Method and device for risk assessment of access behavior
A behavior and access record technology, applied in the field of information security, can solve the problems of cumbersome steps and low efficiency of access behavior risk assessment, and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] According to an embodiment of the present invention, an embodiment of a risk assessment method for access behavior is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0029] figure 1 is a risk assessment method for access behavior according to an embodiment of the present invention, such as figure 1 As shown, the method is applied to the gateway server, including the following steps:
[0030] Step S102, using reverse proxy technology to obtain the user's initial access records to the business system in the first time period, wherein the first time period includes multiple time windows, and the initial access records include the user's access to the business s...
Embodiment 2
[0090] The present invention also provides a risk assessment device for access behavior, which is installed in the gateway server and used to implement the risk assessment method for access behavior provided by the above content of the embodiment of the present invention. The following is the access behavior provided by the embodiment of the present invention Behavioral risk assessment means specific presentation.
[0091] Such as Figure 5 As shown, the access behavior risk assessment device includes: an acquisition unit 10, a first determination unit 20 and a second determination unit 30, wherein,
[0092] The acquiring unit 10 is configured to acquire the user's initial access record to the service system in the first time period by using reverse proxy technology, wherein the first time period includes multiple time windows, and the initial access record includes the user's access to the business system. The access time of the business system mentioned above;
[0093] The...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com