Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

List extending method and list extending equipment

An extension method and list technology, applied in the network field, can solve problems such as white list or trusted list failure

Inactive Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of this application is to provide a list expansion method to prevent hackers from bypassing the prevention and control system by changing MAC addresses and registering new users, and to avoid users with good credit who occasionally change machines and register new accounts. The problem that causes the existing white list or trusted list to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • List extending method and list extending equipment
  • List extending method and list extending equipment
  • List extending method and list extending equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are part of the embodiments of this application, not all of them. Based on the embodiments in this application, other embodiments obtained by those skilled in the art all belong to the protection scope of this application.

[0060] The media association network describes the connection between a user's private media (private information unique to the user, such as the user's personal account, the MAC address of the device used by the user, or email, etc.) within a business scope. . This connection is satisfied by "simultaneous appearance" of different private media in one event when an event occurs (excluding the relationship between the buyer and the seller when the business occurs), and the event can be called an associated event.

[0061] For example: in a registration event, user A use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a list extending method. The list extending method comprises steps that a server is used to determine a first group of at least one medium in a to-be-extended list according to a medium association network; the server is used to acquire the medium capable of satisfying requirements in the first group according to a prefabricated condition; the server is used to add the medium capable of satisfying the requirements to the to-be-extended list in order to extend the to-be-extended list. The medium capable of satisfying the requirements in the first group is determined according to the conventional medium association network and a medium type list, and therefore the corresponding conventional medium list is extended, and then a problem of efficacy-losing of a conventional trusted list or a conventional untrusted list is reduced.

Description

technical field [0001] The present application relates to the field of network technologies, in particular to a list extension method and device. Background technique [0002] At present, based on security considerations, risk prevention and control of account information and network operations will be carried out in the network. In existing technologies, lists are usually used to prevent and control hackers, and the specific methods are as follows: [0003] Put the accounts, MAC (Media Access Control Address, Media Access Control Address), card number, ip, delivery address and other media that have had bad behavior in history into the black or gray list, and when these media come back to perform related account operations next time Or when paying, it can be effectively controlled. For some media that have experienced a large number of transactions and have a good operating record, they will be put into the trusted list or white list. [0004] However, in the process of i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 李剑
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products