Unlock instant, AI-driven research and patent intelligence for your innovation.

Access data verification method and device, equipment and storage medium

A technology for accessing data and verifying methods, applied in the computer field, can solve the problems of triggering dangerous events, the network access control model cannot meet the requirements of identity authentication and data security, etc., to achieve the effect of improving the efficiency of verification

Active Publication Date: 2021-05-28
上海派拉软件股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under this general trend, the traditional network topology is divided into internal network and external network based on firewalls or devices similar to firewalls such as springboards and gateways. By default, the internal network is safe and the external network is threatening; With the passage of time and the complexity of the business, we gradually discovered that this network access control model based on the isolation of internal and external networks cannot meet today's identity authentication requirements and data security requirements. The most important point is, "The default internal network is secure "This assumption is too "extreme", and there are obvious loopholes. For example, if an attacker sends an email with attack information to an intranet device, it may trigger a dangerous event; or, if a high-risk device is connected to the intranet After that, in principle, there is still a certain risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access data verification method and device, equipment and storage medium
  • Access data verification method and device, equipment and storage medium
  • Access data verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 It is a flow chart of a method for verifying access data provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of verifying the data of a user accessing a system or a web page, and the method can be executed by a verification device for accessing data. The device can be composed of hardware and / or software, and generally can be integrated into a device with a verification function for accessing data, and the device can be an electronic device such as a server or a server cluster. Such as figure 1 As shown, the method specifically includes the following steps:

[0025] Step 110, creating an initial decision tree model based on the access data samples.

[0026] Wherein, the access data may include multi-dimensional access information and risk labels. Multi-dimensional access information can be login account, login time, login location, and login device model, etc.; the risk label can be a preset risk level, for example, l...

Embodiment 2

[0050] figure 2 It is a schematic structural diagram of a verification device for accessing data provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the device includes:

[0051] An initial decision tree model creation module 210, configured to create an initial decision tree model based on the access data sample;

[0052] The target decision tree acquisition module 220 is used for pruning the initial decision tree model according to the access data samples to obtain the target decision tree model;

[0053] A risk category acquisition module 230, configured to input the access data to be verified into the target decision tree model, and obtain the risk category of the access data to be verified;

[0054] The verification result determination module 240 is configured to verify the risk category and the access data to be verified according to the set rules, and obtain the verification result.

[0055] Optionally, the access data includes multi-dim...

Embodiment 3

[0081] image 3 It is a schematic structural diagram of a computer device provided by Embodiment 3 of the present invention. image 3 A block diagram of a computer device 312 suitable for implementing embodiments of the invention is shown. image 3 The computer device 312 shown is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present invention. Device 312 is typically a computing device that accesses authentication functions of data.

[0082] Such as image 3 As shown, computer device 312 takes the form of a general-purpose computing device. Components of computer device 312 may include, but are not limited to: one or more processors 316, storage device 328, bus 318 connecting various system components (including storage device 328 and processor 316).

[0083] Bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated gra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access data verification method and device, equipment and a storage medium. The method comprises the steps of creating an initial decision tree model based on access data samples; pruning the initial decision tree model according to the access data sample to obtain a target decision tree model; inputting to-be-verified access data into the target decision tree model to obtain a risk category of the to-be-verified access data; and verifying the risk category and the to-be-verified access data according to a set rule to obtain a verification result. According to the access data verification method provided by the embodiment of the invention, the to-be-verified access data is input into the established decision tree model, the risk category of the to-be-verified data is obtained, verification of multi-factor access data can be realized, and verification efficiency is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular, to a verification method, device, device and storage medium for accessing data. Background technique [0002] In recent years, the field of unified identity authentication has received more and more attention from all walks of life, and people's awareness of data security, account security, and identity information security has become stronger and stronger. Under this general trend, the traditional network topology is divided into internal network and external network based on firewalls or devices similar to firewalls such as springboards and gateways. By default, the internal network is safe and the external network is threatening; With the passage of time and the complexity of the business, we gradually discovered that this network access control model based on the isolation of internal and external networks cannot meet today's identity authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06N3/04G06N3/08
CPCG06F21/31G06N3/04G06N3/082
Inventor 王军张毅骏谭翔
Owner 上海派拉软件股份有限公司