Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A business behavior security control method, system and device

A technology of security control and behavior, applied in the field of Internet information security and anti-cheating, can solve problems such as modification and optimization, single dimension, and inability to implement strategies in time, and achieve the effects of monitoring data fluctuations, reducing accidental injury rates, and optimizing strategies

Active Publication Date: 2022-03-08
南京蓝鲸人网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the user submission restriction rules of most products on the market are written in the code, which has a single dimension, and the restriction data cannot be obtained in time, and the policy modification and optimization cannot be carried out in time, let alone the personalized configuration of the disposal strategy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A business behavior security control method, system and device
  • A business behavior security control method, system and device
  • A business behavior security control method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and specific embodiments.

[0029] like figure 1 As shown, a business behavior security control method disclosed in the embodiment of the present invention mainly includes the following steps:

[0030] S1: Validation of user information. Obtain requesting user information, including user characteristic value data carried in the user request, or characteristic value data and request type, and judge whether it exists in the existing penalty data set, and reject the user's request operation if it exists. In this embodiment, the characteristic value data of the user includes one or more of the user ID, the user mobile phone number, the user WeChat ID, the user device number, and the user IP address.

[0031] In order to improve the efficiency of user information verification, the user feature value data obtained in this step is conv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a business behavior security control method, system and equipment. The invention first acquires requesting user information, converts it into a hash code, and judges whether it is in the existing penalty data set, and rejects the user's request if it exists; for If the user information legal verification is successful, a token bucket is generated according to the configured frequency limit policy and the unique identifier calculated by the user ID; before the user request is processed, a token is first obtained from the token bucket. Tokens process user requests; when there is no token available in the bucket, the user request is rejected and the requesting user information is recorded. The invention dynamically manages the token bucket according to the configured policy and user information, and limits the request by controlling the capacity of the bucket and the rate of issuing tokens. Based on the solution of the present invention, all strategy configurations and data can be configured on the visual operating system platform at any time, and strategies can be online, offline and modified in time, which is convenient, fast and efficient.

Description

technical field [0001] The invention relates to a business behavior security control method, system and equipment, belonging to the field of Internet information security and anti-cheating. Background technique [0002] At this stage, there are more and more Internet user products, and most of the products are faced with the phenomenon of users submitting operations in batches. There are two reasons. One is that users do not operate according to the rules of the product, and the other is malicious attacks. Regardless of the above-mentioned reasons, it will cause serious safety problems to the product. How to correctly guide the user's operation behavior and prevent malicious mass behavior attacks is very important for the product. At present, most of the user-submitted restriction rules of products on the market are written in the code, which has a single dimension, and cannot obtain restriction data in a timely manner, nor can it modify and optimize policies in a timely ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33
CPCG06F21/33
Inventor 仇红伟朱逸涛
Owner 南京蓝鲸人网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products