Safety verification system, method and device

A security verification and server technology, applied in transmission systems, data processing applications, finance, etc., can solve problems such as poor crawler interception effect, and achieve the effect of solving the decision-making degree and ensuring the interception effect.

Pending Publication Date: 2019-10-18
ALIBABA GRP HLDG LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] Embodiments of the present invention provide a system, method and device for security verification, to at least solve the technical problem of poor interception of reptiles in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification system, method and device
  • Safety verification system, method and device
  • Safety verification system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to an embodiment of the present invention, an embodiment of a security verification system is provided. This application provides the following figure 1 The schematic diagram of the safety verification system shown, the system includes:

[0041] The first server 10 monitors the behavior data generated by the behavior for operating the webpage when the webpage runs the logged-in target application through the browser, and determines whether the behavior data is risky.

[0042] Specifically, the above-mentioned first server may be a data server deployed remotely or locally for risk control. The first server may be installed with a risk control engine, and run preset risk control rules through the risk control engine, so as to control behavior judge whether the data is at risk. The first server can communicate with the second server and the terminal to send the risk control result of the behavior data (that is, the judgment result of whether there is risk) to th...

Embodiment 2

[0102] According to an embodiment of the present invention, an embodiment of a security verification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0103] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. image 3 A block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a method for security verification is shown. Such as image 3 As shown, the computer terminal 30 (or mobile device 30) may include one or more (shown by 302a, 302b, ..., 302n in the figure) processor 302 (the processor 302 may inc...

Embodiment 3

[0124] According to an embodiment of the present invention, an embodiment of a security verification method is provided, Figure 5 It is a flowchart of a method for security verification according to Embodiment 3 of the present application, the method includes:

[0125] Step S51, the second server generates a verification ID according to the control of the first server, wherein, when the webpage runs the logged-in target application through the browser, the first server monitors the behavior data generated by the behavior used to operate the webpage, and In the case that the data is at risk, the second server is controlled to generate a verification identifier.

[0126] Specifically, the above-mentioned second server may be a second server deployed on the target application server, and the above-mentioned verification identification may be a two-dimensional code or a bar code, and the second server may generate a verification identification according to the account information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety verification system, a safety verification method and a safety verification device. The method comprises the steps of a first server: wherein when a webpage runs a logged-in target application through a browser, the first server monitors the behavior data generated by behaviors used for operating the webpage, and judges whether the behavior data have risks or not;a server communicated with the first server and used for generating a verification identifier and sending the verification identifier to the webpage under the condition that the behavior data has risks; a terminal used for scanning and analyzing the verification identifier to obtain an analysis result, wherein the server is also used for verifying the behavior data according to the analysis result. The technical problem that in the prior art, the crawler interception effect is poor is solved.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a system, method and device for safety verification. Background technique [0002] At present, the mainstream bookkeeping and micro-loan applications on the market, such as 51 credit card, dig money, cash white card, etc., usually need to control the user's loan risk, so it is necessary to obtain the user's financial data, such as: consumption records , account balance, account flow and other information. [0003] One of the ways for these applications to obtain users' financial data is to use web crawlers to crawl the assets and financial consumption information of users' financial accounts, so these applications can also be called crawler apps. However, when fighting against reptiles, if all of them are re-intercepted, that is, once a risky operation is detected, it will be intercepted, and it is easy to mistakenly intercept the normal operation of the user. Therefore, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/02H04L29/06
CPCH04L63/12H04L63/1441G06Q40/03
Inventor 李潇霄
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products