Service access method, device and system, equipment and storage medium

A business access and server system technology, applied in the field of business access, can solve problems such as inability to guarantee accuracy, affecting normal user interests, setting gray list addresses, etc.

Inactive Publication Date: 2019-11-01
GUANGZHOU BAIGUOYUAN INFORMATION TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of the Internet and communication technology, most Internet companies will propose a variety of preferential activities to attract users. Users can participate in activities and get corresponding rewards by visiting specific services developed for various preferential activities; at this time, some speculators will Utilize the proxy Internet Protocol (IP) address assigned to users free of charge on the network, and use tools such as web crawlers to automatically capture the development programs or scripts corresponding to specific services according to certain rules, so as to simulate normal users by tampering with the results of business execution behaviors to participate in preferential activities, and exchange high rewards at low cost or even zero cost, which affects the interests of normal users
[0003] The existing technology generally identifies whether the participating user is a normal user by pre-setting the corresponding gray list of IP addresses in the application program corresponding to the specific business or accessing a third-party risk control system; at this time, when the gray list of IP addresses is set in the application program, It is impossible to set all gray list addresses in the IP address meeting list in advance, and it is impossible to guarantee the accuracy of verifying whether the user is a normal user through the IP address gray list, and it is impossible to completely prevent speculators from accessing specific services; at the same time, access to third-party risk When controlling the system, it is necessary to embed a third-party application programming interface (Application Programming Interface, API) in advance. The access cost is too high. At the same time, business data needs to be transmitted to the third-party risk control system, and there are certain business risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service access method, device and system, equipment and storage medium
  • Service access method, device and system, equipment and storage medium
  • Service access method, device and system, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Figure 1A It is a flow chart of a service access method provided by Embodiment 1 of the present invention. This embodiment can be applied to the situation of accessing services with rights. A service access method provided in this embodiment can be executed by a service access device provided in an embodiment of the present invention, and the device can be realized by means of software and / or hardware, and integrated into a device that executes the method. The device can be any kind of server capable of business processing.

[0037] Specifically, refer to Figure 1A , the method may include the following steps:

[0038] S110. Determine the network address of the client and the address of the service to be accessed according to the service access request of the client.

[0039] Specifically, this embodiment is mainly aimed at accessing specific services developed for various preferential activities. Users can obtain corresponding rewards by accessing the specific servi...

Embodiment 2

[0056] Figure 2A It is a flow chart of a service access method provided in Embodiment 2 of the present invention, Figure 2B It is a schematic diagram of the principle of the service access process provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the foregoing embodiments, and this embodiment mainly describes other situations existing in the service access process.

[0057] optional, such as Figure 2A As shown, this embodiment may include the following steps:

[0058] S210. Determine the service type and service address to be accessed according to the service access request of the client.

[0059] S220, judging whether the service type is a specified service type, if yes, execute S230; if not, execute S250.

[0060] Specifically, the specified service type in this embodiment is a specific service type developed for various preferential activities, and users can obtain corresponding rewards by accessing the specified service....

Embodiment 3

[0074] image 3 A schematic structural diagram of a service access device provided in Embodiment 3 of the present invention, specifically, as image 3 As shown, the device may include:

[0075] Request access module 310, configured to determine the network address of the client and the address of the service to be accessed according to the service access request of the client;

[0076] The verification page jump module 320 is used to control the client to jump to the preset verification input page if the network address does not pass the verification of the preset address gray list;

[0077] The service access module 330 is configured to execute the corresponding service according to the service address if the secondary verification operation on the verification input page is manually triggered by the client.

[0078] In the technical solution provided by this embodiment, first, the network address of the client requesting access is verified through the preset address gray l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service access method, device and system, equipment and a storage medium. The method comprises the following steps: determining a network address of a client and a service address to be accessed according to a service access request of the client; if the network address does not pass the preset address grey list verification, controlling the client to skip to a preset verification input page; and if the secondary verification operation on the verification input page is an operation manually triggered by the client, executing a corresponding service according to the service address. According to the technical scheme provided by the embodiment of the invention, whether the client requested to be accessed this time is the spectator client passing the verification byrewriting the background service program can be detected by judging whether the secondary verification operation is triggered manually or not, so that the spectator is prevented from frequently accessing the service, and the safety of service access is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of the Internet, and in particular to a service access method, device, system, equipment and storage medium. Background technique [0002] With the development of the Internet and communication technology, most Internet companies will propose a variety of preferential activities to attract users. Users can participate in activities and get corresponding rewards by visiting specific services developed for various preferential activities; at this time, some speculators will Utilize the proxy Internet Protocol (IP) address assigned to users free of charge on the network, and use tools such as web crawlers to automatically capture the development programs or scripts corresponding to specific services according to certain rules, so as to simulate normal users by tampering with the results of business execution Participate in preferential activities with low-cost or even zero-cost in exch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3271H04L63/08H04L63/0876H04L63/101H04L63/108
Inventor 迟长峰张亮罗嗣晨袁青松
Owner GUANGZHOU BAIGUOYUAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products