Secure access method and device, storage medium and terminal equipment

A security access and risk technology, applied in the computer field, can solve the problems of difficult judgment, poor reusability, and high labor cost

Active Publication Date: 2019-05-31
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (3) Combined analysis of business data and device fingerprint data, this method can make some pre-judgments before business abnormalities occur, but the effect is limited
[0007] However, the above business security protection methods basically use a single form to make predictions, which is difficult to ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method and device, storage medium and terminal equipment
  • Secure access method and device, storage medium and terminal equipment
  • Secure access method and device, storage medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] In the following, only some exemplary embodiments are briefly described. As those skilled in the art would realize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature and not restrictive.

[0094] see figure 1 , the embodiment of the present invention provides a secure access method. This embodiment can be applied to scenarios such as financial transactions, online comments, logging in or registering on a certain website or platform. This embodiment may include steps S100 to S400, as follows:

[0095] S100. Obtain a user request, where the user request includes request content, request action and basic request information.

[0096] In some embodiments, when the service-providing system receives a user request, it can split the user request, and extract request content, request action, and b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure access method and device, a storage medium and terminal equipment, and the method comprises the steps: obtaining a user request which comprises request content, a request action and basic request information; determining a service risk requested by the user based on the request content and the request action; determining a basic attribute risk of the user request based on the basic request information; and determining a processing operation on the user request based on the business risk and the basic attribute risk. Compared with the prior art, the specific service scene and the basic information are integrated, and the service request risk is integrally judged. And moreover, the dependence of an enterprise on manual experience can be effectively reduced, and the method can be applied to different service scenes and has certain universality.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, device, storage medium and terminal equipment for secure access. Background technique [0002] With the development of Internet technology, various Internet-based services have penetrated into every aspect of people's lives. However, due to the evolution of more diverse and complex network service scenarios, providers of network services and enterprises receiving network services will face various security issues. From traditional basic security to application security, to today's business security, security issues have gradually moved from behind the scenes to the foreground, and are becoming more and more closely integrated with network services. Among them, basic security includes basic hardware configuration, equipment security, etc. Application security includes software vulnerabilities, WAF (WebApplication Firewall, website application-level intrusion ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 戚名钰白军辉陈飞彦
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products