CN102710770A - Identification method for network access equipment and implementation system for identification method - Google Patents

Identification method for network access equipment and implementation system for identification method Download PDF

Info

Publication number
CN102710770A
CN102710770A CN2012101776364A CN201210177636A CN102710770A CN 102710770 A CN102710770 A CN 102710770A CN 2012101776364 A CN2012101776364 A CN 2012101776364A CN 201210177636 A CN201210177636 A CN 201210177636A CN 102710770 A CN102710770 A CN 102710770A
Authority
CN
China
Prior art keywords
equipment
surfing
net
user
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101776364A
Other languages
Chinese (zh)
Inventor
汪德嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU PAYEGIS INFORMATION TECHNOLOGY Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012101776364A priority Critical patent/CN102710770A/en
Publication of CN102710770A publication Critical patent/CN102710770A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an identification method for network access equipment and an implementation system for the identification method. The method comprises the following steps that: a user is connected with and accesses a web service layer through the network access equipment, and software embedded into an application program page of a client acquires information about the network access equipment of the user, wherein the information comprises an equipment attribute, a state packet, a real Internet protocol (IP) address and a user behavior attribute; the network access equipment is connected with an established equipment fingerprint database, and performs retrieval to identify whether the network access equipment exists or not; the user enters an application layer for access or a specific transaction function, and a cloud computing cluster-based equipment fingerprint management platform integrates a machine identification and monitoring network and risk control, performs uniqueness identification on the network access equipment according to the network attribute of the equipment, and judges whether the network access equipment has an unconscious change or a conscious deceptive behavior or not; and the operation of the user over the network access equipment is identified and recorded, and a result is stored in the equipment fingerprint database. According to the technical scheme, the functions of network access equipment query, risk early warning, equipment tracking and the like are provided for the user by fully utilizing the network attribute and the high computing and judgment capability of a cloud computing cluster, roles of two parties of a transaction can be accurately identified, and the credibility of the transaction can be quickly judged, so that the safety of the transaction is improved.

Description

A kind of equipment for surfing the net recognition methods and realization system thereof
Technical field
The present invention relates to a kind of internet, applications, relate in particular to a kind of method and realization system thereof that safety guarantee is provided to the pseudo-fingerprint of equipment for surfing the net Intelligent Recognition and for network trading.
Background technology
The online recognition technology is widely used in to Net silver, payment merchant, network game and ecommerce provide risk management, and good recognition technology plays enormous function for reducing online transaction swindle, protection businessman and consumer's interests.Along with the internationalization of economy, each government, department, all kinds of scale enterprise etc. all guarantee to have higher requirement to internet safe both at home and abroad.
In order to guarantee that online transaction realizes smoothly, various safe practices in network security, have been used at present, like biological identity identifying technology, encryption technology, key management technology, digital signature etc.Biological identity identifying technology is because the uncertain factor of the restriction of dealer's payment and acquisition of information has limited the development of online transaction to a certain extent.And classical encryption technology is in today of cloud computing technical development, and the hacker can control thousands of or station server up to ten thousand and carry out Brute Force.Traditional in addition firewall technology also not too adapts to the needs of development, and some advanced technology can get around bank, the important data of fire compartment wall theft of mechanisms such as enterprise, and then cause great loss.
In traditional transaction security solution, the reliability that people tend to strengthen client more ensures its transaction service system safety.In fact, online hacker cribber makes profit as one's only aim, and the means renovation is made a lot of variety, and the client secure technology does not catch up with the fraudulent means renovation.The too much security monitoring meeting of client simultaneously brings great inconvenience and distrust to the user, thereby influences honest client trading experience, injury client conversion ratio.
International now online payment merchant such as PayPal etc. are devoted to simplify the payment flow of client, improve the client trading experience.To fundamentally solve the reliability of transaction system so, must combine client to set about (after taking place like the fishing steal-number, judge the steal-number transaction risk of this transaction, and intelligence being putd question to and reduced risks with the authentication client at server end from server end; And for example in time find to collect money from the audience in the sales promotion instance and provide the Tracing Control means to spread unchecked to avoid it).And this and do not mean that client will not do any variation; On the contrary; Need make up a kind of equipment for surfing the net recognition system simultaneously at client and server end (especially modern senior server end) just; As the preparatory implantation running environment of client, could improve safety and the convenience of client in network trading conscientiously.
Summary of the invention
Defective in view of above-mentioned prior art existence; The objective of the invention is to propose a kind of method and realization system thereof that realizes unique identification equipment for surfing the net; Functions such as equipment for surfing the net inquiry, Risk-warning, device traces back are provided for the consumer; And judge the confidence level of concluding the business fast, thereby improve safety of payment.
Above-mentioned first purpose of the present invention will be achieved through following technical scheme, and its step comprises as follows.
S1, user are through equipment for surfing the net connected reference web service layer, and web service layer gathers and obtains user's equipment for surfing the net information through being embedded in the software of the client application page, comprises device attribute, state bag, real IP and user behavior attribute;
S2, user's equipment for surfing the net connect the equipment fingerprint database of having set up and retrieve, and whether self exists in identification, contain the historical record of the equipment for surfing the net of all ginseng visits in the said cloud database;
S3; The user gets into the application layer visit or carries out concrete trading function; Equipment fingerprint management platform by based on the cloud computing cluster is integrated machine recognition monitor network and risk control; Through the unique identification of the network attribute of equipment and judge whether equipment for surfing the net exists the fraud of changing unintentionally or having a mind to, wherein network attribute comprises network traffics, user's internet behavior attribute at least to the equipment for surfing the net among S1, the S2;
S4 carries out identification record to the user to this operation of equipment for surfing the net, and the result is stored in the equipment fingerprint database.
Further, device attribute described in the S1 comprises the browser attribute at least, geographical position attribute, time and time zone attribute, application attribute and operating system attribute.
Further, through in client's webpage of equipment for surfing the net, embedding html tag, the user of equipment for surfing the net connected reference web service layer is retrieved, screens among the S1.
Further, the process of carrying out the unique identification of equipment for surfing the net based on the equipment fingerprint management platform of cloud computing cluster among the S3 comprises, I, adopts the method that comprises Javascript, PHP, Flash, Image at least through online plug-in unit collection user and facility information; Perhaps in client's webpage, dispose the code of application level fingerprint;
II, set up the Beacon server, collect user and facility information in the step I, or the code of application level fingerprint, close and be called data;
III, apparatus for establishing fingerprint database compare, merge, generate device id with collected data, and storage simultaneously becomes the learning sample data in the equipment fingerprint database;
IV, set up statistical model, weigh recognition result.
Further, judge based on the equipment fingerprint management platform of cloud computing cluster whether equipment for surfing the net exists the process of the fraud of changing unintentionally or having a mind to comprise among the S3,
V, based on online equipment for surfing the net recognition result and real-time network attribute, calculate risk engine by the background server of equipment fingerprint management platform;
VI, on equipment for surfing the net, set up and return the API service interface of risk factor, and set up subscriber administration interface and start accordingly or close dispensing unit.
Above-mentioned second purpose of the present invention will be achieved through following technical scheme, and its system forms and comprises: equipment for surfing the net, and the user is through equipment for surfing the net connected reference web service layer, and said equipment for surfing the net information comprises device attribute, state bag and real IP at least; Web service layer is used to provide the path of user's equipment for surfing the net access application layer, and through being embedded in the software of the client application page, gathers user's equipment for surfing the net information of obtaining; Application layer: be used to provide the visit of user's equipment for surfing the net or carry out concrete trading function; Equipment fingerprint management platform is integrated formation machine recognition monitor network and risk control unit based on the cloud computing cluster, also has Beacon server, equipment fingerprint database.
Further, the said software that is embedded in the client application page is at least html tag, is used for the checkout page that the user submits registration to, lands or customizes.
Further, contain overall black and white lists attribute data, transactions history behavior and training data in the said equipment fingerprint database.
Further, said equipment for surfing the net is provided with API service interface, the subscriber administration interface that is used to return risk factor and starts accordingly or cut out dispensing unit.
After technique scheme of the present invention is able to implement, compares to its outstanding effect of conventional art and be: make full use of the attribute and the cloud computing cluster powerful calculating discriminating power of network, unique identification equipment for surfing the net; For the consumer provides the equipment for surfing the net inquiry; Risk-warning, functions such as device traces back can be discerned both parties role accurately; Judge the confidence level of transaction fast, thereby improved the fail safe of transaction.
Description of drawings
Fig. 1 is an equipment for surfing the net Realization of Identification system architecture diagram of the present invention.
Fig. 2 is the system deployment figure of equipment for surfing the net identification of the present invention.
Fig. 3 is that the present invention realizes the unique recognition data flow chart of equipment for surfing the net.
Fig. 4 is the integration processing flow chart of equipment fingerprint management platform among the present invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, below in conjunction with case study on implementation and accompanying drawing, to further explain of the present invention.
User of the present invention does not need install software or server, only need utilize the equipment for surfing the net access websites application program of client (perhaps user), inserts HTML label allocation and the HTTPS API Calls function weblication server to client.The customer administrator can visit this equipment fingerprint management platform, and customization is fit to client's model, rule.
As shown in Figure 1, be the realization system architecture diagram of the equipment for surfing the net recognition technology among the present invention, the workflow that can summarize whole equipment for surfing the net recognition methods through this system architecture diagram is following steps:
S1, user are through equipment for surfing the net connected reference web service layer, and software or the plug-in unit of web service layer through being embedded in the client application page gathered and obtained user's equipment for surfing the net information, comprises device attribute, state bag, real IP and user behavior attribute.
S2 when user's equipment for surfing the net gets into network, also can connect the equipment fingerprint database of having set up and retrieve, and whether self exists in identification, wherein contains the historical record of the equipment for surfing the net of all ginseng visits in this cloud database.
S3; The user gets into application layer visit or carries out concrete trading function (like payment function etc.); Equipment fingerprint management platform by based on the cloud computing cluster is integrated machine recognition monitor network and risk control; Equipment for surfing the net among S1, the S2 through the unique identification of the network attribute of equipment and judge whether equipment for surfing the net exists the fraud of changing unintentionally or having a mind to, it is emphasized that wherein network attribute comprises network traffics and user's internet behavior attribute etc.
S4 carries out identification record to the user to this operation of equipment for surfing the net, and the result is stored in the equipment fingerprint database of cloud computing cluster (server cluster under the cloud notion).
As shown in Figure 2, be the system deployment sketch map of equipment for surfing the net recognition system of the present invention.Visible from illustrating: client (user side) is by the browser attribute, geographical position attribute, time and time zone attribute, application attribute and operating system attribute formation; Network layer is by the network connection attribute, network routing property, TCP bag attribute and http protocol attribute composition; And by equipment for surfing the net fingerprint management platform construction disaggregated model, rule model, overall black and white lists attribute, transactions history behavior and training data etc.; The information of these clients, network layer, equipment for surfing the net management platform all storage and uniform is carried out mass data processing to the machine information network in high in the clouds.Concrete Business Processing is the operation personnel operation of user and client by the model personnel.
Implement from recognition methods is concrete; As shown in Figure 3, the operation of equipment for surfing the net recognition system can be divided into following data flow: utilize technology such as Javascript, Flash, obtain the attribute of equipment for surfing the net; Simultaneously the state bag is monitored, real IP is detected; Set up the Beacon server, and store corresponding informance into the Beacon server; At Beacon server end analytic attribute buffer memory, carry out elementary swindle detecting then; By the device id engine device attribute is stored, contrasts, merged afterwards, produce machine Id; By intelligence engine and risk engine transaction is stored subsequently, models treated, and to model judgement marking, for later stage optimization provides data; The result is inquired about through attribute data before by the API server at last, user identity is verified, added up, return recognition result to the user through the API service interface.
This equipment fingerprint controlling platform has contained the code that the client need add transaction or the configuration of login page starting drive to, integrates back-end system for deep layer more, and this control desk also provides the application programming interfaces of alternative use.
The process of the unique identification of this equipment for surfing the net (comprising PC, Smart Phone, iPad, TV etc.) does.
1), set up the machine fingerprint and collect code, utilize to comprise Javascript/PHP/Flash/Image and other method, through the application of online plug-in unit, collect customer data and equipment data.The code portions that also can collect the application level fingerprint is deployed in the applying web page.
2), set up the Beacon server, in order to obtain the physics and the network attribute of equipment for surfing the net.Attribute or active collection network and device attribute that passive collection is delivered to from application request.
3), set up high performance property store, contrast and cooperative mechanism, set up unified machine fingerprint database, for later learning equipment, identification provide sample data.Optional storehouse model comprises (Mysql, KV, Bigtable, Memcached).
4), foundation is based on the statistical model of machine attribute---can well weigh the quality of recognition result, for the later change of model provides reliable data support.The precision definition of model as follows.
Ture Positives: the known device number that successfully identifies :=A;
Flash Negatives: missing the known device that should identify, should be that known device but is taken as unknown device=B;
Flash Positives: the known device that wrong identification goes out should be that unknown device is but treated as known device=C;
Real known device is: A+B-C=D.Can get 1. accurate rates>90% (A/D); 2. leak and grab rate < 5% (B/>D); 3. mistake is grabbed rate < 5% (C/>D).
In addition; Judge that whether equipment for surfing the net exists the implementation procedure of the fraud of changing unintentionally or having a mind to mainly is the risk engine of rely on setting up based on risk rule, risk rule is based on that online device attribute and real-time network attribute calculate through background server.And rely on the service interface API of apparatus for establishing fingerprint, collecting data, using when returning assessment result; Rely on simultaneously and set up available administration interface and start accordingly or close dispensing unit, wherein administration interface comprises the management of model, the management of risk rule and the management of system level.
As shown in Figure 4, be the equipment fingerprint platform integration client terminal website of equipment for surfing the net recognition system of the present invention and the process chart of back-end processing system.At first need the html tag configuration be embedded into client's webpage, the user screens the page (like registration, the page etc. of checking out of login or customization) before will submitting a transaction in advance to.In this process, the equipment for surfing the net recognition system will be done some inspections, and these labels that are embedded into client will obtain visitor's information, and analyse and compare.Promptly when visitor's submission was once concluded the business, the Beacon server end can notify retrieval about this configuration of devices information, and was qualified, just allowed further operation.Concrete handling process is: step 1: user and system of the present invention need a cooperation code, generate a unique session id (Session-ID) by the user, and embed html page with cooperation code (Partner-code); Step 2: in the time of user capture browser load page, equipment for surfing the net recognition system of the present invention will be on the basis of not disturbing client, pellucidly the configure browser device; The label that is embedded into html page obtains data as far as possible widely in the brief time that can when user capture, stop; Step 3: after the user submitted one-time request to, application program was through transmitting relevant session id, and cooperation code and API key (Secret-key) are to be implemented system queries to the present invention; Other identifying information also need be transmitted with reference to checking ID like transaction, is configured and fraud detection to use more accurate device; Step 4: by equipment fingerprint management platform query analysis, and return equipment for surfing the net information, historical transaction record, market public praise and the relevant device that links together with session id; Step 5: the equipment for surfing the net recognition system keeps return data.
The system based on the Internet cloud computing of the invention described above, the mass data of obtaining with the unified net nationality storehouse that is placed on high in the clouds, and has good Information Security, for user's safety of payment provides the more safeguard protection barrier of deep layer.
The enforcement of technique scheme of the present invention; Utilize existing information technology means, set up the household register storehouse of an equipment for surfing the net, the technology of unique identification equipment for surfing the net is provided at the cloud computing cluster; For the Internet consumer provides the self-shield means, for businessman provides the risk management service.And on the basis of experiment, have the effect of science, be mainly reflected in following three aspects.
1) identification reliability---existing technology (correlation technique that comprises ThreatMetrix and BlueCava) is quick more than 10 times comparing to aspect the equipment for surfing the net fingerprint technique, and accurate rate improves more than 40%, thereby more reliable.For the client provides critical data---equipment for surfing the net ID, collect the equipment for surfing the net attribute, the equipment for surfing the net attribute there is special data representation, so that equipment for surfing the net ID inquiry and attribute data reduction.
2) robustness of system---owing to have all uncertain factors in the reality, the object model of being set up can only be coarse expression of actual physics system.The present invention makes system still can keep the performance of expecting under model inaccuracy and the condition that has other changing factors, makes the inaccuracy of variation and the model of model not influence stability and other dynamic properties of system.When system runs into mistake, can in the shortest time, recover normal function.
3) fail safe of system---fundamentally solve the reliability of transaction system; Must combine client to set about (after taking place like the fishing steal-number from server end; In the steal-number transaction risk of this transaction of server end judgement, and the intelligence enquirement is reduced risks with the authentication client; And for example in time find to collect money from the audience in the sales promotion instance and provide the Tracing Control means to spread unchecked to avoid it); Let safety system have the server end risk judgement of dynamic self-teaching; When security service being provided, also to guarantee the core data and the basic service of protection system under fire for the client.
The above is merely embodiments of the invention, not in order to the restriction the present invention, all any modifications of in spirit of the present invention and principle, being done, be equal to the replacement or the improvement etc., all should be included in protection scope of the present invention.

Claims (9)

1. equipment for surfing the net recognition methods is characterized in that comprising:
S1, the user is through equipment for surfing the net connected reference web service layer, and web service layer obtains user's equipment for surfing the net information through the software collection that is embedded in the client application page, comprises device attribute, state bag, real IP and user behavior attribute;
S2, user's equipment for surfing the net connect the equipment fingerprint database of having set up and retrieve, and whether self exists in identification, contain the historical record of the equipment for surfing the net of all ginseng visits in the said cloud database;
S3; The user gets into application layer access client application program or carries out concrete trading function; Equipment fingerprint management platform by based on the cloud computing cluster is integrated machine recognition monitor network and risk control; Through the unique identification of the network attribute of equipment and judge whether equipment for surfing the net exists the fraud of changing unintentionally or having a mind to, wherein network attribute comprises network traffics, user's internet behavior attribute at least to the equipment for surfing the net among S1, the S2;
S4 carries out identification record to the user to this operation of equipment for surfing the net, and the result is stored in the equipment fingerprint database.
2. a kind of equipment for surfing the net recognition methods according to claim 1, it is characterized in that: device attribute described in the S1 comprises the browser attribute at least, geographical position attribute, time and time zone attribute, application attribute and operating system attribute.
3. a kind of equipment for surfing the net recognition methods according to claim 1 is characterized in that: through in client's webpage of equipment for surfing the net, embedding html tag, the user of equipment for surfing the net connected reference web service layer is retrieved, screens among the S1.
4. a kind of equipment for surfing the net recognition methods according to claim 1 is characterized in that: the process of carrying out the unique identification of equipment for surfing the net based on the equipment fingerprint management platform of cloud computing cluster among the S3 comprises,
The method that I, employing comprise Javascript, PHP, Flash, Image at least is through online plug-in unit collection user and facility information; Perhaps in client's webpage, dispose the code of application level fingerprint;
II, set up the Beacon server, collect user and facility information in the step I, or the code of application level fingerprint, close and be called data;
III, apparatus for establishing fingerprint database compare, merge, generate device id with collected data, and storage simultaneously becomes the learning sample data in the equipment fingerprint database;
IV, set up statistical model, weigh recognition result.
5. a kind of equipment for surfing the net recognition methods according to claim 1 is characterized in that: judge based on the equipment fingerprint management platform of cloud computing cluster whether equipment for surfing the net exists the process of the fraud of changing unintentionally or having a mind to comprise among the S3,
V, based on online equipment for surfing the net recognition result and real-time network attribute, calculate risk engine by the background server of equipment fingerprint management platform;
VI, on equipment for surfing the net, set up and return the API service interface of risk factor, and set up subscriber administration interface and start accordingly or close dispensing unit.
6. an equipment for surfing the net is discerned the realization system, it is characterized in that comprising:
Equipment for surfing the net, the user is through equipment for surfing the net connected reference web service layer, and said equipment for surfing the net information comprises device attribute, state bag and real IP at least;
Web service layer is used to provide the path of user's equipment for surfing the net access application layer, and obtains user's equipment for surfing the net information through the software collection that is embedded in the client application page;
Application layer: be used to provide the visit of user's equipment for surfing the net or carry out concrete trading function;
Equipment fingerprint management platform is integrated formation machine recognition monitor network and risk control unit based on the cloud computing cluster, also has Beacon server, equipment fingerprint database.
7. a kind of equipment for surfing the net according to claim 6 is discerned the realization system, and it is characterized in that: the said software that is embedded in the client application page is at least html tag, is used for the checkout page that the user submits registration to, lands or customizes.
8. a kind of equipment for surfing the net according to claim 6 is discerned the realization system, it is characterized in that: contain overall black and white lists attribute data, transactions history behavior and training data in the said equipment fingerprint database.
9. a kind of equipment for surfing the net identification realization according to claim 6 system is characterized in that: said equipment for surfing the net is provided with API service interface, the subscriber administration interface that is used to return risk factor and starts accordingly or cut out dispensing unit.
CN2012101776364A 2012-06-01 2012-06-01 Identification method for network access equipment and implementation system for identification method Pending CN102710770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101776364A CN102710770A (en) 2012-06-01 2012-06-01 Identification method for network access equipment and implementation system for identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101776364A CN102710770A (en) 2012-06-01 2012-06-01 Identification method for network access equipment and implementation system for identification method

Publications (1)

Publication Number Publication Date
CN102710770A true CN102710770A (en) 2012-10-03

Family

ID=46903316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101776364A Pending CN102710770A (en) 2012-06-01 2012-06-01 Identification method for network access equipment and implementation system for identification method

Country Status (1)

Country Link
CN (1) CN102710770A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297561A (en) * 2013-05-31 2013-09-11 中国联合网络通信集团有限公司 IP (internet protocol) address tracing method and device
CN103475924A (en) * 2013-09-12 2013-12-25 四川长虹电器股份有限公司 V-chip implementation method based on fingerprint identification of television remote controller and system thereof
CN104751349A (en) * 2015-01-27 2015-07-01 重庆市大小王科技股份有限公司 Infinite extension consumer and merchant interaction win-win system platform
WO2016145993A1 (en) * 2015-03-13 2016-09-22 阿里巴巴集团控股有限公司 Method and system for user device identification
CN105989373A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for obtaining equipment fingerprint by training model
CN105989079A (en) * 2015-02-11 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for obtaining device fingerprint
CN106817404A (en) * 2016-12-08 2017-06-09 同盾科技有限公司 The method for tracing and system of a kind of web appliance
CN106909545A (en) * 2015-12-22 2017-06-30 阿里巴巴集团控股有限公司 A kind of method and apparatus of the attaching information for determining user
CN106982209A (en) * 2017-03-22 2017-07-25 北京匡恩网络科技有限责任公司 The recognition methods of industrial control network access device, device and system
CN106991317A (en) * 2016-12-30 2017-07-28 中国银联股份有限公司 Safe verification method, platform, device and system
CN107733858A (en) * 2017-09-01 2018-02-23 北京知道未来信息技术有限公司 A kind of monitoring device and method of intelligent protection camera information
CN108804908A (en) * 2017-05-04 2018-11-13 腾讯科技(深圳)有限公司 A kind of device-fingerprint generation method, device and computing device
CN108833384A (en) * 2018-05-31 2018-11-16 北京奇安信科技有限公司 Identify the method and system of counterfeit electronic equipment
CN109670736A (en) * 2019-02-12 2019-04-23 黄虹 A kind of risk management method of e-commerce transaction behavior
CN112073407A (en) * 2020-09-04 2020-12-11 上海浦东发展银行股份有限公司 System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN112930531A (en) * 2018-12-31 2021-06-08 北京嘀嘀无限科技发展有限公司 System and method for fraud detection in transportation services
CN112967139A (en) * 2021-03-24 2021-06-15 北京人人云图信息技术有限公司 Security user quality assessment method based on equipment data
CN113949564A (en) * 2021-10-15 2022-01-18 天津大学 Website fingerprint identification method based on resource loading tree
CN116245546A (en) * 2023-05-11 2023-06-09 广州格鲁信息技术有限公司 Data processing system and method based on device fingerprint

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1795464A (en) * 2003-04-25 2006-06-28 第一数据公司 Systems and methods for verifying identities in transactions
CN101142570A (en) * 2004-06-14 2008-03-12 约维申有限公司 Network security and fraud detection system and method
CN101375546A (en) * 2005-04-29 2009-02-25 甲骨文国际公司 System and method for fraud monitoring, detection, and tiered user authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1795464A (en) * 2003-04-25 2006-06-28 第一数据公司 Systems and methods for verifying identities in transactions
CN101142570A (en) * 2004-06-14 2008-03-12 约维申有限公司 Network security and fraud detection system and method
CN101375546A (en) * 2005-04-29 2009-02-25 甲骨文国际公司 System and method for fraud monitoring, detection, and tiered user authentication

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297561A (en) * 2013-05-31 2013-09-11 中国联合网络通信集团有限公司 IP (internet protocol) address tracing method and device
CN103297561B (en) * 2013-05-31 2016-04-20 中国联合网络通信集团有限公司 IP address source tracing method and device
CN103475924A (en) * 2013-09-12 2013-12-25 四川长虹电器股份有限公司 V-chip implementation method based on fingerprint identification of television remote controller and system thereof
CN104751349A (en) * 2015-01-27 2015-07-01 重庆市大小王科技股份有限公司 Infinite extension consumer and merchant interaction win-win system platform
CN105989079A (en) * 2015-02-11 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for obtaining device fingerprint
US10581845B2 (en) 2015-02-11 2020-03-03 Alibaba Group Holding Limited Method and apparatus for assigning device fingerprints to internet devices
CN105989373A (en) * 2015-02-15 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for obtaining equipment fingerprint by training model
CN105989373B (en) * 2015-02-15 2019-07-23 阿里巴巴集团控股有限公司 The acquisition device-fingerprint method and device realized using training pattern
WO2016145993A1 (en) * 2015-03-13 2016-09-22 阿里巴巴集团控股有限公司 Method and system for user device identification
US10474799B2 (en) 2015-03-13 2019-11-12 Alibaba Group Holding Limited Method and system for identifying a unique mobile device based on mobile device attribute changes over time
CN106909545A (en) * 2015-12-22 2017-06-30 阿里巴巴集团控股有限公司 A kind of method and apparatus of the attaching information for determining user
CN106909545B (en) * 2015-12-22 2020-06-30 阿里巴巴集团控股有限公司 Method and equipment for determining attribution information of user
CN106817404B (en) * 2016-12-08 2021-03-02 同盾控股有限公司 Method and system for tracking web equipment
CN106817404A (en) * 2016-12-08 2017-06-09 同盾科技有限公司 The method for tracing and system of a kind of web appliance
CN106991317A (en) * 2016-12-30 2017-07-28 中国银联股份有限公司 Safe verification method, platform, device and system
CN106982209A (en) * 2017-03-22 2017-07-25 北京匡恩网络科技有限责任公司 The recognition methods of industrial control network access device, device and system
CN108804908A (en) * 2017-05-04 2018-11-13 腾讯科技(深圳)有限公司 A kind of device-fingerprint generation method, device and computing device
CN107733858A (en) * 2017-09-01 2018-02-23 北京知道未来信息技术有限公司 A kind of monitoring device and method of intelligent protection camera information
CN108833384B (en) * 2018-05-31 2021-03-12 奇安信科技集团股份有限公司 Method and system for identifying counterfeit electronic devices
CN108833384A (en) * 2018-05-31 2018-11-16 北京奇安信科技有限公司 Identify the method and system of counterfeit electronic equipment
CN112930531A (en) * 2018-12-31 2021-06-08 北京嘀嘀无限科技发展有限公司 System and method for fraud detection in transportation services
CN109670736A (en) * 2019-02-12 2019-04-23 黄虹 A kind of risk management method of e-commerce transaction behavior
CN112073407A (en) * 2020-09-04 2020-12-11 上海浦东发展银行股份有限公司 System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN112967139A (en) * 2021-03-24 2021-06-15 北京人人云图信息技术有限公司 Security user quality assessment method based on equipment data
CN113949564A (en) * 2021-10-15 2022-01-18 天津大学 Website fingerprint identification method based on resource loading tree
CN113949564B (en) * 2021-10-15 2022-10-14 天津大学 Website fingerprint identification method based on resource loading tree
CN116245546A (en) * 2023-05-11 2023-06-09 广州格鲁信息技术有限公司 Data processing system and method based on device fingerprint
CN116245546B (en) * 2023-05-11 2023-08-25 广州格鲁信息技术有限公司 Data processing system and method based on device fingerprint

Similar Documents

Publication Publication Date Title
CN102710770A (en) Identification method for network access equipment and implementation system for identification method
CN113098870B (en) Phishing detection method and device, electronic equipment and storage medium
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
US20200012785A1 (en) Self-adaptive application programming interface level security monitoring
US10063579B1 (en) Embedding the capability to track user interactions with an application and analyzing user behavior to detect and prevent fraud
CN110677384B (en) Phishing website detection method and device, storage medium and electronic device
CN106952096A (en) Security certification system, method and the credible identifying device of client of client device
US8917939B2 (en) Verifying vendor identification and organization affiliation of an individual arriving at a threshold location
CN105117624A (en) Recognition system and method of user system based on face recognition
CN111404937B (en) Method and device for detecting server vulnerability
CN102394885A (en) Information classification protection automatic verification method based on data stream
US9619634B2 (en) Identification system
CN113572752B (en) Abnormal flow detection method and device, electronic equipment and storage medium
CN103258027A (en) Context awareness service platform based on intelligent terminal
US20130179421A1 (en) System and Method for Collecting URL Information Using Retrieval Service of Social Network Service
CN108292408A (en) The method for detecting WEB follow-up services
CN105989149A (en) Method and system for extracting and recognizing fingerprint of user equipment
CN110020161B (en) Data processing method, log processing method and terminal
CN113794731B (en) Method, device, equipment and medium for identifying CDN (content delivery network) -based traffic masquerading attack
CN108234431A (en) A kind of backstage logs in behavioral value method and detection service device
CN109446807A (en) The method, apparatus and electronic equipment of malicious robot are intercepted for identification
CN117951341A (en) Block chain-based service processing method, device, equipment, medium and product
CN106101117B (en) A kind of fishing website blocking-up method, device and system
CN109729054A (en) Access data monitoring method and relevant device
US9723017B1 (en) Method, apparatus and computer program product for detecting risky communications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: SUZHOU PAYEGIS INFORMATION TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: WANG DEJIA

Effective date: 20121012

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100025 CHAOYANG, BEIJING TO: 215021 SUZHOU, JIANGSU PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20121012

Address after: Xinghu Street Industrial Park of Suzhou city in Jiangsu province 215021 No. 328 Creative Industry Park 1-B501 unit

Applicant after: Suzhou PayEgis Information Technology Co., Ltd.

Address before: 100025 Beijing city Chaoyang District Ciyunsi Hospital No. 1 East International No. 1 building 1302 room

Applicant before: Wang Dejia

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20121003