An information processing method and device

An information processing method and a technology for logging information, which are applied in the field of information processing methods and devices, can solve problems such as low information security, and achieve the effect of improving security

Active Publication Date: 2021-06-22
NEW H3C SECURITY TECH CO LTD
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for users, the leaked login information can still be used again by attackers to log in to other web servers, so the information security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method and device
  • An information processing method and device
  • An information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0036] In order to improve information security, the embodiments of the present application provide an information processing method and device. The present application will be described in detail below through specific examples.

[0037] figure 1 It is a schematic flowchart of the information processing method provided by the embodiment of the present application. This embodiment is applied to network equipment. The network devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide an information processing method and device. The method includes: after determining that the login message from the first source address satisfies the preset credential stuffing rule, when receiving each login message from the first source address, sending a message for each login message to the first source address The authentication failure information of the document; construct the corresponding authentication message according to the login information in each login message, and send the constructed authentication message to the first server; receive the verification returned by the first server for the login information in the authentication message Result; according to the verification result, the successfully verified login information is determined as leaked login information; wherein, the login message includes the login information used to log in to the first server. Applying the solutions provided by the embodiments of the present application can improve information security.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to an information processing method and device. Background technique [0002] With the popularity of computers and networks, information technology is changing and affecting the way of life of human beings. Various network applications emerge in an endless stream, and security threats and network abuse are also increasing day by day, which puts forward new requirements for website managers. The login information such as user name and password is strictly protected as the key to log in to each website server. Once leaked, the consequences will be disastrous. [0003] Attackers collect leaked user names and passwords from the Internet and log in to the website server in batches, in order to obtain a series of user names and passwords that can log in to the website server. Many users use the same username and password on different websites, so an attacker can t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1416H04L63/1491H04L2463/146
Inventor 张惊申任方英
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products