SG11201803636RA - Service processing method and apparatus - Google Patents
Service processing method and apparatusInfo
- Publication number
- SG11201803636RA SG11201803636RA SG11201803636RA SG11201803636RA SG11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA SG 11201803636R A SG11201803636R A SG 11201803636RA
- Authority
- SG
- Singapore
- Prior art keywords
- risk identification
- identification
- fast
- service processing
- risk
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Abstract
The present application relates to the field of Internet technologies, and in particular, to a service processing method and apparatus, to reduce system consumption, improve identification performance. The service processing method provided in embodiments of 5 the present application includes: performing fast risk identification on the service processing request based on an identification algorithm of a fast risk identification layer; after the fast risk identification is performed, if it cannot determined the processing is risky, performing risk on service request 10 based an algorithm a risk ion where a data volume used for the deep risk identification is greater than a data volume used for the fast risk identification, and duration of the deep risk identification is greater than duration of the fast risk identification; and the processing based a of the 15 deep risk identification.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510732329.1A CN106656932B (en) | 2015-11-02 | 2015-11-02 | Service processing method and device |
PCT/CN2016/103012 WO2017076176A1 (en) | 2015-11-02 | 2016-10-24 | Service processing method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201803636RA true SG11201803636RA (en) | 2018-09-27 |
Family
ID=58661635
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201803636RA SG11201803636RA (en) | 2015-11-02 | 2016-10-24 | Service processing method and apparatus |
Country Status (12)
Country | Link |
---|---|
US (2) | US11252197B2 (en) |
EP (1) | EP3373543B1 (en) |
JP (1) | JP6743141B2 (en) |
KR (1) | KR102151862B1 (en) |
CN (2) | CN106656932B (en) |
AU (2) | AU2016351079A1 (en) |
ES (1) | ES2808274T3 (en) |
MY (1) | MY191124A (en) |
PH (1) | PH12018500935A1 (en) |
PL (1) | PL3373543T3 (en) |
SG (1) | SG11201803636RA (en) |
WO (1) | WO2017076176A1 (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106656932B (en) | 2015-11-02 | 2020-03-20 | 阿里巴巴集团控股有限公司 | Service processing method and device |
CN107423883B (en) | 2017-06-15 | 2020-04-07 | 创新先进技术有限公司 | Risk identification method and device for to-be-processed service and electronic equipment |
CN107609972A (en) * | 2017-07-31 | 2018-01-19 | 阿里巴巴集团控股有限公司 | A kind of risk business recognition method and device |
CN107579993B (en) * | 2017-09-29 | 2020-09-25 | 北京云杉世纪网络科技有限公司 | Network data flow safety processing method and device |
CN110120933B (en) * | 2018-02-07 | 2022-03-04 | 阿里巴巴集团控股有限公司 | Wind control, man-machine recognition and data processing method, equipment and system |
CN108985072A (en) * | 2018-07-16 | 2018-12-11 | 北京百度网讯科技有限公司 | Operate defence method, device, equipment and computer-readable medium |
CN109034660B (en) * | 2018-08-22 | 2023-07-14 | 平安科技(深圳)有限公司 | Method and related device for determining risk control strategy based on prediction model |
CN110943961B (en) | 2018-09-21 | 2022-06-21 | 阿里巴巴集团控股有限公司 | Data processing method, device and storage medium |
CN109447689A (en) * | 2018-09-27 | 2019-03-08 | 深圳壹账通智能科技有限公司 | Consumer's risk portrait generation method, device, equipment and readable storage medium storing program for executing |
US10938846B1 (en) * | 2018-11-20 | 2021-03-02 | Trend Micro Incorporated | Anomalous logon detector for protecting servers of a computer network |
CN110059479A (en) * | 2019-01-29 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Risk information recognition methods and device and electronic equipment |
CN110427971A (en) * | 2019-07-05 | 2019-11-08 | 五八有限公司 | Recognition methods, device, server and the storage medium of user and IP |
US20210081949A1 (en) * | 2019-09-12 | 2021-03-18 | Mastercard Technologies Canada ULC | Fraud detection based on known user identification |
CN110781500A (en) * | 2019-09-30 | 2020-02-11 | 口碑(上海)信息技术有限公司 | Data wind control system and method |
US11720895B2 (en) | 2019-10-11 | 2023-08-08 | Mastercard International Incorporated | Systems and methods for use in facilitating network messaging |
CN110874487B (en) * | 2019-11-15 | 2022-09-02 | 北京百度网讯科技有限公司 | Data processing method and device, electronic equipment and storage medium |
CN111309495B (en) * | 2020-02-03 | 2023-07-14 | 支付宝(杭州)信息技术有限公司 | Batch processing request initiating method and device, risk identification equipment and storage medium |
CN111489167A (en) * | 2020-04-17 | 2020-08-04 | 支付宝(杭州)信息技术有限公司 | Risk identification method and device of service request and processing equipment |
CN111539617B (en) * | 2020-04-21 | 2022-04-12 | 中国联合网络通信集团有限公司 | Data processing method and device, electronic equipment, interaction system and storage medium |
CN112836218B (en) * | 2020-05-09 | 2024-04-16 | 支付宝(杭州)信息技术有限公司 | Risk identification method and apparatus, and electronic device |
US20220114566A1 (en) * | 2020-10-08 | 2022-04-14 | Mastercard International Incorporated | Systems and methods for use in facilitating messaging |
CN112581271B (en) * | 2020-12-21 | 2022-11-15 | 上海浦东发展银行股份有限公司 | Merchant transaction risk monitoring method, device, equipment and storage medium |
CN113162912A (en) * | 2021-03-12 | 2021-07-23 | 中航智能建设(深圳)有限公司 | Network security protection method, system and storage device based on big data |
CN113723800A (en) * | 2021-08-27 | 2021-11-30 | 上海幻电信息科技有限公司 | Risk identification model training method and device and risk identification method and device |
CN114244824B (en) * | 2021-11-25 | 2024-05-03 | 国家计算机网络与信息安全管理中心河北分中心 | Method for quickly identifying identity of network space WEB type asset risk Server |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7127407B1 (en) * | 1999-04-29 | 2006-10-24 | 3M Innovative Properties Company | Method of grouping and analyzing clinical risks, and system therefor |
WO2005025292A2 (en) * | 2003-09-12 | 2005-03-24 | Cyota Inc. | System and method for risk based authentication |
WO2006065989A2 (en) * | 2004-12-15 | 2006-06-22 | Tested Technologies Corporation | Method and system for detecting and stopping illegitimate communication attempts on the internet |
US8396927B2 (en) | 2004-12-21 | 2013-03-12 | Alcatel Lucent | Detection of unwanted messages (spam) |
JP4954979B2 (en) | 2005-04-29 | 2012-06-20 | オラクル・インターナショナル・コーポレイション | Systems and methods for fraud monitoring, detection, and hierarchical user authentication |
JP4542544B2 (en) * | 2006-12-28 | 2010-09-15 | キヤノンItソリューションズ株式会社 | COMMUNICATION DATA MONITORING DEVICE, COMMUNICATION DATA MONITORING METHOD, AND PROGRAM |
US8468244B2 (en) * | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
JP5056124B2 (en) * | 2007-04-04 | 2012-10-24 | 富士ゼロックス株式会社 | Server, program and information processing system |
TW200921542A (en) | 2007-11-08 | 2009-05-16 | Syscom Comp Engineering Co | Security management and detection systems and methods for financial transactions |
CN101504745A (en) * | 2008-12-04 | 2009-08-12 | 阿里巴巴集团控股有限公司 | Risk regulation/model establishing and optimizing system and method based on network on-line service |
KR20110037666A (en) * | 2009-10-07 | 2011-04-13 | 주식회사 다날 | Method of electronic payment through multi-step certification using portable terminal |
CN101976419A (en) * | 2010-10-19 | 2011-02-16 | 中国工商银行股份有限公司 | Processing method and system for risk monitoring and controlling of transaction data |
US20130103944A1 (en) * | 2011-10-24 | 2013-04-25 | Research In Motion Limited | Hypertext Link Verification In Encrypted E-Mail For Mobile Devices |
CN103092832A (en) * | 2011-10-27 | 2013-05-08 | 腾讯科技(深圳)有限公司 | Website risk detection processing method and website risk detection processing device |
KR101160903B1 (en) * | 2011-11-08 | 2012-06-29 | 주식회사 씽크풀 | Blacklist extracting system and method thereof |
CN107103548A (en) * | 2011-11-17 | 2017-08-29 | 阿里巴巴集团控股有限公司 | The monitoring method and system and risk monitoring and control method and system of network behavior data |
CN102413013B (en) * | 2011-11-21 | 2013-11-06 | 北京神州绿盟信息安全科技股份有限公司 | Method and device for detecting abnormal network behavior |
CN102769632A (en) * | 2012-07-30 | 2012-11-07 | 珠海市君天电子科技有限公司 | Method and system for grading detection and prompt of fishing website |
US8838496B2 (en) * | 2012-09-05 | 2014-09-16 | Trayport Limited | Systems and method for bin-based risk managed trading |
CN103714479A (en) * | 2012-10-09 | 2014-04-09 | 四川欧润特软件科技有限公司 | Intelligent centralized monitor method and system for bank personal business fraudulent conducts |
CN103580950A (en) * | 2012-12-27 | 2014-02-12 | 哈尔滨安天科技股份有限公司 | Detection method and system combining real-time detection and asynchronous detection |
CN103279883B (en) * | 2013-05-02 | 2016-06-08 | 上海携程商务有限公司 | Electronic-payment transaction risk control method and system |
US20140351046A1 (en) * | 2013-05-21 | 2014-11-27 | IgnitionOne, Inc, | System and Method for Predicting an Outcome By a User in a Single Score |
US9223985B2 (en) | 2013-10-09 | 2015-12-29 | Sap Se | Risk assessment of changing computer system within a landscape |
US9942250B2 (en) | 2014-08-06 | 2018-04-10 | Norse Networks, Inc. | Network appliance for dynamic protection from risky network activities |
CN104202339B (en) * | 2014-09-24 | 2018-01-05 | 广西大学 | A kind of across cloud authentication service method based on user behavior |
CN110084007B (en) | 2014-10-13 | 2023-11-28 | 创新先进技术有限公司 | Method, device and terminal for constructing risk control model |
CN104392381A (en) * | 2014-10-29 | 2015-03-04 | 中国建设银行股份有限公司 | Risk monitoring method of transaction data and system thereof |
CN106656932B (en) | 2015-11-02 | 2020-03-20 | 阿里巴巴集团控股有限公司 | Service processing method and device |
-
2015
- 2015-11-02 CN CN201510732329.1A patent/CN106656932B/en active Active
- 2015-11-02 CN CN202010144936.7A patent/CN111404887B/en active Active
-
2016
- 2016-10-24 JP JP2018522511A patent/JP6743141B2/en active Active
- 2016-10-24 KR KR1020187015210A patent/KR102151862B1/en active IP Right Grant
- 2016-10-24 SG SG11201803636RA patent/SG11201803636RA/en unknown
- 2016-10-24 ES ES16861444T patent/ES2808274T3/en active Active
- 2016-10-24 EP EP16861444.4A patent/EP3373543B1/en not_active Revoked
- 2016-10-24 MY MYPI2018701729A patent/MY191124A/en unknown
- 2016-10-24 PL PL16861444T patent/PL3373543T3/en unknown
- 2016-10-24 WO PCT/CN2016/103012 patent/WO2017076176A1/en active Application Filing
- 2016-10-24 AU AU2016351079A patent/AU2016351079A1/en not_active Abandoned
-
2018
- 2018-05-01 US US15/968,593 patent/US11252197B2/en active Active
- 2018-05-02 PH PH12018500935A patent/PH12018500935A1/en unknown
-
2019
- 2019-09-17 AU AU2019232799A patent/AU2019232799A1/en not_active Abandoned
- 2019-12-19 US US16/721,814 patent/US11095689B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
ES2808274T3 (en) | 2021-02-26 |
US20180248918A1 (en) | 2018-08-30 |
PH12018500935A1 (en) | 2018-11-12 |
PL3373543T3 (en) | 2020-11-02 |
KR102151862B1 (en) | 2020-09-04 |
EP3373543B1 (en) | 2020-06-03 |
EP3373543A1 (en) | 2018-09-12 |
CN106656932A (en) | 2017-05-10 |
AU2016351079A1 (en) | 2018-05-24 |
CN111404887B (en) | 2023-03-10 |
US11252197B2 (en) | 2022-02-15 |
JP6743141B2 (en) | 2020-08-19 |
AU2019232799A1 (en) | 2019-10-10 |
KR20180075641A (en) | 2018-07-04 |
EP3373543A4 (en) | 2018-09-12 |
US11095689B2 (en) | 2021-08-17 |
MY191124A (en) | 2022-05-31 |
CN106656932B (en) | 2020-03-20 |
WO2017076176A1 (en) | 2017-05-11 |
JP2018535490A (en) | 2018-11-29 |
CN111404887A (en) | 2020-07-10 |
US20200128049A1 (en) | 2020-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201803636RA (en) | Service processing method and apparatus | |
SG10201901732UA (en) | Sensitive information processing method, device, server and security determination system | |
MX354574B (en) | User authentication method and apparatus based on audio and video data. | |
SG10201802554YA (en) | Blockchain-based digital identity management method | |
SG11201804174TA (en) | Order clustering and malicious information combating method and apparatus | |
SG10201901963WA (en) | Address matching-based risk identification method and apparatus | |
MX2016001546A (en) | Video recording method and device. | |
IN2015DN02657A (en) | ||
MX2016000596A (en) | Device binding method and apparatus. | |
EP2775404B8 (en) | Information processing apparatus, information processing system, information processing method and computer program | |
IN2013DN11079A (en) | ||
MX2015002437A (en) | System and method for determining a state of health of a power source of a portable device. | |
MX2014015467A (en) | Calendar reminding method and device. | |
MX2015012847A (en) | Systems and methods for texture assessment of a coating formulation. | |
MX2015011167A (en) | Apparatus and method for processing multiple open apis. | |
EP3200484A4 (en) | Indication information determining and processing methods and devices, request message processing method and device, and computer storage medium | |
MX2017003731A (en) | Systems and methods for identifying mobile devices. | |
GB201219578D0 (en) | System and control method | |
WO2013003778A3 (en) | Method and apparatus for determining and utilizing value of digital assets | |
WO2015118176A8 (en) | Management of identities in a transaction infrastructure | |
MX2018003460A (en) | Method and system of identifying an access request of an application on a mobile device in a telecommunication network. | |
MX359919B (en) | Security verification method and apparatus. | |
WO2012044685A3 (en) | Optimized recovery | |
SG10201907046QA (en) | Method and apparatus for assigning device fingerprints to internet devices | |
SG11201900526WA (en) | Risk identification method, risk identification apparatus, and cloud risk identification apparatus and system |