SG11201803636RA - Service processing method and apparatus - Google Patents

Service processing method and apparatus

Info

Publication number
SG11201803636RA
SG11201803636RA SG11201803636RA SG11201803636RA SG11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA
Authority
SG
Singapore
Prior art keywords
risk identification
identification
fast
service processing
risk
Prior art date
Application number
SG11201803636RA
Inventor
Tao Shen
Xin Lei
Hongfa Sun
Hai Huang
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=58661635&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=SG11201803636R(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11201803636RA publication Critical patent/SG11201803636RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Abstract

The present application relates to the field of Internet technologies, and in particular, to a service processing method and apparatus, to reduce system consumption, improve identification performance. The service processing method provided in embodiments of 5 the present application includes: performing fast risk identification on the service processing request based on an identification algorithm of a fast risk identification layer; after the fast risk identification is performed, if it cannot determined the processing is risky, performing risk on service request 10 based an algorithm a risk ion where a data volume used for the deep risk identification is greater than a data volume used for the fast risk identification, and duration of the deep risk identification is greater than duration of the fast risk identification; and the processing based a of the 15 deep risk identification.
SG11201803636RA 2015-11-02 2016-10-24 Service processing method and apparatus SG11201803636RA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510732329.1A CN106656932B (en) 2015-11-02 2015-11-02 Service processing method and device
PCT/CN2016/103012 WO2017076176A1 (en) 2015-11-02 2016-10-24 Service processing method and apparatus

Publications (1)

Publication Number Publication Date
SG11201803636RA true SG11201803636RA (en) 2018-09-27

Family

ID=58661635

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201803636RA SG11201803636RA (en) 2015-11-02 2016-10-24 Service processing method and apparatus

Country Status (12)

Country Link
US (2) US11252197B2 (en)
EP (1) EP3373543B1 (en)
JP (1) JP6743141B2 (en)
KR (1) KR102151862B1 (en)
CN (2) CN106656932B (en)
AU (2) AU2016351079A1 (en)
ES (1) ES2808274T3 (en)
MY (1) MY191124A (en)
PH (1) PH12018500935A1 (en)
PL (1) PL3373543T3 (en)
SG (1) SG11201803636RA (en)
WO (1) WO2017076176A1 (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656932B (en) 2015-11-02 2020-03-20 阿里巴巴集团控股有限公司 Service processing method and device
CN107423883B (en) 2017-06-15 2020-04-07 创新先进技术有限公司 Risk identification method and device for to-be-processed service and electronic equipment
CN107609972A (en) * 2017-07-31 2018-01-19 阿里巴巴集团控股有限公司 A kind of risk business recognition method and device
CN107579993B (en) * 2017-09-29 2020-09-25 北京云杉世纪网络科技有限公司 Network data flow safety processing method and device
CN110120933B (en) * 2018-02-07 2022-03-04 阿里巴巴集团控股有限公司 Wind control, man-machine recognition and data processing method, equipment and system
CN108985072A (en) * 2018-07-16 2018-12-11 北京百度网讯科技有限公司 Operate defence method, device, equipment and computer-readable medium
CN109034660B (en) * 2018-08-22 2023-07-14 平安科技(深圳)有限公司 Method and related device for determining risk control strategy based on prediction model
CN110943961B (en) 2018-09-21 2022-06-21 阿里巴巴集团控股有限公司 Data processing method, device and storage medium
CN109447689A (en) * 2018-09-27 2019-03-08 深圳壹账通智能科技有限公司 Consumer's risk portrait generation method, device, equipment and readable storage medium storing program for executing
US10938846B1 (en) * 2018-11-20 2021-03-02 Trend Micro Incorporated Anomalous logon detector for protecting servers of a computer network
CN110059479A (en) * 2019-01-29 2019-07-26 阿里巴巴集团控股有限公司 Risk information recognition methods and device and electronic equipment
CN110427971A (en) * 2019-07-05 2019-11-08 五八有限公司 Recognition methods, device, server and the storage medium of user and IP
US20210081949A1 (en) * 2019-09-12 2021-03-18 Mastercard Technologies Canada ULC Fraud detection based on known user identification
CN110781500A (en) * 2019-09-30 2020-02-11 口碑(上海)信息技术有限公司 Data wind control system and method
US11720895B2 (en) 2019-10-11 2023-08-08 Mastercard International Incorporated Systems and methods for use in facilitating network messaging
CN110874487B (en) * 2019-11-15 2022-09-02 北京百度网讯科技有限公司 Data processing method and device, electronic equipment and storage medium
CN111309495B (en) * 2020-02-03 2023-07-14 支付宝(杭州)信息技术有限公司 Batch processing request initiating method and device, risk identification equipment and storage medium
CN111489167A (en) * 2020-04-17 2020-08-04 支付宝(杭州)信息技术有限公司 Risk identification method and device of service request and processing equipment
CN111539617B (en) * 2020-04-21 2022-04-12 中国联合网络通信集团有限公司 Data processing method and device, electronic equipment, interaction system and storage medium
CN112836218B (en) * 2020-05-09 2024-04-16 支付宝(杭州)信息技术有限公司 Risk identification method and apparatus, and electronic device
US20220114566A1 (en) * 2020-10-08 2022-04-14 Mastercard International Incorporated Systems and methods for use in facilitating messaging
CN112581271B (en) * 2020-12-21 2022-11-15 上海浦东发展银行股份有限公司 Merchant transaction risk monitoring method, device, equipment and storage medium
CN113162912A (en) * 2021-03-12 2021-07-23 中航智能建设(深圳)有限公司 Network security protection method, system and storage device based on big data
CN113723800A (en) * 2021-08-27 2021-11-30 上海幻电信息科技有限公司 Risk identification model training method and device and risk identification method and device
CN114244824B (en) * 2021-11-25 2024-05-03 国家计算机网络与信息安全管理中心河北分中心 Method for quickly identifying identity of network space WEB type asset risk Server

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7127407B1 (en) * 1999-04-29 2006-10-24 3M Innovative Properties Company Method of grouping and analyzing clinical risks, and system therefor
WO2005025292A2 (en) * 2003-09-12 2005-03-24 Cyota Inc. System and method for risk based authentication
WO2006065989A2 (en) * 2004-12-15 2006-06-22 Tested Technologies Corporation Method and system for detecting and stopping illegitimate communication attempts on the internet
US8396927B2 (en) 2004-12-21 2013-03-12 Alcatel Lucent Detection of unwanted messages (spam)
JP4954979B2 (en) 2005-04-29 2012-06-20 オラクル・インターナショナル・コーポレイション Systems and methods for fraud monitoring, detection, and hierarchical user authentication
JP4542544B2 (en) * 2006-12-28 2010-09-15 キヤノンItソリューションズ株式会社 COMMUNICATION DATA MONITORING DEVICE, COMMUNICATION DATA MONITORING METHOD, AND PROGRAM
US8468244B2 (en) * 2007-01-05 2013-06-18 Digital Doors, Inc. Digital information infrastructure and method for security designated data and with granular data stores
JP5056124B2 (en) * 2007-04-04 2012-10-24 富士ゼロックス株式会社 Server, program and information processing system
TW200921542A (en) 2007-11-08 2009-05-16 Syscom Comp Engineering Co Security management and detection systems and methods for financial transactions
CN101504745A (en) * 2008-12-04 2009-08-12 阿里巴巴集团控股有限公司 Risk regulation/model establishing and optimizing system and method based on network on-line service
KR20110037666A (en) * 2009-10-07 2011-04-13 주식회사 다날 Method of electronic payment through multi-step certification using portable terminal
CN101976419A (en) * 2010-10-19 2011-02-16 中国工商银行股份有限公司 Processing method and system for risk monitoring and controlling of transaction data
US20130103944A1 (en) * 2011-10-24 2013-04-25 Research In Motion Limited Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
CN103092832A (en) * 2011-10-27 2013-05-08 腾讯科技(深圳)有限公司 Website risk detection processing method and website risk detection processing device
KR101160903B1 (en) * 2011-11-08 2012-06-29 주식회사 씽크풀 Blacklist extracting system and method thereof
CN107103548A (en) * 2011-11-17 2017-08-29 阿里巴巴集团控股有限公司 The monitoring method and system and risk monitoring and control method and system of network behavior data
CN102413013B (en) * 2011-11-21 2013-11-06 北京神州绿盟信息安全科技股份有限公司 Method and device for detecting abnormal network behavior
CN102769632A (en) * 2012-07-30 2012-11-07 珠海市君天电子科技有限公司 Method and system for grading detection and prompt of fishing website
US8838496B2 (en) * 2012-09-05 2014-09-16 Trayport Limited Systems and method for bin-based risk managed trading
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN103580950A (en) * 2012-12-27 2014-02-12 哈尔滨安天科技股份有限公司 Detection method and system combining real-time detection and asynchronous detection
CN103279883B (en) * 2013-05-02 2016-06-08 上海携程商务有限公司 Electronic-payment transaction risk control method and system
US20140351046A1 (en) * 2013-05-21 2014-11-27 IgnitionOne, Inc, System and Method for Predicting an Outcome By a User in a Single Score
US9223985B2 (en) 2013-10-09 2015-12-29 Sap Se Risk assessment of changing computer system within a landscape
US9942250B2 (en) 2014-08-06 2018-04-10 Norse Networks, Inc. Network appliance for dynamic protection from risky network activities
CN104202339B (en) * 2014-09-24 2018-01-05 广西大学 A kind of across cloud authentication service method based on user behavior
CN110084007B (en) 2014-10-13 2023-11-28 创新先进技术有限公司 Method, device and terminal for constructing risk control model
CN104392381A (en) * 2014-10-29 2015-03-04 中国建设银行股份有限公司 Risk monitoring method of transaction data and system thereof
CN106656932B (en) 2015-11-02 2020-03-20 阿里巴巴集团控股有限公司 Service processing method and device

Also Published As

Publication number Publication date
ES2808274T3 (en) 2021-02-26
US20180248918A1 (en) 2018-08-30
PH12018500935A1 (en) 2018-11-12
PL3373543T3 (en) 2020-11-02
KR102151862B1 (en) 2020-09-04
EP3373543B1 (en) 2020-06-03
EP3373543A1 (en) 2018-09-12
CN106656932A (en) 2017-05-10
AU2016351079A1 (en) 2018-05-24
CN111404887B (en) 2023-03-10
US11252197B2 (en) 2022-02-15
JP6743141B2 (en) 2020-08-19
AU2019232799A1 (en) 2019-10-10
KR20180075641A (en) 2018-07-04
EP3373543A4 (en) 2018-09-12
US11095689B2 (en) 2021-08-17
MY191124A (en) 2022-05-31
CN106656932B (en) 2020-03-20
WO2017076176A1 (en) 2017-05-11
JP2018535490A (en) 2018-11-29
CN111404887A (en) 2020-07-10
US20200128049A1 (en) 2020-04-23

Similar Documents

Publication Publication Date Title
SG11201803636RA (en) Service processing method and apparatus
SG10201901732UA (en) Sensitive information processing method, device, server and security determination system
MX354574B (en) User authentication method and apparatus based on audio and video data.
SG10201802554YA (en) Blockchain-based digital identity management method
SG11201804174TA (en) Order clustering and malicious information combating method and apparatus
SG10201901963WA (en) Address matching-based risk identification method and apparatus
MX2016001546A (en) Video recording method and device.
IN2015DN02657A (en)
MX2016000596A (en) Device binding method and apparatus.
EP2775404B8 (en) Information processing apparatus, information processing system, information processing method and computer program
IN2013DN11079A (en)
MX2015002437A (en) System and method for determining a state of health of a power source of a portable device.
MX2014015467A (en) Calendar reminding method and device.
MX2015012847A (en) Systems and methods for texture assessment of a coating formulation.
MX2015011167A (en) Apparatus and method for processing multiple open apis.
EP3200484A4 (en) Indication information determining and processing methods and devices, request message processing method and device, and computer storage medium
MX2017003731A (en) Systems and methods for identifying mobile devices.
GB201219578D0 (en) System and control method
WO2013003778A3 (en) Method and apparatus for determining and utilizing value of digital assets
WO2015118176A8 (en) Management of identities in a transaction infrastructure
MX2018003460A (en) Method and system of identifying an access request of an application on a mobile device in a telecommunication network.
MX359919B (en) Security verification method and apparatus.
WO2012044685A3 (en) Optimized recovery
SG10201907046QA (en) Method and apparatus for assigning device fingerprints to internet devices
SG11201900526WA (en) Risk identification method, risk identification apparatus, and cloud risk identification apparatus and system