Service request processing method and service request processing device

A technology of business requests and processing methods, applied in electrical components, transmission systems, etc., can solve problems such as stolen network accounts and high property, and achieve the effect of preventing theft or being cheated and increasing security

Active Publication Date: 2016-06-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, personal password leakage, phishing, social engineering and o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service request processing method and service request processing device
  • Service request processing method and service request processing device
  • Service request processing method and service request processing device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0034] image 3 It is a flow chart of the service request processing method provided by the first embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server, and the service request processing method provided by this embodiment includes the following steps:

[0035] In step S11, the server collects active markings performed by a plurality of first clients on the accounts of the second clients.

[0036] The server 200 may collect the active marking performed by the user of the client (first client) installed on the user terminal 100 for the account of the second client. The user of the first client can actively mark the messages and accounts published in scenarios such as social networking, instant messaging, purchase, proxy payment, and payment, and submit them to the server.

[0037] In different application scenarios, active marking can take different forms.

[0038] For example, in an instant messaging application (...

no. 2 example

[0057] Figure 5 It is a flow chart of the service request processing method provided by the second embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server. In this embodiment, assuming that the business type processed by the server is a single business type, the method for processing a business request provided by this embodiment includes the following steps:

[0058] In step S201, the server collects active markings performed by a plurality of first clients on accounts of second clients.

[0059] Step S202, after processing the information in the active tag, obtain and store the malicious degree level corresponding to the account number of the second client.

[0060] Step S203, when the server receives the service request sent by the second client, query the malicious degree level corresponding to the account of the second client.

[0061] Step S204, judging whether the malicious degree level is smaller than a fi...

no. 3 example

[0066] Image 6 It is a flow chart of the service request processing method provided by the third embodiment of the present invention. combine figure 1 , this embodiment describes the processing flow of the server. In this embodiment, assuming that the server handles two or more business types, the method for processing a service request provided by this embodiment includes the following steps:

[0067] In step S301, the server collects active markings performed by a plurality of first clients on accounts of second clients.

[0068] Step S302, after processing the information in the active tag, obtain and store the malicious degree level corresponding to the account number of the second client.

[0069] Step S303, when the server receives the service request sent by the second client, query the malicious degree level corresponding to the account of the second client.

[0070] Step S304, judging whether the malicious degree level is smaller than a first threshold.

[0071] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a service request processing method which comprises the steps of collecting active marks of a plurality of first clients to the account number of a second client by a server; after processing information in the active marks, acquiring and storing a malice degree which corresponds with the account number of the second client; when the server receives a service request which is transmitted from the second client, searching a malice degree which corresponds with the account number of the second client; and arranging a corresponding warning mark on the service request according to the malice degree and the service type of the service request, and transmitting corresponding alarm information according to the warning mark. Furthermore the embodiment of the invention further provides a service request processing device. The service request processing method and the service request processing device can effectively prevent theft or cheating of user information or property and furthermore improve safety of Internet information.

Description

technical field [0001] The invention relates to computer Internet technology, in particular to a method and device for processing service requests. Background technique [0002] With the development of Internet technology, openness, collaboration, and sharing have become the development trend of Internet technology, and the interconnection and interoperability of Internet accounts and single sign-on have become one of the most important aspects. For example, users can log in through Facebook, Twitter, QQ and other accounts. For third-party applications or third-party websites, the value and role of accounts are becoming more and more important. [0003] At the same time, personal password leakage, phishing, social engineering and other situations lead to higher and higher risks of network account theft and property theft. How to effectively notify relevant users of the security status of the accounts that initiate these requests in scenarios such as chatting, posting messag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 周进
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products