Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network operation control method and device

A network operation and control method technology, applied in the Internet field, can solve problems such as reducing the effectiveness of confrontation, and achieve the effects of improving effectiveness, preventing automatic machine breakthroughs, and simplifying user experience

Active Publication Date: 2020-08-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Judging from the current situation, most of the methods in the industry against automatic machines are generally verification codes, and most of the attack methods are aimed at IP addresses. However, with the mature development of VPN and the emergence of distributed manual coding, verification codes have been There are more and more cases of breakthroughs; and IP has gradually transformed into an unlimited resource, allowing criminals to evade attacks by generating a large number of IPs to operate, thus reducing the effectiveness of confrontation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network operation control method and device
  • Network operation control method and device
  • Network operation control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] The main solution of the embodiment of the present invention is: when it is detected that the client initiates a network operation, obtain the operation-related information corresponding to the network operation; send a biometric verification operation to the client, and obtain the biometric returned by the client ; Control the network operation according to the biometric feature returned by the client and the operation-related information. Among them, the operation-related information may include user identification, the time when the network operation was initiated, location information, and operation type, etc. Therefore, based on the operation-related information and the uniqueness of biometric features, it can replace ordinary verification codes to block automatic authentication. Using machines to do evil ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a network operation control method and device, the method comprising: when a client is monitored to initiate a network operation, obtaining operation-related information corresponding to the network operation; sending a biometric verification operation to the client, obtaining the client The returned biometrics; control the network operation according to the biometrics and operation-related information returned by the client. According to the operation-related information and the uniqueness of biological characteristics, the present invention can replace common verification codes to block automatic machines from doing evil. Automated operation can effectively prevent the breakthrough of automatic machines and improve the effectiveness of confrontation.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a network operation control method and device. Background technique [0002] On the Internet, cybercriminals are currently mainly using robots to accomplish large-scale crimes. For example, automatic machine registration number, automatic machine inquiry, automatic machine receiving discounts, etc. [0003] Judging from the current situation, most of the methods in the industry against automatic machines are generally verification codes, and most of the attack methods are aimed at IP addresses. However, with the mature development of VPN and the emergence of distributed manual coding, verification codes have been There are more and more cases of breakthroughs; and IP has gradually transformed into an unlimited resource, allowing criminals to evade attacks by generating a large number of IPs to operate, thereby reducing the effectiveness of confrontation. Contents of the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L9/40
Inventor 董梁陈梦刘飞飞陈远斌陈荣田伟张耀华颜国平华珊珊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products