Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and data processing device

A data processing and original data technology, applied in the field of data processing, can solve problems such as wasting client system resources and low coverage, and achieve the effect of avoiding cracking and improving accuracy and coverage

Active Publication Date: 2020-08-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The traditional hacking detection is mainly concentrated in the upstream industry chain, so it needs to fully cover the client, which not only has a low coverage rate, but also wastes the system resources of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and data processing device
  • Data processing method and data processing device
  • Data processing method and data processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Please refer to the drawings, in which the same reference numerals represent the same components, and the principles of the present invention are exemplified by being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be construed as limiting other embodiments of the invention not detailed herein.

[0029] In the following description, specific embodiments of the present invention will be described with reference to steps and symbols performed by one or more computers, unless otherwise stated. Accordingly, the steps and operations will be referred to several times as being performed by a computer, which reference herein includes operations by a computer processing unit of electronic signals representing data in a structured format. This operation transforms the data or maintains it in a location in the computer's memory system, which can be reconfigured or otherwise change the op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and a data processing apparatus. The data processing method comprises the following steps: acquiring original data, wherein the original data comprisea network protocol address, an account number, a login city, and a historical record indicating whether the login is successful; reconstructing the original data to generate reconstructed data, wherein the reconstructed data comprise a user city and a city distance, and the city distance is the distance between the user city and the login city; grouping the reconstructed data according to the network protocol address, and performing statistics on a feature value corresponding to each network protocol address, wherein the feature value comprises the number of registered account numbers, an average value of the city distance and a login success rate; and when the feature value satisfies a preset rule, judging an account number burglary operation. According to the data processing method disclosed by the invention, detection is performed in a behavior collection link of the hacker industry chain to effectively avoid a login protocol being cracked at a client, and to improve the accuracy and coverage of the detection.

Description

technical field [0001] The invention belongs to the field of data processing, and in particular relates to a data processing method and a data processing device. Background technique [0002] The upstream industry chain of hackers usually obtains account passwords used by users on websites or applications through channels such as credential stuffing, Trojan horses, phishing, or viruses, and then packs them into account and password sets, which are sold to the downstream industry chain of hackers. The hacker's downstream industry chain verifies the account passwords in the account password set one by one through an automaton, and selects the correct account password for a certain website or application program, and then steals it. The stolen account password not only threatens the user's virtual property (such as Q coins) and offline property (such as borrowing money from relatives and friends through WeChat), but also affects personal reputation (reposting Weibo with inappro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 申瑞珉
Owner TENCENT TECH (SHENZHEN) CO LTD