Abnormal access object recognition method and equipment

A technology for accessing objects and identification methods, which is applied in the field of data processing, and can solve problems such as user information leakage and poor anti-interference, and achieve the effect of improving anti-interference and reducing the risk of user information leakage

Active Publication Date: 2020-02-21
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a method and equipment for identifying abnormally accessed objects to solve the problem of identifying and responding to abnormally accessed objects. Abnormal access objects of non-sensitive file access operations will be misjudged as normal user access operations, thereby increasing the risk of user information leakage and poor anti-interference problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access object recognition method and equipment
  • Abnormal access object recognition method and equipment
  • Abnormal access object recognition method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] In the embodiment of the present invention, by obtaining the access records of the candidate objects to be identified for non-sensitive data, and according to the access time recorded in each access record, the change curve of the number of visits of the candidate object is constructed, thereby outputting the corresponding access characteristic parameters. The characteristic parameters can determine the access rules of the candidate object to non-sensitive data, and then import the access characteristic parameters into the preset user type classification model to determine the object type of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of Internet, and provides an abnormal access object recognition method and device. The method comprises the following steps: obtaining an access record of a to-be-identified candidate object with respect to non-sensitive data; wherein the access record comprises access time; based on the access time of each access record, constructing an access frequency change curve of the candidate object, and outputting access characteristic parameters of the candidate object according to the access frequency change curve; importing the access characteristicparameter into a preset user type classification model, and outputting an object type of the candidate object; If the object type of the candidate object is an abnormal access type, identifying the candidate object as an abnormal access object, and stopping responding to the access request of the abnormal access object. According to the method, the access rule of the candidate object to the non-sensitive data is determined by acquiring the access record of the non-sensitive data, so that whether the candidate object is the abnormal access object or not is judged, the anti-interference performance of abnormal access object recognition is improved, and the risk of user information leakage is reduced.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to a method and equipment for identifying abnormal access objects. Background technique [0002] With the electronic conversion of various files into electronic documents, user information can be stored in the cloud server through electronic documents, and the user information can be extracted from the cloud server when the corresponding access request is received. , can perform operations such as information query and identity authentication more conveniently, and improves the efficiency of business processing. However, because the data is stored in the cloud server, it will increase the risk of user information leakage. In particular, criminals can pretend to be normal users, initiate access requests to the cloud server, and steal user information through the business processing results returned by the cloud server, which increases the risk of user information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/62
CPCH04L63/1425H04L63/10G06F21/6245G06F2221/2141
Inventor 李拾萱
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products