CN106101059A - A kind of web-page requests processing method and processing device - Google Patents

A kind of web-page requests processing method and processing device Download PDF

Info

Publication number
CN106101059A
CN106101059A CN201610344363.6A CN201610344363A CN106101059A CN 106101059 A CN106101059 A CN 106101059A CN 201610344363 A CN201610344363 A CN 201610344363A CN 106101059 A CN106101059 A CN 106101059A
Authority
CN
China
Prior art keywords
lock
cycle
request number
request
webpage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610344363.6A
Other languages
Chinese (zh)
Other versions
CN106101059B (en
Inventor
李传松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weimeng Chuangke Network Technology China Co Ltd
Original Assignee
Weimeng Chuangke Network Technology China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weimeng Chuangke Network Technology China Co Ltd filed Critical Weimeng Chuangke Network Technology China Co Ltd
Priority to CN201610344363.6A priority Critical patent/CN106101059B/en
Publication of CN106101059A publication Critical patent/CN106101059A/en
Application granted granted Critical
Publication of CN106101059B publication Critical patent/CN106101059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The embodiment of the present invention provides a kind of web-page requests processing method and processing device, described method includes: when receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and lock-up cycle, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user;And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the lock-up cycle getting not to when corresponding resetting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle extends based on the increase of request number of times.Technique scheme has the advantages that and can intercept web page attacks request, makes locking time and locking upper limit number of times not to be detected out simultaneously.

Description

A kind of web-page requests processing method and processing device
Technical field
The present invention relates to networking technology area, particularly relate to a kind of web-page requests processing method and processing device.
Background technology
User web (webpage) request is all based on greatly cookie, and (some website is in order to distinguish user identity, carry out Session follows the tracks of and the data (generally going through encryption) that are stored on user local terminal), the stepping on of session (session control) The authority of record checking identity judges and responds the request of service, and this is the general principle that web user identity logs in.
The solution of prior art: according to request UID (User Identification, user identity proves) or IP (Internet Protocol, the agreement of interconnection between network) is arranged on the request number of times upper limit in a period of time.If request After number of times exceedes the number of times of setting, return refusal service, to reach to close down rubbish request.
In realizing process of the present invention, inventor finds that in prior art, at least there are the following problems: in existing solution In scheme, certain restriction can be had to reduce the effect of rubbish request rubbish request.Can be to general automatic request Program closes down effect, but some senior requestors can detect locking time and the locking upper limit number of times of setting, this Result in and close down inefficacy to what spam page was asked.
Content of the invention
The embodiment of the present invention provides a kind of web-page requests processing method and processing device, to intercept web page attacks request, makes simultaneously Locking time and locking upper limit number of times can not be detected out.
On the one hand, embodiments providing a kind of web-page requests processing method, described method includes:
When receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and lock The request number of times to this webpage for the described network user getting, if lock-up cycle is not out of date, is added 1 by fixed cycle;
If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user; And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the locking week getting The corresponding lock-up cycle of current request number of times, wherein, lock-up cycle in described corresponding relation is reset when phase is not to correspondence Extend based on the increase of request number of times
On the other hand, embodiments providing a kind of web-page requests processing means, described device includes:
Acquiring unit, during for receiving the network user to the request of webpage, obtains the described network user to this webpage Request number of times and lock-up cycle;
Determining unit, if not out of date for lock-up cycle, by the described network user that the gets request to this webpage Number of times adds 1;
Lock cell, if for current request number of times more than or equal to locking upper limit threshold, then intercepting the described network user Request to webpage;
Setup unit, after intercepting the described network user request to webpage at described lock cell, according to presetting The corresponding relation of request number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not to when corresponding Resetting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request time Number increase and extend.
Technique scheme has the advantages that and can intercept web page attacks request, makes locking time and lock simultaneously Determine upper limit number of times can not be detected out, and on the basis of being defined as malicious requests, constantly extend unblock with the number of times of request Time so that it is can not utilize automatic requestor send malicious requests.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the accompanying drawing of required use is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, all right Obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of web-page requests process flow figure of the embodiment of the present invention;
Fig. 2 is a kind of web-page requests processing means structural representation of the embodiment of the present invention;
Fig. 3 is application example web-page requests process flow figure of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work Embodiment, broadly falls into the scope of protection of the invention.
As it is shown in figure 1, be a kind of web-page requests process flow figure of the embodiment of the present invention, described method includes:
When the 101st, receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage with And lock-up cycle, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;
If 102 current request number of times are more than or equal to locking upper limit threshold, then intercept the described network user and webpage is asked Ask;And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the lock getting Reset current request number of times corresponding lock-up cycle when fixed cycle is not to correspondence, wherein, described corresponding relation locks Cycle extends based on the increase of request number of times.
Preferably, if locking time is expired, then the request number of times to this webpage for the described network user is initialized, and initially Change lock-up cycle.
Preferably, if current request number of times is less than described locking upper limit threshold, then allow the described network user to webpage Request.
Preferably, in described corresponding relation, each lock-up cycle and a request number of times interval are corresponding, lock-up cycle Extend based on the interval change shape in gradient of request number of times.
Preferably, in described corresponding relation, request number of times length of an interval degree is fixed value.
Corresponding to said method embodiment, as in figure 2 it is shown, be a kind of web-page requests processing means structure of the embodiment of the present invention Schematic diagram, described device includes:
Acquiring unit 21, during for receiving the network user to the request of webpage, obtains the described network user to this webpage Request number of times and lock-up cycle;
If this webpage, not out of date for lock-up cycle, is asked by determining unit 22 by the described network user getting Number of times is asked to add 1;
Lock cell 23, if for current request number of times more than or equal to locking upper limit threshold, then intercepts described network and uses The request to webpage for the family;
Setup unit 24, after intercepting the request to webpage for the described network user at described lock cell, according in advance If the corresponding relation of request number of times and lock-up cycle, it is not corresponding with the lock-up cycle getting to confirm current request number of times When, reset the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request The increase of number of times and extend.
Preferably, can also include: initialization unit 25, if expired for locking time, then initialize described network The request number of times to this webpage for the user, and initialize lock-up cycle.
Preferably, described lock cell 23, if being further used for current request number of times to lock upper limit threshold less than described, Then allow the request to webpage for the described network user.
Preferably, in described corresponding relation, each lock-up cycle and a request number of times interval are corresponding, lock-up cycle Extend based on the interval change shape in gradient of request number of times.
Preferably, in described corresponding relation, request number of times length of an interval degree is fixed value.
As it is shown on figure 3, be application example web-page requests process flow figure of the present invention, described method includes:
301st, obtain ID (UID) or the IP of the network user initiating web-page requests, and obtain the described network user couple Request number of times Qnum of this webpage and lock-up cycle expire;
302nd, judge that whether lock-up cycle expire is expired, whether expired according to lock-up cycle expire, to this webpage Request number of times Qnum performs different disposal: if lock-up cycle expire is expired, then turns 303, otherwise turns 304;
303rd, Qnum++ after Qnum being reset, and initialize lock-up cycle expire, turn 305;
304th, request number of times Qnum to this webpage for the network user getting is added 1, i.e. Qnum++, turn 305;
305th, judge whether current Qnum reaches to lock upper limit threshold qw, if it is, perform lock operation i.e. turn 306, Otherwise, return normal operating and i.e. turn 309;
306th, judge whether to need to extend lock-up cycle expire according to current Qnum: if it is, turn 307, otherwise, Turn 308;
307th, lock-up cycle expire is extended, i.e. the corresponding relation according to the request number of times preset and lock-up cycle, again Set the corresponding lock-up cycle expire of current Qnum, calculate lock-up cycle expire=expire+ correspondence and change to district Between the prolongation time, turn 308;
308th, the request to this webpage for this network user is intercepted.
309th, normal flow.
Illustrate:
Locking upper limit threshold values qw is 10;
The interval q0 (0~10) of request number of times, corresponding lock-up cycle is 5 minutes;
The interval q1 (10~20) of request number of times, corresponding lock-up cycle extends 5 minutes on current basal;
The interval q2 (20~30) of request number of times, corresponding lock-up cycle extends 10 minutes on current basal.
Initializing lock-up cycle is that 5 minutes i.e. current time counts after+5 minutes again;
When request number of times Qnum is changed to q1 by q0, lock-up cycle extends 5 minutes on current basal;
When request number of times Qnum is changed to q2 by q1, lock-up cycle extends 10 minutes on current basal;
If it is determined that lock-up cycle is out of date, counting, lock-up cycle are initialized as 5 minutes again.
The above, for the change shape in gradient attacking user's lock-out state, the number of times that user asks at short notice How corresponding more lock-up cycle be also longer.
The embodiment of the present invention mainly provides and a kind of gradient can can dynamically lock malicious requests according to custom rule Solution, in conjunction with the advantage of current scheme, abandons corresponding shortcoming, and advantage is as follows: 1. intercept malicious requests, reduce Service Source Waste with take.2. locking threshold values, interval range, prolongation time are can be self-defining, so can spirit according to scene Strategy is closed down in definition of living, and makes that malicious requests is irregular to be followed.3. according to the bigger time that it is punished for malicious requests frequency Longer;4., if not initiating request again at penalty period, change over time, lock-out state Spontaneous release is avoided locking for a long time Fixed.
The particular order of the step during disclosed in should be understood that or level are the examples of illustrative methods.Based on setting Meter preference, it should be appreciated that during the particular order of step or level can be in the feelings of the protection domain without departing from the disclosure Rearranged under condition.Appended claim to a method gives the key element of various step with exemplary order, and not It is intended to be limited to described particular order or level.
In above-mentioned detailed description, various features combine together in single embodiment, to simplify the disclosure.No This open method should be construed to reflect such intention, i.e. the embodiment of theme required for protection needs ratio The more feature of feature clearly stated in each claim.On the contrary, as appending claims reflects Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appending claims Being hereby expressly incorporated in detailed description, wherein each claim is alone as the single preferred embodiment of the present invention.
For making any technical staff in this area be capable of or use the present invention, above disclosed embodiment is entered Go description.To those skilled in the art;The various modification modes of these embodiments will be apparent from, and this The General Principle of literary composition definition also can be applicable to other embodiments on the basis of without departing from the spirit and scope of the disclosure. Therefore, the disclosure is not limited to embodiments set forth herein, but the widest with principle disclosed in the present application and novel features Scope is consistent.
Described above includes the citing of one or more embodiment.Certainly, in order to above-described embodiment is described and description portion The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each is implemented Example can do further combinations and permutations.Therefore, embodiment described herein is intended to fall into appended claims Protection domain in all such changes, modifications and variations.Additionally, with regard to the term using in specification or claims "comprising", the mode that covers of this word is similar to term and " includes ", is used as link word just as " including, " in the claims and is solved As releasing.Additionally, use any one the term "or" in the specification of claims to be intended to represent " non-exclusionism Or ".
Those skilled in the art are it will also be appreciated that the various illustrative components, blocks listed of the embodiment of the present invention (illustrative logical block), unit, and step can pass through electronic hardware, computer software, or both knot Conjunction realizes.For clearly showing that the replaceability (interchangeability) of hardware and software, above-mentioned various explanations Property parts (illustrative components), unit and step have universally described their function.Such work( Can be to realize depending on specifically applying the design with whole system to require by hardware or software.Those skilled in the art Can be for every kind of specific application, it is possible to use various methods realize described function, but this realization is understood not to Scope beyond embodiment of the present invention protection.
Various illustrative logical block described in the embodiment of the present invention, or unit can pass through general processor, Digital signal processor, special IC (ASIC), field programmable gate array or other programmable logic devices, discrete gate Or transistor logic, discrete hardware components, or the design of any of the above described combination realize or operate described function.General place Reason device can be microprocessor, and alternatively, this general processor also can be any traditional processor, controller, microcontroller Device or state machine.Processor also can be realized by the combination of computing device, such as digital signal processor and microprocessor, Multi-microprocessor, one or more microprocessors combine a Digital Signal Processor Core, or any other like configuration Realize.
The step of the method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor perform soft Part module or the combination of both.Software module can be stored in RAM memory, flash memory, ROM memory, EPROM storage Other any form of storage media in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this area In.Exemplarily, store medium to be connected with processor, so that processor can read information from storage medium, and Write information can be deposited to storage medium.Alternatively, store medium can also be integrated in processor.Processor and storage medium can To be arranged in ASIC, ASIC can be arranged in user terminal.Alternatively, processor and storage medium also can be arranged at use In different parts in the terminal of family.
In one or more exemplary designs, the above-mentioned functions described by the embodiment of the present invention can be at hardware, soft Any combination of part, firmware or this three realizes.If realized in software, these functions can store and computer-readable It on medium, or is transmitted on the medium of computer-readable with one or more instructions or code form.Computer readable medium includes electricity Brain storage medium and being easy to so that allow computer program transfer to the telecommunication media in other places from place.Storage medium is permissible It is that any general or special computer can be with the useable medium of access.For example, such computer readable media can include but It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage devices, or other What may be used for carrying or storage with instruct or data structure and other can be by general or special computer or general or specially treated Device reads the medium of the program code of form.Additionally, any connection can be properly termed computer readable medium, example As if software is by a coaxial cable, fiber optic cables, double from web-site, server or other remote resources Twisted wire, Digital Subscriber Line (DSL) or with the wireless way for transmittings such as example infrared, wireless and microwave be also contained in defined In computer readable medium.Described video disc (disk) and disk (disc) include Zip disk, radium-shine dish, CD, DVD, floppy disk And Blu-ray Disc, disk is generally with magnetic duplication data, and video disc generally carries out optical reproduction data with laser.Combinations of the above Also may be embodied in computer readable medium.
Above-described detailed description of the invention, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further Describe in detail, be it should be understood that the detailed description of the invention that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, all within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. done, all should comprise Within protection scope of the present invention.

Claims (10)

1. a web-page requests processing method, it is characterised in that described method includes:
When receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and locking week Phase, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;
If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user;And According to the corresponding relation of default request number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not Reset current request number of times corresponding lock-up cycle during to correspondence, wherein, in described corresponding relation lock-up cycle based on The increase of request number of times and extend.
2. web-page requests processing method as claimed in claim 1, it is characterised in that if locking time is expired, then initialize institute State the request number of times to this webpage for the network user, and initialize lock-up cycle.
3. web-page requests processing method as claimed in claim 2, it is characterised in that if current request number of times is less than described locking Upper limit threshold, then allow the request to webpage for the described network user.
4. web-page requests processing method as described in claim the 1st, 2 or 3, it is characterised in that in described corresponding relation, each lock Fixed cycle and a request number of times interval are corresponding, and lock-up cycle extends based on the interval change shape in gradient of request number of times.
5. web-page requests processing method as claimed in claim 4, it is characterised in that in described corresponding relation, request number of times is interval A length of fixed value.
6. a web-page requests processing means, it is characterised in that described device includes:
Acquiring unit, during for receiving the network user to the request of webpage, obtains the request to this webpage for the described network user Number of times and lock-up cycle;
Determining unit, if not out of date for lock-up cycle, by the described network user that the gets request number of times to this webpage Add 1;
Lock cell, if for current request number of times more than or equal to locking upper limit threshold, then intercepting the described network user to net The request of page;
Setup unit, after intercepting the request to webpage for the described network user at described lock cell, please according to default Seek the corresponding relation of number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not to when corresponding again Setting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request number of times Increase and extend.
7. web-page requests processing means as claimed in claim 6, it is characterised in that also include:
Initialization unit, if expired for locking time, then initializes the request number of times to this webpage for the described network user, and Initialize lock-up cycle.
8. web-page requests processing means as claimed in claim 7, it is characterised in that
Described lock cell, if being further used for current request number of times to lock upper limit threshold less than described, then allows described net The request to webpage for the network user.
9. web-page requests processing means as described in claim the 6th, 7 or 8, it is characterised in that in described corresponding relation, each lock Fixed cycle and a request number of times interval are corresponding, and lock-up cycle extends based on the interval change shape in gradient of request number of times.
10. web-page requests processing means as claimed in claim 9, it is characterised in that in described corresponding relation, request number of times is interval A length of fixed value.
CN201610344363.6A 2016-05-23 2016-05-23 A kind of web-page requests processing method and processing device Active CN106101059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610344363.6A CN106101059B (en) 2016-05-23 2016-05-23 A kind of web-page requests processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610344363.6A CN106101059B (en) 2016-05-23 2016-05-23 A kind of web-page requests processing method and processing device

Publications (2)

Publication Number Publication Date
CN106101059A true CN106101059A (en) 2016-11-09
CN106101059B CN106101059B (en) 2019-05-17

Family

ID=57229350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610344363.6A Active CN106101059B (en) 2016-05-23 2016-05-23 A kind of web-page requests processing method and processing device

Country Status (1)

Country Link
CN (1) CN106101059B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487919A (en) * 2016-11-10 2017-03-08 新浪网技术(中国)有限公司 HTTP request processing method based on PaaS platform, apparatus and system
CN113852663A (en) * 2021-08-18 2021-12-28 北京达佳互联信息技术有限公司 Network request processing method and device and network request processing system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827080A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method for blocking network attacks and device
CN102769549A (en) * 2011-05-05 2012-11-07 腾讯科技(深圳)有限公司 Network security monitoring method and device
CN103957195A (en) * 2014-04-04 2014-07-30 上海聚流软件科技有限公司 DNS system and defense method and device for DNS attack
US20140230061A1 (en) * 2013-02-08 2014-08-14 PhishMe, Inc. Collaborative phishing attack detection
CN104023024A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 Network defense method and device
CN104243408A (en) * 2013-06-14 2014-12-24 中国移动通信集团公司 Method, device and system for monitoring messages in domain name resolution service DNS system
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN105491054A (en) * 2015-12-22 2016-04-13 网易(杭州)网络有限公司 Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827080A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method for blocking network attacks and device
CN102769549A (en) * 2011-05-05 2012-11-07 腾讯科技(深圳)有限公司 Network security monitoring method and device
US20140230061A1 (en) * 2013-02-08 2014-08-14 PhishMe, Inc. Collaborative phishing attack detection
CN104243408A (en) * 2013-06-14 2014-12-24 中国移动通信集团公司 Method, device and system for monitoring messages in domain name resolution service DNS system
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN103957195A (en) * 2014-04-04 2014-07-30 上海聚流软件科技有限公司 DNS system and defense method and device for DNS attack
CN104023024A (en) * 2014-06-13 2014-09-03 中国民航信息网络股份有限公司 Network defense method and device
CN105491054A (en) * 2015-12-22 2016-04-13 网易(杭州)网络有限公司 Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487919A (en) * 2016-11-10 2017-03-08 新浪网技术(中国)有限公司 HTTP request processing method based on PaaS platform, apparatus and system
CN106487919B (en) * 2016-11-10 2019-07-05 新浪网技术(中国)有限公司 HTTP request processing method based on PaaS platform, apparatus and system
CN113852663A (en) * 2021-08-18 2021-12-28 北京达佳互联信息技术有限公司 Network request processing method and device and network request processing system

Also Published As

Publication number Publication date
CN106101059B (en) 2019-05-17

Similar Documents

Publication Publication Date Title
CN103679884B (en) The Internet gate inhibition casual user's authorization device and method
US10325428B1 (en) Access control using device location tracking and blockchains
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN106599721A (en) Cache-based data access method and apparatus
US20150381613A1 (en) Smartcard based multifactor banking authentication
US9165136B1 (en) Supervising execution of untrusted code
CN107743118B (en) Hierarchical network security protection method and device
CN103139058A (en) Internet of things security access gateway
CN106027520B (en) A kind of detection processing steals the method and device of website account number
WO2020156135A1 (en) Method and device for processing access control policy and computer-readable storage medium
JP2017513274A (en) System and method for providing secure access to local network devices
CN110009776B (en) Identity authentication method and device
CN102158492B (en) Web authentication method, device and network equipment
CN107295017A (en) CC means of defences based on user authentication
CN113114632B (en) Can peg graft formula intelligence financial auditing platform
CN104735062B (en) A kind of network user register method and server
CN104601602B (en) A kind of terminal device network security enhancing access and authentication method
CN109743294A (en) Interface access control method, device, computer equipment and storage medium
CN102739638A (en) Establishing privileges through claims of valuable assets
CN106101059A (en) A kind of web-page requests processing method and processing device
WO2009118994A1 (en) Information processing limitation system and information processing limitation device
CN110138747A (en) A kind of method and system for verifying account logging state
CN110324319A (en) A kind of network data security management-control method based on one-way transmission
US20240089263A1 (en) Access control using task manager
CN113965395A (en) Method, system and device for safely accessing intranet in real time

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant