1483
Inventor 令周扬
Owner ZTE CORP