Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access behavior data processing method, system and device, and readable storage medium

A data processing and behavior technology, applied in the electronic field, can solve the problems of data redundancy and low user credit coverage.

Active Publication Date: 2018-06-12
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a method, system, device, and readable storage medium for processing access behavior data, which partially or completely solve the problem of large amounts of data redundancy and user credit coverage in the prior art when building a credit system for user equipment information. very low question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access behavior data processing method, system and device, and readable storage medium
  • Access behavior data processing method, system and device, and readable storage medium
  • Access behavior data processing method, system and device, and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] refer to figure 1 , which shows a flow chart of the steps of a method for processing access behavior data, the specific steps of which are as follows:

[0038] Step 110, acquiring the first access location where the client that initiates the current access behavior is located.

[0039] In the embodiment of the present invention, the corresponding relationship between the access location and the trusted score may be preset for the user account of the application in advance. In practical applications, according to the historical access behavior and the corresponding access location recorded by the user after using the application client, the corresponding relationship between the access location and the trustworthiness score is constructed.

[0040] It should be noted that the access location in this embodiment of the present invention may be an area. The block area can be identified by the Geohash code obtained by using the Geohash algorithm as described above. Such ...

Embodiment 2

[0058] refer to figure 2 , which shows a flow chart of the steps of a method for processing access behavior data, the specific steps of which are as follows:

[0059] Step 210, according to the historical access behavior of the user account and the corresponding historical access location, construct the corresponding relationship between the historical access location and the credibility score for the user account.

[0060] In the embodiment of the present invention, after each user uses the application client to perform various aforementioned access behaviors, for example, after user account A makes payment and the payment is successful, the server can record when and where user account A made the payment. payment behavior. Then, the embodiment of the present invention can construct the corresponding relationship between the access location and the credibility score for the user account of each user according to the historical access behavior and the corresponding access lo...

Embodiment 3

[0214] refer to image 3 , which shows the relationship between modules in a structural block diagram of an access behavior data processing system, the system comprising:

[0215] Security pre-module 301, scoring module 302, business module 303, among which

[0216] The security front module 301 includes an access location acquisition submodule 3011 and a security policy search submodule 3012,

[0217] The access location acquisition submodule 3011 is used to acquire the first access location where the client that initiates the current access behavior is located;

[0218] The security policy lookup submodule 3012 is configured to look up a set security policy corresponding to the current access behavior based on the credibility score;

[0219] The scoring module 302 includes a credible score acquisition sub-module 3021,

[0220] The credible score acquisition sub-module 3021 is used to calculate the credible score corresponding to the first access location according to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access behavior data processing method, system and device, and a readable storage medium. The method comprises the steps of acquiring a first access position of a client initiating a current access behavior; according to a correspondence between a preset access position of a user account of the client and a trust score, calculating a trust score corresponding to the firstaccess position; searching, based on the trust score, a set security policy corresponding to the current access behavior; and executing the set security policy. Through adoption of the method, trustscores of a target position executing access are accumulated, and a corresponding set operation is performed according to a correspondence between the trust score of the current access behavior and atrust score of a position at where access behavior occurs. Compared with a set processing operation based on trust score for device environment in the prior art, the method has the advantages of higher coverage and more reliable, accurate security management.

Description

technical field [0001] The embodiments of the present invention relate to the field of electronic technology, and in particular, to a method, system, device, and readable storage medium for processing access behavior data. Background technique [0002] With the rapid development of network technology and information technology, online transactions have increasingly become a new business model, and more and more users rely on e-commerce for fast and efficient transactions. [0003] Due to the inherent openness and resource sharing of the network, network security incidents often occur, and the construction of a secure and trusted network has become the focus of attention. Obviously, it cannot meet the current network security requirements. In the prior art, firstly, whether the device information of the device where the access behavior occurs in the network is credible is obtained. The device information is such as the mac ( Media Access Control, physical address), device IP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/52
Inventor 孙翔
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products