Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for risk assessment of access behavior

A behavior and access record technology, applied in the field of information security, can solve the problems of cumbersome steps and low efficiency of access behavior risk assessment, and achieve the effect of improving efficiency

Active Publication Date: 2019-10-25
BEIJING TRUSFORT TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the purpose of the present invention is to provide a risk assessment method and device for access behaviors, so as to alleviate the cumbersome steps in obtaining the access time in the existing risk assessment methods for access behaviors, which leads to the risk of access behaviors Evaluate the problem of low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for risk assessment of access behavior
  • Method and device for risk assessment of access behavior
  • Method and device for risk assessment of access behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] According to an embodiment of the present invention, an embodiment of a risk assessment method for access behavior is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0029] figure 1 is a risk assessment method for access behavior according to an embodiment of the present invention, such as figure 1 As shown, the method is applied to the gateway server, including the following steps:

[0030] Step S102, using reverse proxy technology to obtain the user's initial access records to the business system in the first time period, wherein the first time period includes multiple time windows, and the initial access records include the user's access to the business s...

Embodiment 2

[0090] The present invention also provides a risk assessment device for access behavior, which is installed in the gateway server and used to implement the risk assessment method for access behavior provided by the above content of the embodiment of the present invention. The following is the access behavior provided by the embodiment of the present invention Behavioral risk assessment means specific presentation.

[0091] Such as Figure 5 As shown, the access behavior risk assessment device includes: an acquisition unit 10, a first determination unit 20 and a second determination unit 30, wherein,

[0092] The acquiring unit 10 is configured to acquire the user's initial access record to the service system in the first time period by using reverse proxy technology, wherein the first time period includes multiple time windows, and the initial access record includes the user's access to the business system. The access time of the business system mentioned above;

[0093] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a risk assessment method and apparatus for access behavior, and relates to a technical field of information security, comprising: acquiring an initial access record of auser to a service system in a first time period by using a reverse proxy technology, wherein the first time period comprises a plurality of time windows, and the initial access record comprises an access time of the user to the service system; Determining an initial number of access records for each time window in the first time period based on the initial access records; Based on the initial number of access records for each time window, determining the active time windows from multiple time windows, and determining dangerous access behaviors of users according to the active time windows, which solves the problem that in the existing risk assessment methods of access behaviors, the steps of acquiring access time are tedious, and the risk assessment efficiency of access behaviors is low.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for risk assessment of access behavior. Background technique [0002] In the existing access behavior risk assessment method, in order to correspond the access behavior to the user's common time window, a specific time needs to be divided into multiple time windows. The existing time window setting methods include the following two: 1. Set the corresponding common time window for each user according to the access behavior time rules of each user in the business system; 2. Classify users according to the working hours and off-working hours of all users in the business system, and will have the same working hours Divide users into the same category as those who work during off-duty time, and set a corresponding common time window for each type of user. For example, an enterprise with three shifts divides the time into three 8-hour periods, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/552
Inventor 袁春旭赵军郭阳王俊杰孙悦郭晓鹏
Owner BEIJING TRUSFORT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products