Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method and device and server

A verification method and verification scheme technology, applied in the field of network security, can solve problems such as no solution proposed, poor accuracy, cumbersome operation process, etc., to reduce the impact of user experience, improve recognition accuracy, and protect network security.

Pending Publication Date: 2022-07-29
BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on the existing verification method, when it is implemented, it will often cause obvious interference to the normal operation of the user, making the operation process relatively cumbersome and the user experience relatively poor during the normal operation of the user; and based on the existing verification method in identifying Errors are also prone to occur during abnormal access requests, and the accuracy is poor
[0004] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device and server
  • Verification method and device and server
  • Verification method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the accompanying drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present specification, but not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this specification.

[0051] see figure 1As shown, the embodiment of this specification provides a verification method, wherein the method is specifically applied to the server side. During specific implementation, the method may include the following contents.

[0052] S101: Receive a data processing request initiated by a terminal device; wherein, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method, a verification device and a server applied to the technical field of network security. Based on the method, after a server receives a data processing request carrying a device identifier of a terminal device, behavior characteristics of the terminal device can be obtained according to the device identifier; performing first verification on the terminal equipment according to the behavior characteristics of the terminal equipment to obtain a corresponding first verification result; according to the first verification result, whether second verification is carried out on the terminal equipment is determined; under the condition that the first verification result is determined to be undetermined, performing second verification on the terminal equipment; and when it is determined that the first verification or the second verification is not passed, the data processing request is intercepted in time. Therefore, the verification operation during normal access of the user can be simplified, meanwhile, the risk data processing request generated through abnormal operation such as machine scripts can be accurately recognized and intercepted in time, and the network security of the system is effectively protected.

Description

technical field [0001] This specification belongs to the technical field of network security, and in particular, relates to a verification method, device and server. Background technique [0002] In the field of network security technology, business systems (or related websites) often face a large number of malicious accesses generated by abnormal operations such as machine scripts. The above malicious access often poses a threat to the network security of the business system. Therefore, it is necessary to verify the access request received by the business system to distinguish whether the access request is generated by a normal user's normal access operation or generated by a non-user's abnormal access operation; Abnormal access requests generated by abnormal access operations are intercepted in time. [0003] Based on the existing verification methods, when implemented, it often causes obvious interference to the normal operation of the user, making the operation process...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/1416
Inventor 樊璐申远远刘娟杜冰玉
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products