False request identification method and device, equipment and storage medium

An identification method and a technology for identifying equipment, which are applied in the field of big data, can solve problems such as high load on the network and servers, difficulty in normal operation, etc., and achieve the effect of reducing excessive load, improving the success rate of interception, and ensuring normal operation

Pending Publication Date: 2022-03-18
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a false request identification method, device, equipment and storage medium, which are used to solve the technical problem that the request for brushing data brings excessive load to the network and server, making it difficult to operate normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • False request identification method and device, equipment and storage medium
  • False request identification method and device, equipment and storage medium
  • False request identification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and do not necessarily use Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the term "comprising" or "having" and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to those explicitly listed instead, may include other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

[0027] The embodiments of the present application may acquire and process relevant data based on a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of big data, and discloses a false request identification method and device, equipment and a storage medium, which are used for identifying the behavior of refreshing data by modifying a small amount of request information, improving the interception success rate of a data refreshing request and reducing the overhigh load of the data refreshing request to a network and a server. The method comprises the following steps: receiving a data request, and obtaining request information of the data request; the request information comprises a plurality of data factors and a factor value of each data factor; determining a specified factor from the plurality of data factors, and obtaining a factor value of the specified factor; counting the request quantity of the data requests with the same factor values of the specified factors in the specified time period; the specified factors are partial data factors in the plurality of data factors; and if the request quantity is higher than a preset request quantity threshold value, determining that the data request is a false request. In addition, the invention also relates to a block chain technology, and the specified factor and the factor value can be stored in the block chain.

Description

technical field [0001] The present invention relates to the field of big data, in particular to a false request identification method, device, equipment and storage medium. Background technique [0002] During the operation of the system, the behavior of brushing data often occurs. The security components in the system intercept frequent data swiping by counting the frequency of requests carrying the same information. In this way, it is difficult to identify the cheating mode of brushing data by modifying a small amount of information, so it is impossible to intercept such data brushing requests, which will cause excessive load on the network and server, making it difficult to operate normally . Contents of the invention [0003] The invention provides a false request identification method, device, equipment and storage medium, which are used to solve the technical problem that the data brush request brings too high load to the network and server, making it difficult to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/63
CPCH04L63/1458
Inventor 李年馨杜连秋
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products