Data tamper-proofing method, system and equipment based on base station information and storage medium

A base station information and anti-tampering technology, applied in the field of network security, can solve problems such as lagging of data acquisition points, bypassing of profit-seeking in the used dimension, failure to achieve defense, etc., to improve real-time performance, improve access security, and have a wide range of applications Effect

Inactive Publication Date: 2019-05-28
携程旅游信息技术(上海)有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantage of this technology is that the data acquisition point lags behind, the accumulation of demand, and often the abnormality is identified after the order or activity profit has been achieved, which cannot achieve the purpose of defense, and the dimension used is easily bypassed by the profiteer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data tamper-proofing method, system and equipment based on base station information and storage medium
  • Data tamper-proofing method, system and equipment based on base station information and storage medium
  • Data tamper-proofing method, system and equipment based on base station information and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals denote the same or similar structures in the drawings, and thus their repeated descriptions will be omitted.

[0040] figure 1 It is a flow chart of the data tamper-proof method based on base station information in the present invention. Such as figure 1 As shown, the data tamper-proof method based on base station information of the present invention comprises the following steps:

[0041] S101. The preset base station information table includes at least first positioning information corresponding to the unique number of the bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data tamper-proofing method and system based on base station information, equipment and a storage medium, and the method comprises the steps: presetting a base station information table which at least comprises first positioning information corresponding to a unique number of a base station; acquiring a data packet uploaded when a client on the mobile terminal accesses theserver in real time, wherein the data packet comprises a base station number interacting with the mobile terminal and second positioning information representing the position of the mobile terminal;acquiring first positioning information corresponding to the base station numbers according to the base station information table; And when the distance difference between the first positioning information and the second positioning information is greater than a preset interaction distance threshold, if yes, judging that the access behavior of the mobile terminal is an abnormal operation, and refusing access. According to the method, calculation and judgment can be carried out with the data obtained from the starting point interacting with the user as the reference, compared with service burying point data, the real-time performance of abnormity judgment is greatly improved, single-dimension data tampering is effectively defended, and the safety is improved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a data tamper-proof method, system, device and storage medium based on base station information. Background technique [0002] At present, the main security anti-brush risk control relies on the mobile phone number email blacklist shared by the industry and the business data of users on this website, such as user operation coupon receiving IP, device number, browser information, ordering IP, payment account, etc., aggregated statistics It is used to identify abnormal behaviors such as one user operating multiple accounts and placing multiple orders. The main disadvantage of this technology is that the data acquisition point is lagging behind, the accumulation of demand, and the abnormality is often identified after the order or activity has been completed for profit, which cannot achieve the purpose of defense, and the dimension used is easily bypassed by the profiteer. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 任华炯凌云王润辉闵杰陈宇杨再三
Owner 携程旅游信息技术(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products