Unlock instant, AI-driven research and patent intelligence for your innovation.

User access request processing method and device

A technology for access requests and processing methods, applied in transmission systems, electrical components, etc., can solve problems such as hacker unauthorized attacks, and achieve the effect of comprehensive detection

Active Publication Date: 2021-03-16
HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a user access request processing method and device, which can solve the problem of detecting unauthorized attacks by hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access request processing method and device
  • User access request processing method and device
  • User access request processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Features and exemplary embodiments of various aspects of the invention will be described in detail below. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention. The present invention is by no means limited to any specific configurations and algorithms presented below, but covers any modification, substitution and improvement of elements, components and algorithms without departing from the spirit of the invention. In the drawings and the following description, well-known structures and techniques have not been shown in order to avoid unnecessarily obscuring the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user access request processing method and device. The method includes: receiving a user access request, wherein the access request is used to access predetermined content; judging whether the user's access to the predetermined content exceeds the user's authority ; In the case of exceeding the user's authority, obtain a risk assessment value according to the user's information, wherein the user's information includes at least one of the following: the user's registration time, the user's authority, the user's The user's historical trial and error, where the historical trial and error is information that the user fails to access the content; whether to restrict the user's access is determined according to the risk assessment value. The embodiment of the present invention further solves the problem of detecting unauthorized attacks by hackers, and enables more timely, accurate and comprehensive detection.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a user access request processing method and device for processing user access requests. Background technique [0002] The Internet system based on the browser / server model has been widely used in various fields of life and work, and has become a major architectural form of IT systems. However, user data from browsers is often maliciously tampered with, resulting in unauthorized access to the system. Some systems need to limit the scope of data that users can submit, or limit the scope of data that users can access, based on permission settings. However, since the data submitted by users is divided into two forms: discrete data and continuous data, it is difficult to clarify all data security boundaries during program design, and exhaustively enumerate all data violations. Therefore, data unauthorized attacks pose great challenges to system security and user in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/205H04L67/60
Inventor 李秀清王森李荣果张冀春龙学义
Owner HANDAN BRANCH OF CHINA MOBILE GRP HEBEI COMPANYLIMITED
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More