CN112348405A - Method and device for preventing RPA (resilient packet Access) call - Google Patents

Method and device for preventing RPA (resilient packet Access) call Download PDF

Info

Publication number
CN112348405A
CN112348405A CN202011353038.9A CN202011353038A CN112348405A CN 112348405 A CN112348405 A CN 112348405A CN 202011353038 A CN202011353038 A CN 202011353038A CN 112348405 A CN112348405 A CN 112348405A
Authority
CN
China
Prior art keywords
transaction
user
page
operation time
rpa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011353038.9A
Other languages
Chinese (zh)
Inventor
岑昆
张锴
郭韬
陈承启
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202011353038.9A priority Critical patent/CN112348405A/en
Publication of CN112348405A publication Critical patent/CN112348405A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Abstract

The invention provides a method and a device for preventing RPA (resilient packet Access) calling, which can be used in the financial field or other fields. The method comprises the following steps: acquiring historical transaction operation time of different transaction types, carrying out summary statistics, and determining user average operation time corresponding to the different transaction types; acquiring real-time transaction operation time of a user for performing transaction operation, determining a transaction type, comparing the real-time transaction operation time with the average operation time of the user, and listing the user in a suspicious user list if the comparison result is smaller than a preset judgment threshold; and if the user in the suspicious user list initiates a transaction request, returning a transaction page after page adjustment processing to the user. The invention can automatically realize the prevention of the RPA calling of the calling party under the condition of not influencing the manual normal use by adjusting the page elements.

Description

Method and device for preventing RPA (resilient packet Access) call
Technical Field
The invention relates to the technical field of robot process automation, in particular to a method and a device for preventing RPA (resilient packet Access) calling.
Background
Robot Process Automation (RPA) is a software solution which simulates and enhances the interaction Process between a person and a computer and executes a repeatable task based on a certain rule by using intelligent software, thereby improving the Automation efficiency of enterprises and reducing the labor cost and the operation risk. Currently, the RPA technology has been widely applied to various business scenes of banks, and replaces a large amount of human resources. However, in some banking systems providing user services to the outside, if the caller uses the RPA technology, a large number of transactions can be initiated to the relevant banking systems in a short time, which causes operating pressure to the banking systems, and there is also a great potential safety hazard. For the transaction called by the RPA, if a general technical means of transaction current limitation or system delay is adopted, normal user behaviors are easily influenced.
Therefore, how to effectively monitor the transaction initiated by the RPA and then limit the initiation of the transaction is a technical problem to be solved.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a method and a device for preventing RPA (resilient packet access) calling, which can prevent RPA calling of a calling party under the condition of not influencing manual normal use.
In order to achieve the above object, an embodiment of the present invention provides a method for preventing an RPA call, where the method includes:
acquiring historical transaction operation time corresponding to different transaction types, performing summary statistics on the historical transaction operation time, and determining user average operation time corresponding to the different transaction types;
acquiring real-time transaction operation time of a user for performing transaction operation, determining a transaction type of the user for performing transaction operation, comparing the real-time transaction operation time with user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset judgment threshold, listing the user in a suspicious user list;
and if the user in the suspicious user list is known to initiate a transaction request, returning a transaction page after page adjustment processing to the user.
Optionally, in an embodiment of the present invention, the comparing the real-time transaction operation time with the user average operation time corresponding to the transaction type, and obtaining a comparison result includes: and calculating the ratio of the real-time transaction operation time to the user average operation time corresponding to the transaction type, and taking the ratio as a comparison result.
Optionally, in an embodiment of the present invention, the returning the transaction page processed by page adjustment to the user includes: and dynamically adjusting page elements of the transaction page, and returning the transaction page subjected to page adjustment to the user.
Optionally, in an embodiment of the present invention, the dynamically adjusting the page element of the transaction page includes: changing a window name of the trading page, adjusting a page layout of the trading page, and renaming a page object of the trading page.
The embodiment of the invention also provides a device for preventing RPA from calling, which comprises:
the average operation time module is used for acquiring historical transaction operation time corresponding to different transaction types, carrying out summary statistics on the historical transaction operation time and determining user average operation time corresponding to the different transaction types;
the suspicious user name list module is used for acquiring real-time transaction operation time of a user for performing transaction operation, determining a transaction type of the user for performing transaction operation, comparing the real-time transaction operation time with user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset judgment threshold value, listing the user in a suspicious user list;
and the page adjusting module is used for returning the transaction page after page adjustment processing to the user if the user in the suspicious user list is known to initiate a transaction request.
Optionally, in an embodiment of the present invention, the suspicious user name list module is further configured to calculate a ratio between the real-time transaction operation time and an average user operation time corresponding to the transaction type, and use the ratio as a comparison result.
Optionally, in an embodiment of the present invention, the page adjusting module is further configured to perform dynamic adjustment processing on page elements of the transaction page, and return the transaction page after page adjustment processing to the user.
Optionally, in an embodiment of the present invention, the page adjusting module is further configured to change a window name of the transaction page, adjust a page layout of the transaction page, and rename a page object of the transaction page.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention can automatically realize the prevention of the RPA calling of the calling party under the condition of not influencing the manual normal use by adjusting the page elements.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a method for preventing RPA calls according to an embodiment of the present invention;
FIG. 2 is a system diagram of a method for preventing RPA calls according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an apparatus for preventing RPA calls according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method and a device for preventing RPA (resilient packet access) invocation, which can be used in the financial field or other fields.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a method for preventing RPA invocation according to an embodiment of the present invention, where the method includes:
step S1, obtaining historical transaction operation times corresponding to different transaction types, performing summary statistics on the historical transaction operation times, and determining user average operation times corresponding to different transaction types.
The historical user operation time of each transaction is recorded, and the user average operation time of each transaction type is calculated according to the recorded historical user transaction operation time. The recorded and counted average user operating times are shown in table 1.
TABLE 1
Type of transaction Average user operation time (seconds) Threshold value discrimination
Current day detail query 20 20%
Information entry 90 20%
Information approval 35 20%
...... ......
Step S2, obtaining real-time transaction operation time of a user for transaction operation, determining the transaction type of the user for transaction operation, comparing the real-time transaction operation time with the user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset judgment threshold value, listing the user in a suspicious user list.
The real-time transaction operation time of each user is monitored and acquired, the real-time transaction operation time is compared with the average user operation time, and if the real-time transaction operation time of a certain user is obviously shorter than the average user operation time of the transaction type, the user is listed in an RPA suspicious user list. Specifically, if the comparison result is smaller than a preset judgment threshold value, the user is judged to be the RPA suspicious call, and the user is registered as an RPA suspicious user list.
Step S3, if it is known that the user in the suspicious user list initiates a transaction request, returning a transaction page after page adjustment processing to the user.
The method comprises the steps of automatically and dynamically adjusting a returned page on the premise of not changing a function flow for a transaction request initiated by a user in an RPA (remote procedure access) suspicious user list, wherein the dynamic adjustment comprises the steps of changing a window name, adjusting page layout, renaming a page object and the like. Because the RPA can not automatically adapt to the dynamically changed pages, the operation interruption can occur, and the purpose of preventing the RPA from operating is realized. For a real user, the normal use of the function cannot be influenced by a small amount of change of the page.
As an embodiment of the present invention, comparing the real-time transaction operation time with the user average operation time corresponding to the transaction type, and obtaining a comparison result includes: and calculating the ratio of the real-time transaction operation time to the user average operation time corresponding to the transaction type, and taking the ratio as a comparison result.
For example, the user average operation time of the information entry transaction is 90 seconds, while the information entry transaction time of a certain user 0001 is 10 seconds, 10/90 ≈ 11%, and is less than the discrimination threshold value 20%, and then the user 0001 is determined to be the RPA suspicious user.
As an embodiment of the present invention, returning the transaction page after the page adjustment process to the user includes: and dynamically adjusting page elements of the transaction page, and returning the transaction page subjected to page adjustment to the user.
In this embodiment, the dynamically adjusting the page elements of the transaction page includes: changing a window name of the trading page, adjusting a page layout of the trading page, and renaming a page object of the trading page.
The page objects include buttons, input boxes, lists and the like.
In an embodiment of the present invention, as shown in fig. 2, a schematic diagram of a system structure of an application method for preventing RPA calls in an embodiment of the present invention is shown, where the system shown in the diagram includes: a user operation record counting device 1, an RPA call judging device 2 and a page element dynamic adjusting device 3. The system is positioned between a user terminal and a common bank service system, monitors and judges the suspicious RPA user on the premise of not changing the normal use of the service system, influences the normal operation of the RPA on the user terminal through the dynamic adjustment of page elements, and then realizes the purpose of preventing the RPA from being called.
The user operation recording statistical device 1 is used for recording the operation time of each user transaction, namely historical transaction operation time, and calculating the average operation time of the user for each transaction type.
The RPA calling judging device 2 monitors the transaction operation time of the current user and compares the transaction operation time with the average user operation time recorded by the user operation record counting device 1. If the number of the user is less than the judgment threshold value, the user is judged to be the RPA suspicious call, and the user is registered as an RPA suspicious user list.
The page element dynamic adjusting device 3 automatically and dynamically adjusts the returned page elements when the banking system returns a transaction page to the user terminal for a transaction request initiated by a user in the RPA suspicious user list, including changing a window name, adjusting a page layout, renaming a page object, and the like, but the original page function is kept unchanged. Such modifications affect the RPA call processing but do not affect the normal user's service functions.
The invention can automatically realize the prevention of the RPA calling of the calling party under the condition of not influencing the manual normal use by adjusting the page elements.
Fig. 3 is a schematic structural diagram of a device for preventing RPA invocation according to an embodiment of the present invention, where the device includes:
the average operation time module 10 is configured to obtain historical transaction operation times corresponding to different transaction types, perform summary statistics on the historical transaction operation times, and determine user average operation times corresponding to different transaction types.
The historical user operation time of each transaction is recorded, and the user average operation time of each transaction type is calculated according to the recorded historical user transaction operation time.
The suspicious user name list module 20 is configured to obtain real-time transaction operation time of a user performing transaction operation, determine a transaction type of the user performing transaction operation, compare the real-time transaction operation time with user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset discrimination threshold, list the user in a suspicious user list.
The real-time transaction operation time of each user is monitored and acquired, the real-time transaction operation time is compared with the average user operation time, and if the real-time transaction operation time of a certain user is obviously shorter than the average user operation time of the transaction type, the user is listed in an RPA suspicious user list. Specifically, if the comparison result is smaller than a preset judgment threshold value, the user is judged to be the RPA suspicious call, and the user is registered as an RPA suspicious user list.
And the page adjusting module 30 is configured to return a transaction page after the page adjustment processing to the user if it is known that the user in the suspicious user list initiates a transaction request.
The method comprises the steps of automatically and dynamically adjusting a returned page on the premise of not changing a function flow for a transaction request initiated by a user in an RPA (remote procedure access) suspicious user list, wherein the dynamic adjustment comprises the steps of changing a window name, adjusting page layout, renaming a page object and the like. Because the RPA can not automatically adapt to the dynamically changed pages, the operation interruption can occur, and the purpose of preventing the RPA from operating is realized. For a real user, the normal use of the function cannot be influenced by a small amount of change of the page.
As an embodiment of the present invention, the suspicious user name list module is further configured to calculate a ratio between the real-time transaction operation time and the user average operation time corresponding to the transaction type, and use the ratio as a comparison result.
As an embodiment of the present invention, the page adjusting module is further configured to perform dynamic adjustment processing on page elements of the transaction page, and return the transaction page after the page adjustment processing to the user.
In this embodiment, the page adjusting module is further configured to change a window name of the transaction page, adjust a page layout of the transaction page, and rename a page object of the transaction page.
Based on the same application concept as the method for preventing the RPA from being called, the invention also provides the device for preventing the RPA from being called. Because the principle of solving the problem of the device for preventing the RPA call is similar to that of a method for preventing the RPA call, the implementation of the device for preventing the RPA call can refer to the implementation of the method for preventing the RPA call, and repeated details are not repeated.
The invention can automatically realize the prevention of the RPA calling of the calling party under the condition of not influencing the manual normal use by adjusting the page elements.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
As shown in fig. 4, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in fig. 4; furthermore, the electronic device 600 may also comprise components not shown in fig. 4, which may be referred to in the prior art.
As shown in fig. 4, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for preventing RPA calls, the method comprising:
acquiring historical transaction operation time corresponding to different transaction types, performing summary statistics on the historical transaction operation time, and determining user average operation time corresponding to the different transaction types;
acquiring real-time transaction operation time of a user for performing transaction operation, determining a transaction type of the user for performing transaction operation, comparing the real-time transaction operation time with user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset judgment threshold, listing the user in a suspicious user list;
and if the user in the suspicious user list is known to initiate a transaction request, returning a transaction page after page adjustment processing to the user.
2. The method of claim 1, wherein comparing the real-time transaction operation time with the user average operation time corresponding to the transaction type to obtain a comparison result comprises: and calculating the ratio of the real-time transaction operation time to the user average operation time corresponding to the transaction type, and taking the ratio as a comparison result.
3. The method of claim 1, wherein returning the page adjusted transaction page to the user comprises: and dynamically adjusting page elements of the transaction page, and returning the transaction page subjected to page adjustment to the user.
4. The method of claim 3, wherein the dynamically adjusting the page elements of the trading page comprises: changing a window name of the trading page, adjusting a page layout of the trading page, and renaming a page object of the trading page.
5. An apparatus for preventing RPA calls, the apparatus comprising:
the average operation time module is used for acquiring historical transaction operation time corresponding to different transaction types, carrying out summary statistics on the historical transaction operation time and determining user average operation time corresponding to the different transaction types;
the suspicious user name list module is used for acquiring real-time transaction operation time of a user for performing transaction operation, determining a transaction type of the user for performing transaction operation, comparing the real-time transaction operation time with user average operation time corresponding to the transaction type to obtain a comparison result, and if the comparison result is smaller than a preset judgment threshold value, listing the user in a suspicious user list;
and the page adjusting module is used for returning the transaction page after page adjustment processing to the user if the user in the suspicious user list is known to initiate a transaction request.
6. The apparatus according to claim 5, wherein the suspicious user name list module is further configured to calculate a ratio of the real-time transaction operation time to an average user operation time corresponding to the transaction type, and use the ratio as a comparison result.
7. The apparatus of claim 5, wherein the page adjustment module is further configured to perform dynamic adjustment processing on page elements of the transaction page, and return the transaction page after the page adjustment processing to the user.
8. The apparatus of claim 7, wherein the page adjustment module is further configured to change a window name of the trading page, adjust a page layout of the trading page, and rename a page object of the trading page.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 4 when executing the program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 4.
CN202011353038.9A 2020-11-27 2020-11-27 Method and device for preventing RPA (resilient packet Access) call Pending CN112348405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011353038.9A CN112348405A (en) 2020-11-27 2020-11-27 Method and device for preventing RPA (resilient packet Access) call

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011353038.9A CN112348405A (en) 2020-11-27 2020-11-27 Method and device for preventing RPA (resilient packet Access) call

Publications (1)

Publication Number Publication Date
CN112348405A true CN112348405A (en) 2021-02-09

Family

ID=74365027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011353038.9A Pending CN112348405A (en) 2020-11-27 2020-11-27 Method and device for preventing RPA (resilient packet Access) call

Country Status (1)

Country Link
CN (1) CN112348405A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383832A (en) * 2008-10-07 2009-03-11 成都市华为赛门铁克科技有限公司 Challenging black hole attack defense method and device
CN106296203A (en) * 2015-05-12 2017-01-04 阿里巴巴集团控股有限公司 A kind of determination method and apparatus of the user that practises fraud
CN110493190A (en) * 2019-07-15 2019-11-22 平安科技(深圳)有限公司 Processing method, device, computer equipment and the storage medium of data information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383832A (en) * 2008-10-07 2009-03-11 成都市华为赛门铁克科技有限公司 Challenging black hole attack defense method and device
CN106296203A (en) * 2015-05-12 2017-01-04 阿里巴巴集团控股有限公司 A kind of determination method and apparatus of the user that practises fraud
CN110493190A (en) * 2019-07-15 2019-11-22 平安科技(深圳)有限公司 Processing method, device, computer equipment and the storage medium of data information

Similar Documents

Publication Publication Date Title
CN111182390B (en) Volume data processing method and device, computer equipment and storage medium
CN106802864A (en) A kind of method of testing and device based on financial sector
CN113435989A (en) Financial data processing method and device
CN112083988A (en) Screen refresh rate control method, mobile terminal and computer readable storage medium
CN111405129A (en) Intelligent outbound risk monitoring method and device
CN112052391B (en) Data pushing method, device and system
CN106375584A (en) Voice signal control method and device
CN111767558B (en) Data access monitoring method, device and system
CN112348405A (en) Method and device for preventing RPA (resilient packet Access) call
CN106936826A (en) The register method of radio receiver, device and terminal device
US20210074296A1 (en) Transcription generation technique selection
CN111262794B (en) Gateway flow control method and device
CN112634925B (en) Audio debugging method and device and computer equipment
CN111951011B (en) Monitoring system threshold value determining method and device
CN113434423A (en) Interface test method and device
CN111355919B (en) Communication session control method and device
CN114938353B (en) Asynchronous notification current limiting method and system based on stream computing
CN112101915A (en) Financial service management and control data processing method and device
CN110995641A (en) Harassment information identification method, harassment information identification device, electronic equipment and medium
CN111447331A (en) Voice portal session management system and method
CN113342501B (en) System fault processing method and device
CN112991049B (en) Loan information processing method and electronic equipment
CN112767123B (en) Credit card issuing risk identification method and device
CN115495559A (en) Data processing method and device, electronic equipment and storage medium
CN113190338A (en) Method, device and system for processing service data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination