Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service behavior safety control method, system and equipment

A technology of security control and behavior, applied in the fields of Internet information security and anti-fraud, it can solve the problems of inability to configure the disposal strategy individually, to obtain restricted data in time, to modify and optimize, etc.

Active Publication Date: 2021-08-20
南京蓝鲸人网络科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the user submission restriction rules of most products on the market are written in the code, which has a single dimension, and the restriction data cannot be obtained in time, and the policy modification and optimization cannot be carried out in time, let alone the personalized configuration of the disposal strategy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service behavior safety control method, system and equipment
  • Service behavior safety control method, system and equipment
  • Service behavior safety control method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and specific embodiments.

[0029] Such as figure 1 As shown, a business behavior security control method disclosed in the embodiment of the present invention mainly includes the following steps:

[0030] S1: Validation of user information. Obtain requesting user information, including user characteristic value data carried in the user request, or characteristic value data and request type, and judge whether it exists in the existing penalty data set, and reject the user's request operation if it exists. In this embodiment, the characteristic value data of the user includes one or more of the user ID, the user's mobile phone number, the user's WeChat ID, the user's device number, and the user's IP address.

[0031] In order to improve the efficiency of user information verification, the user feature value data obtained in this s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service behavior safety control method, system and equipment, and the method comprises the steps: obtaining request user information, converting the request user information into a hash code, judging whether the request user information is in an existing punishment data set or not: if yes, refusing the request of a user; generating a token bucket according to a configured frequency limiting strategy and a unique identifier calculated by a user ID for a request of successful legal verification of the user information; before a user request is processed, acquiring a token from a token bucket, and if the token is obtained, processing the user request; when no token is available in the bucket, rejecting the user request, and recording the request user information. The token bucket is dynamically managed according to the configured strategy and the user information, and the request is limited by controlling the capacity of the bucket and the token issuing rate. Based on the scheme of the invention, all strategy configuration and data can be configured on a visual operating system platform at any time, online, offline and strategy modification can be carried out in time, and the method is convenient, rapid and high in efficiency.

Description

technical field [0001] The invention relates to a business behavior security control method, system and equipment, belonging to the field of Internet information security and anti-cheating. Background technique [0002] At this stage, there are more and more Internet user products, and most of the products are faced with the phenomenon of users submitting operations in batches. There are two reasons. One is that users do not operate according to the rules of the product, and the other is malicious attacks. Regardless of the above-mentioned reasons, it will cause serious safety problems to the product. How to correctly guide the user's operation behavior and prevent malicious mass behavior attacks is very important for the product. At present, most of the user-submitted restriction rules of products on the market are written in the code, which has a single dimension, and cannot obtain restriction data in a timely manner, nor can it modify and optimize policies in a timely ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/33
CPCG06F21/33
Inventor 仇红伟朱逸涛
Owner 南京蓝鲸人网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products