Protection method, device, system and computer equipment for service request

A business request and operating system technology, applied in transmission systems, electrical components, etc., can solve problems such as manslaughter

Active Publication Date: 2020-10-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional business request protection method has a serious problem of manslaughter in APP, API and other business scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method, device, system and computer equipment for service request
  • Protection method, device, system and computer equipment for service request
  • Protection method, device, system and computer equipment for service request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0045] The service request protection method, device, system, computer equipment, and storage medium provided by the embodiments of the present invention can be realized through related technologies of cloud security. Among them, cloud security (Cloud Security) refers to the general term for security software, hardware, users, institutions, and security cloud platforms based on cloud computing business model applications. Cloud security integrates emerging technologies and concepts such as parallel processing, grid computing, and judgment of unknown virus behavior. Through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a service request protection method, device, system and computer equipment. The method includes: acquiring the service request to be protected, extracting the request system fingerprint feature carried in the service request to be protected; based on the corresponding relationship between the system fingerprint feature and the operating system type in the operating system fingerprint library, determining the request operation corresponding to the request system fingerprint feature System type; obtain the reference operating system type, and obtain the operating system type of the request to be filtered based on the matching between the requested operating system type and the reference operating system type; filter the service request corresponding to the operating system type of the request to be filtered from the service requests to be protected . The above solution does not require APP, API, etc. to return messages, and has good compatibility in scenarios such as APP, API, and website, and can effectively reduce accidental killing of business requests.

Description

technical field [0001] The present application relates to the technical field of network protection, in particular to a method, device, system, computer equipment and storage medium for protecting service requests. Background technique [0002] DDoS attack (Distributed Denial of Service attack, distributed denial of service attack) is an attack method in which hackers send a large number of malicious requests to the destination server by controlling botnets distributed throughout the Internet, causing the server to fail to respond to normal business requests, resulting in a denial of service attack . With the rapid development of the Internet, the threat of DDoS attacks has become more and more serious, and it has become a major problem that seriously threatens the stable development of the Internet. [0003] For existing DDoS algorithms such as reverse challenge (such as JS challenge) algorithm and man-machine verification (such as image verification) algorithm, they can o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/1458
Inventor 陈国彭晨晨
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products