A method and device for business security control
A security control and security technology, applied in the network field, can solve problems such as low efficiency, and achieve the effect of saving storage space and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The basic idea of the embodiment of the present application is: after receiving the service request information sent by the user equipment, extract the user attribute parameter value for security detection from the stored user information corresponding to the user identity in the service request information, Afterwards, according to the user attribute parameter value characteristics corresponding to each parameter mode defined in advance, the user attribute parameter value is converted into a parameter mode set, and then based on the security score corresponding to each parameter mode, the security of the parameter mode set is determined. Score, according to the security score of the finally obtained parameter mode set, perform service security control on the service request information. That is to say, the embodiment of the present application first converts the user attribute parameter value into a parameter pattern, and then performs subsequent security control base...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


