Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and equipment for performing risk management on access request

An access request and risk control technology, applied in the computer field, can solve the problem that risk requests cannot be intercepted outside of business equipment, and achieve the effects of simple deployment, control of resource overhead, and increased computing processing speed.

Inactive Publication Date: 2018-07-24
ALIBABA GRP HLDG LTD
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of this application is to provide a method and device for risk control of access requests to solve the technical problem in the prior art that risk requests cannot be effectively intercepted outside of business devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for performing risk management on access request
  • Method and equipment for performing risk management on access request
  • Method and equipment for performing risk management on access request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The application will be described in further detail below in conjunction with the accompanying drawings.

[0053] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0054] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0055] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application aims at providing a method and equipment for performing risk management on an access request. The method comprises the following steps: business risk management service is deployed onproxy equipment, namely, the proxy equipment acquires response information sent to corresponding user equipment by business equipment, and forwards the response information to the corresponding user equipment after injecting a risk management parameter acquisition module into the same, and then, the proxy equipment intercepts a risk management request when the user equipment initiates the risk management request to the business equipment based on the response information, and performs risk judgment based on the risk management parameter in the risk management request. Compared with the prior art, the operation pressure of the business equipment is relieved since the business modification is unnecessary in the business equipment; and meanwhile, the overall resource expenditure is saved by performing the centralized risk management service deployment; the deployment is simple, and the real-time risk management effect can be nearly realized; and multiple access requests can be effectivelyprevented and controlled.

Description

technical field [0001] The present application relates to the computer field, and in particular to a technology for risk control of access requests. Background technique [0002] In the network environment, when the user equipment accesses the corresponding business equipment, due to the unknown network security of the user access request, it will bring different degrees of access risks to the corresponding business equipment, which in turn will bring great hidden dangers to the data security of the business equipment. , therefore, it is extremely necessary and important to reduce the business risks brought by access requests to business devices by deploying business risk control services. [0003] At present, the common business risk control technology in the industry is mainly: directly deploy the risk control service in the required business equipment. The JAVASCRIPT script of the risk control request is integrated in the webpage. On the other hand, the business side nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/44
CPCH04L63/1466G06F21/44G06F2221/2141H04L67/56
Inventor 冯小天
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products