Unlock instant, AI-driven research and patent intelligence for your innovation.

User access request processing method and device

A technology of access requests and processing methods, applied in electrical components, transmission systems, etc., can solve problems such as hacker unauthorized attacks, and achieve the effect of comprehensive detection

Active Publication Date: 2018-07-10
HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a user access request processing method and device, which can solve the problem of detecting unauthorized attacks by hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access request processing method and device
  • User access request processing method and device
  • User access request processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Features and exemplary embodiments of various aspects of the invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention. The present invention is by no means limited to any specific configurations and algorithms presented below, but covers any modification, substitution and improvement of elements, components and algorithms without departing from the spirit of the invention. In the drawings and the following description, well-known structures and techniques have not been shown in order to avoid unnecessarily obscuring the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user access request processing method and device. The method includes receiving a user access request which is used for accessing predetermined content; judging whether access of a user to the predetermined content is beyond limits of authority of the user; under the circumstance that the access is beyond limits of authority of the user, obtaining a risk assessment valueaccording to information of the user which includes at least one of registration time of the user, limits of authority of the user and historical trials and errors of the user, the historical trials and errors being information of failures of user access to content; and determining whether to limit the access of the user according to the risk assessment value. Through the user access request processing method provided by the embodiment of the invention, the problem of detecting an unauthorized attack of a hacker is solved, and detection can be performed more timely, accurately and comprehensively.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a user access request processing method and device for processing user access requests. Background technique [0002] The Internet system based on the browser / server model has been widely used in various fields of life and work, and has become a major architectural form of IT systems. However, user data from browsers is often maliciously tampered with, resulting in unauthorized access to the system. Some systems need to limit the scope of data that users can submit, or limit the scope of data that users can access, based on permission settings. However, since the data submitted by users is divided into two forms: discrete data and continuous data, it is difficult to clarify all data security boundaries during program design, and exhaustively enumerate all data violations. Therefore, data unauthorized attacks pose great challenges to system security and user in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/205H04L67/60
Inventor 李秀清王森李荣果张冀春龙学义
Owner HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More