CN104426860A - Security policy configuration method, device and server - Google Patents
Security policy configuration method, device and server Download PDFInfo
- Publication number
- CN104426860A CN104426860A CN201310377022.5A CN201310377022A CN104426860A CN 104426860 A CN104426860 A CN 104426860A CN 201310377022 A CN201310377022 A CN 201310377022A CN 104426860 A CN104426860 A CN 104426860A
- Authority
- CN
- China
- Prior art keywords
- security strategy
- numerical value
- user account
- segmentation
- accumulation numerical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a security policy configuration method, a device and a server, and belongs to the technical field of computers. The security policy configuration method comprises steps: service request information from a user account is received, wherein the service request information comprises a user account sign; a cumulative value historically consumed by the user account is acquired according to the service request information; a security policy corresponding to the cumulative value is acquired; and according to the user account sign, the acquired security policy is configured to be the security policy of the user account. The problems that the security policy providing method provided by the prior art results in improper security policy selection by a user, and thus security of the user account is poor and the user account can be easily stolen can be solved. Effects that a proper security policy is automatically provided for the user account according to the cumulative value historically consumed by the user account, and security of the user account is thus ensured can be achieved.
Description
Technical field
The present invention relates to field of computer technology, particularly a kind of security policy configuration method, device and server.
Background technology
Along with the development of network technology, the situation that terminal carrys out request service by user account gets more and more.And when service provider need to the service of terminal request collect necessarily ' expense ' time, service provider directly can take off expense from user account.
But when user account is stolen by lawless person, the property in user account will be usurped by lawless person thus is caused the property loss of user, so the safety in order to ensure user account, service provider can provide security strategy for user account.Existing a kind of security strategy supplying method comprises: the first, and when terminal needs the user account protecting oneself, terminal can send security strategy solicited message by user account to server; Second, after server receives security strategy solicited message, for terminal provides at least one preset security strategy, preset security strategy comprises: the Spending Limit in a period of time is set, arrange can use COS, inform by short message or mail reminder are set, dynamic password verification are set and arrange and verify according to user's use habit; The geographical position that user's use habit comprises COS that user asks usually, user commonly uses and the terminal that user commonly uses etc.; 3rd, after terminal receives preset security strategy, user therefrom selects the security strategy needed by certain operation, and uses the security strategy selected to protect user account.
Realizing in process of the present invention, inventor finds prior art, and at least there are the following problems:
User needs the security strategy manually selecting oneself to need from the preset security strategy that server provides, and this is undoubtedly a challenge concerning the user of safety protection knowledge scarcity; And the protection of security strategy that user selects is probably very weak, thus make that the fail safe of user account is poor to be very easily stolen.
Summary of the invention
The security strategy supplying method provided to solve prior art can cause because the security strategy of user's selection is improper, the problem that the poor stability of user account is very easily stolen, embodiments provides a kind of security policy configuration method, device and server.Described technical scheme is as follows:
First aspect, provides a kind of security policy configuration method, and described method comprises:
Receive the service request information from user account, described service request information comprises the mark of described user account;
The accumulation numerical value of described user account history consumption is obtained according to described service request information;
Obtain the security strategy corresponding with described accumulation numerical value;
According to the mark of described user account, the described security strategy got is configured to the security strategy of described user account.
Second aspect, provide a kind of security strategy inking device, described device comprises:
Information receiving module, for receiving the service request information from user account, described service request information comprises the mark of described user account;
Numerical value acquisition module, the described service request information for receiving according to described information receiving module obtains the accumulation numerical value that described user account history consumes;
Strategy acquisition module, for obtaining the security strategy corresponding with the described accumulation numerical value that described numerical value acquisition module gets;
Strategy configuration module, for being configured to the security strategy of described user account by the described security strategy that described tactful acquisition module gets according to the mark of described user account.
The third aspect, provides a kind of server, and described server comprises the security strategy inking device described in second aspect.
The beneficial effect of the technical scheme that the embodiment of the present invention provides is:
By receiving the service request information from user account, service request information comprises the mark of user account, according to the accumulation numerical value that service request acquisition of information user account history consumes, obtain the security strategy corresponding with accumulation numerical value, according to the mark of user account, the security strategy got is configured to the security strategy of user account; The security policy configuration method that solving prior art provides can cause, because the security strategy of user's selection is improper, making the problem that the poor stability of user account is very easily stolen; Reach and according to the accumulation numerical value of user account history consumption for user account provides suitable security strategy automatically, thus the effect of the account safety of user account can be ensured.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram of the security policy configuration method that the embodiment of the present invention one provides;
Fig. 2 is the method flow diagram of the security policy configuration method that the embodiment of the present invention two provides;
Fig. 3 is the block diagram of the security strategy inking device that the embodiment of the present invention three provides;
Fig. 4 is the block diagram of the security strategy inking device that the embodiment of the present invention four provides.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, the present invention is described in further detail, and obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiment one
Please refer to Fig. 1, it illustrates the method flow diagram of the security policy configuration method that the embodiment of the present invention one provides, this security policy configuration method may be used in server, and this security policy configuration method can comprise:
Step 101, receives the service request information from user account;
Wherein, service request information comprises the mark of user account.
Step 102, obtains the accumulation numerical value of user account history consumption according to service request information;
Step 103, obtains the security strategy corresponding with accumulation numerical value;
Step 104, is configured to the security strategy of user account by the security strategy got according to the mark of user account.
In sum, the security policy configuration method that the present embodiment provides, by receiving the service request information from user account, service request information comprises the mark of user account, according to the accumulation numerical value that service request acquisition of information user account history consumes, obtain the security strategy corresponding with accumulation numerical value, according to the mark of user account, the security strategy got is configured to the security strategy of user account; The security policy configuration method that solving prior art provides can cause, because the security strategy of user's selection is improper, making the problem that the poor stability of user account is very easily stolen; Reach and according to the accumulation numerical value of user account history consumption for user account provides suitable security strategy automatically, thus the effect of the account safety of user account can be ensured.
Embodiment two
Please refer to Fig. 2, it illustrates the method flow diagram of the security policy configuration method that the embodiment of the present invention two provides, this security policy configuration method may be used in server, and this security policy configuration method can comprise:
Step 201, receives the service request information from user account;
When user needs a certain service using server to provide, user can use the account of terminal landing oneself, then send service request information by the account user orientation server of oneself, accordingly, server can receive the service request information from user account.Wherein, service request information comprises the mark of user account, and when actual realization, the mark of user account can be the user name of user account.
Such as, Xiao Ming is when playing online game, want the role that ' some certificate ' in accessing to your account is oneself to buy a value ' 28 certificates ' the armor, then now user can send make purchases worth more by the account user orientation server of oneself be ' 28 certificates ' the service request information of the armor to server, and server can receive the service request information that user account sends accordingly, the user name of the user account of Xiao Ming in service request information, can be comprised.
Step 202, obtains the accumulation numerical value of user account history consumption according to service request information;
After server receives the service request information from user account, server can obtain the accumulation numerical value of user account history consumption according to service request information.
Wherein, the accumulation numerical value of user account history consumption refers to that user account accumulates the numerical value of consumption within a predetermined period of time.Concrete, the corresponding numerical value of each target item, user is when exchanging each target item by user account, user account all can have the consumption of the numerical value that target item is corresponding, and the accumulation numerical value of the user account history consumption in the present embodiment refers to the summation of each numerical value that user account consumes when exchanging each target item within a predetermined period of time.Such as: user uses user account to exchange A, B and C tri-target items within a predetermined period of time altogether, the numerical value that each target item is corresponding is respectively 20,31 and 12, the numerical value that then user account adds up to consume within a predetermined period of time is 63, and the accumulation numerical value of also i.e. user account history consumption is 63.When actual realization, the accumulation numerical value of user account history consumption can be the cumulative spend amount of user account, and the present embodiment is exactly cumulative spend amount for the accumulation numerical value of history consumption.
Concrete, the step that server obtains the accumulation numerical value of user account history consumption can comprise: server can obtain the consumer record of user account, obtains user account use present cumulative spend amount from registration by statistics consumer record.
Such as, Xiao Ming plays, and ' sky dragon XX ' game has one-month period, period is that the role of oneself have purchased No. 7 equipments, the value of ' the some certificate ' of each use is respectively 20,25,15,40,65,35 and 30, then the cumulative spend amount that now server can calculate the account of Xiao Ming is ' 230 certificates '.
It should be noted that, the present embodiment just obtains user account from being registered to present accumulation numerical value for server, when actual realization, and can also from the time point of a setting, calculate from this time point to accumulation numerical value now, the present embodiment does not limit this.
Step 203, obtains the accumulation numerical value of the first sample of users account at first time period internal consumption;
Server can obtain the accumulation numerical value of the first sample of users account at first time period internal consumption.Concrete, server can first from least one user account of Stochastic choice the user account using own services as the first sample of users account, then obtain the accumulation numerical value of the first sample of users account at first time period internal consumption.
Wherein, first sample of users account comprises at least one user account, and the method for at least one user account of server Stochastic choice can comprise: when user account is digital account, server can select specific tail number as tail number be ' 8 ' or tail number be the user account of ' 28 ' as the user account needed, the first user account for optional network specific digit also can be selected as the user account needed; And when user account is the account of other types such as such as English alphabet, server can be selected logging in the user account of account certain hour section moon as previous in it as the user account needed; Certainly, when actual realization, server can also adopt other every method choice to go out at least one user account, and the present embodiment just adopts above-mentioned system of selection to illustrate, and does not limit its concrete system of selection.
Simultaneously, first time period can be user account from registration to the time period that the statistics moment terminates, also it can be the time period terminated to the second time point from very first time point that server is selected in advance, and very first time point can be default time point as January 1 then, the second time point can be default time point as June 31 then; Certainly when actual realization, second time point can also be the time point carrying out adding up, the selection of the present embodiment to first time period does not limit, and when the time that first time period is selected longer as terminate to the statistics moment from user account registration time period time, process the more realistic distribution of result that obtains.
Step 204, according to each accumulation numerical value determination predetermined segment mode got;
After server gets the accumulation numerical value of the first sample of users account in first time period, server can according to each accumulation numerical value determination predetermined segment mode got.Wherein, predetermined segment mode comprises at least two segmentations and adjacent two segmentations are end to end.
Concrete, server can comprise according to the step of each accumulation numerical value determination predetermined segment mode got:
The first, each accumulation numerical value got is sorted according to numerical values recited;
After server gets the accumulation numerical value of the first sample of users account at first time period internal consumption, each accumulation numerical value got can sort according to numerical values recited by server.Concrete, server can sort according to the order that the numerical value of accumulation numerical value is descending, also can sort according to the order that accumulation numerical value is ascending, and the present embodiment does not limit its concrete sortord.
The second, according to the first segmentation scales, segmentation is carried out to the accumulation numerical value after sequence, and using segmented mode as predetermined segment mode.
After server performs sequence, server can carry out segmentation according to the first segmentation scales to the accumulation numerical value after sequence.Wherein, the first segmentation scales is the ratio for the accumulation numerical value after sequence to be carried out segmentation according to number.
Such as, the first segmentation scales is 1:6:2:1; Then server can by the cumulative spend amount after sequence, each cumulative spend amount before rank in 10% scope is as the first segmentation, using each cumulative spend amount in 10% ~ 70% scope of rank as the second segmentation, using each cumulative spend amount in 70% ~ 90% scope of rank as the 3rd segmentation, using each cumulative spend amount in 90% ~ 100% scope of rank as the 4th segmentation.Certainly, when actual realization, the concrete numerical value of the first segmentation scales and segmentation number can be set to difference according to different use scenes, and the present embodiment does not limit this.
In a specific embodiment, each accumulation numerical value got sorts according to ascending order by server, and after carrying out segmentation according to above-mentioned segmentation scales, each accumulation numerical value in each accumulation numerical value < the 4th segmentation in the segmentation in each accumulation numerical value < the 3rd segmentation in each accumulation numerical value < second segmentation in the first segmentation.
Due to As time goes on, the distribution of the accumulation numerical value of each user account consumption also may change to some extent, so in order to obtain up-to-date distribution situation, server is after determining predetermined segment mode, server can also upgrade the segmented mode determined, and server can comprise the step that the predetermined segment mode determined upgrades:
The first, obtain the accumulation numerical value of the second sample of users account at the second time period internal consumption, the second sample of users account comprises at least one user account;
Server obtains the accumulation numerical value of the second sample of users account at the second time period internal consumption.Wherein, second sample of users account comprises at least one user account, second time period can be user account to the time period that the statistics moment terminates from registration, also can be the time period terminated to the second time point from very first time point that server is selected in advance.It is similar in the step of the accumulation numerical value of first time period internal consumption that this and server obtain the first sample of users account, and the first sample of users account can comprise identical user account with the second sample of users account when actual realization, so detailed technology detail with reference step 203, the present embodiment does not repeat them here.
The second, the predetermined segment mode determined is upgraded according to each accumulation numerical value got.
Server is getting the second sample of users account after the accumulation numerical value of the second time period internal consumption, and server can upgrade according to each accumulation numerical value got the predetermined segment mode determined.Wherein, the step that server upgrades the predetermined segment mode determined according to each accumulation numerical value got can comprise:
1), each accumulation numerical value got is sorted according to numerical values recited;
The the second sample of users account got each accumulation numerical value at the second time period internal consumption sorts according to numerical values recited by server.Concrete, server can sort according to the order that the numerical value of accumulation numerical value is descending, also can sort according to the order that accumulation numerical value is ascending, and the present embodiment does not limit its concrete sortord.
2), according to the second segmentation scales, segmentation is carried out to the accumulation numerical value after sequence;
After each accumulation numerical value got sorts according to numerical values recited by server, server can carry out segmentation according to the second segmentation scales to the accumulation numerical value after sequence.Wherein, the second segmentation scales is the ratio for the accumulation numerical value after sequence to be carried out segmentation according to number, and when actual realization, the second segmentation scales can be identical with the first segmentation scales.
It should be noted that, this and server are accumulated to each in first time period the numerical value consumed according to the first segmentation scales to carry out the executive mode of segmentation similar, and detailed technology detail with reference above-mentioned steps, the present embodiment does not repeat them here.
3), predetermined segment mode is upgraded according to segmentation.
Server can use step 2) in segmentation to upgrade predetermined segment mode.
What need supplementary notes is a bit, when actual realization, server can also adopt every segmentation method to carry out segmentation to each accumulation numerical value got, such as, after to each accumulation numerical ordering, interval as 0 ~ 20 according to the size statistical unit of each accumulation numerical value, 21 ~ 40 ... the number of the accumulation numerical value in scope is also the number of user account, then select the number of wherein accumulation numerical value come before predetermined number if 4 intervals are as between primary area, and merge adjacent interval according to the mode of predetermined merging mode as merged or merge backward forward, finally obtain the interval after 4 merging, and using 4 intervals after merging as 4 segmentations, the present embodiment does not limit its concrete segmentation method.
Need supplementary notes on the other hand, step 203 and step 204 can the arbitrary step before step 205 perform, and the present embodiment just to perform in step 203 and step 204 place, does not limit its concrete execution sequence.
Step 205, determines the segmentation at accumulation numerical value place according to predetermined segment mode;
After server gets predetermined segment mode, due to the span of the corresponding numerical value of each segmentation, so server can determine the segmentation at accumulation numerical value place according to predetermined segment mode.Wherein, predetermined segment mode comprises at least two segmentations and adjacent two segmentations are end to end.
Such as, the cumulative spend amount of the user account that server gets is ' 530 certificates ', 4 segmentations are had in predetermined segment mode, the span of the cumulative spend amount of each segmentation is respectively more than 0 ~ 160,161 ~ 300,301 ~ 400 and 400, then now, server can detect cumulative spend amount ' 530 certificates of the user account got ' last segmentation in predetermined segment mode.
Step 206, the height of the accumulation numerical value corresponding to each segmentation in the protection dynamics of the security strategy provided according to this locality and predetermined segment mode, sets up the corresponding relation between each segmentation and security strategy in predetermined segment mode;
The height of the accumulation numerical value corresponding to each segmentation in the protection of the security strategy that server can also provide according to server and predetermined segment mode, sets up the corresponding relation between each segmentation and security strategy in predetermined segment mode.
Concrete, the step of the corresponding relation between each segmentation and security strategy that server is set up in predetermined segment mode can comprise:
The first, the security strategy provided by server is classified according to the protection dynamics of correspondence;
Because server can provide two kinds or two or more security strategies, the protection dynamics of often kind of security strategy is also different, so in order to perform subsequent operation, the security strategy that server can first provide by server is classified according to the protection dynamics of correspondence.Wherein, security strategy comprises as at least one under type:
First kind of way: the accumulation numerical value limit that the 3rd time period internal consumption is set;
Concrete, in order to reduce user account stolen time user property loss, user can be oneself account setup in the 3rd time period as every day, the accumulation numerical value limit that monthly or every year can consume, so server can receive the accumulation numerical value limit that can consume that user is arranged, and accordingly the accumulation numerical value limit that can consume in the 3rd time period is arranged on to the user account of user, thus when user account is when the accumulation numerical value of the 3rd time period internal consumption is higher than the accumulation numerical value limit that can consume arranged, server can refuse this request, or while this request of refusal, send prompting message to user account.
Such as, Xiao Ming is the Spending Limit of oneself ' account setup of sky dragon XX ' consumes at most ' 50 certificates every day ', then when user request completed in one day exceed ' 50 certificates ' consumer requests time, server can be refused and send the account of prompting message to Xiao Ming, thus avoid when account is stolen, the property in account is all stolen by lawless person.
Certainly, when actual realization, server is when refusing the service request of user account, and server can also send authorization information to user account, thus completes this request input the password of making an appointment user after, and the present embodiment does not limit this.And, due to after arranging the accumulation numerical value limit that can consume in the 3rd time period, even if the user account of user is stolen, lawless person also can only steal the minute quantity property of user within the 3rd time period, the loss of user is also very little, so the protection dynamics of this security strategy to account is higher.
The second way: the COS that can use is set;
The COS that user can also use for the account setup of oneself, so server can receive the COS that can use that user is arranged, and accordingly the COS that can use is arranged to the user account of user, thus outside the COS that user account request can use other service time, server can refuse this request of user account, or sends prompting message to user account while this request of refusal.
But, when actual realization, it is several that the COS that can provide due to server may only have quantity few, and domestic consumer uses wherein fixing certain several mostly, even if then now user arranges the COS that can use, so when account is stolen, be also easy to be cracked by other people, so the protection intensity of this security strategy is relatively low.
The third mode: predetermined alerting pattern is set and reminds;
The account of oneself and the mobile phone of oneself or mailbox can also be bound by user, namely also user can also arrange predetermined alerting pattern and reminds, so server can receive the predetermined alerting pattern that user is arranged, and accordingly the predetermined alerting pattern of the account setup of user is reminded, thus when the account of user is consumed or spending limit reaches certain numerical value, server sends prompting message to user account by predetermined alerting pattern, thus causes the vigilance of user.
Wherein, predetermined alerting pattern comprises at least one in inform by short message, mail reminder and personal letter prompting; Such as, when user buys ' 28 certificates by user account ' the armor time, it is that the prompting message of ' account that you user is called XXX have purchased in the YYY time armor that is worth 28 certificates ' is to the mobile phone bound with user account that server can send a content.
When actual realization, due to server usually accept service request also namely perform deduct fees after just can send prompting message, so this security strategy mainly plays the effect reminded afterwards, even if user receives prompting message, property so in oneself account is also usurped by other people, so the protection dynamics of this security strategy is also relatively low.
4th kind of mode: dynamic password verification is set;
User can also ask to arrange dynamic password verification, now server can receive the solicited message that user arranges dynamic password verification, and dynamic password verification is arranged to the user account of user, thus when a certain service of user account request, server first can send checking request to user account, user account is after user inputs agreement password, and server just provides this service request, also namely starts to perform the operation of deducting fees.
When actual realization, the operator of server can provide the terminal of a such as dynamic authentication of ' Net silver ', could consume after making the numeral of user's current display of input terminal when each consumption; Certainly the mode of the fixed password of making an appointment or other checking password can also be adopted to verify, the present embodiment does not limit this.Simultaneously, use the user of user account to know authentication password owing to only having or verify that password could use user account to consume, even if so user account is stolen, so lawless person can not use the property in user account, so this security strategy well ensure that the safety of user account, protection dynamics is high.
5th kind of mode: arrange and verify according to user's occupation mode.
Concrete, because the use habit of different user may be also different, so the account setup that user can be oneself is verified according to user's occupation mode, server can receive the request according to the checking of user's occupation mode that user is arranged, and correspondingly verify according to user's occupation mode for user account is arranged, thus receive the service request information of user account at server after, whether the request content that server can detect the service request information that this receives meets default occupation mode, and when testing result is for meeting, the service request accepting this provides service for user account, and refuse this service request when testing result is not for meeting.
Wherein, occupation mode comprises predesignated subscriber's account by predetermined terminal transmission request information, predesignated subscriber's account is at least one in the service in reservation service list in the reservation service of predetermined geographic locality transmission request information and solicited message request.
Such as, user just use oneself a mobile phone and only in the family of oneself as ' XX community ' to server send service request information, then now, when service reception is to service request information from user account, server can detect whether the terminal sending this service request information is that default mobile phone, and detect whether the geographical position sending service request information is ' XX community ', thus accept request when testing result is and is time.
But, when actual realization, because the use habit of certain customers may be identical, so when the user account of user is stolen by other user that use habit is similar to him, other user still can use the property in user account, thus make user suffer certain loss, so give the protection dynamics of security strategy general.
In sum, server can be divided into a class by arranging the accumulation numerical value limit that can consume in the 3rd time period and arranging dynamic password verification, and the protection dynamics of this class is the strongest; Be divided into a class with arranging according to the checking of user's occupation mode by arranging the COS that can use, the protection dynamics of this class is medium; And being divided into a class by arranging the prompting of predetermined alerting pattern, the protection dynamics of this class is minimum.
It should be noted that, when actual realization, security strategy not only comprises above-mentioned several, and the present embodiment is just illustrated in the above described manner, does not limit its concrete kind.And the present embodiment is also just to adopt above-mentioned sorting technique to be categorized as example to security strategy, and when actual realization, can adopt different sorting techniques according to the user demand of different operators, the present embodiment does not limit this.
The second, be the security strategy that corresponding classification is selected in each segmentation in predetermined segment mode by predetermined policy.
Server can be the security strategy that corresponding classification is selected in each segmentation in predetermined segment mode by predetermined policy.Wherein, the protection dynamics of security strategy that predetermined policy comprises corresponding to the high segmentation of accumulation numerical value is not less than the protection dynamics of the security strategy corresponding to the low segmentation of accumulation numerical value.
Concrete, the accumulation numerical value consumed due to user account history is larger, when account is stolen, the loss of user also may be larger, and for operator, the larger account value of accumulation numerical value is larger, operator does not want this client of running off, so now in order to ensure the safety of these user accounts, server can provide for these user accounts the security strategy that protection dynamics is higher.
Such as, 4 that comprise in step 204 in predetermined segment mode are segmented into example, and because the amount of the cumulative spend amount in the first segmentation is lower, server can accordingly for it selects the class security strategy that protection dynamics is low; And due to the amount of the cumulative spend amount in the second segmentation also relatively medium, so server can be two class security strategies that it selects protection dynamics low or medium accordingly; Because the amount of the cumulative spend amount in the 3rd segmentation is relatively high, so server can accordingly for it selects the two class security strategies that protection dynamics is medium or protection dynamics is high; Similar, because the amount of the cumulative spend amount in the 4th segmentation is all very high, so the account safety in order to ensure user, server can accordingly for it selects the class security strategy that protection dynamics is high.
It should be added that, when actual realization, server can also all arrange the high security strategy of protection dynamics for all segmentations, as long as the security strategy arranged can reduce the property loss of user as much as possible, the concrete corresponded manner of the present embodiment to predetermined corresponding relation does not do considered critical.
Step 207, using the corresponding relation of foundation as predetermined corresponding relation.
Server can using the corresponding relation between each segmentation and security strategy set up in predetermined segment mode as predetermined corresponding relation.
Need remark additionally, step 206 and step 207 can the arbitrary step before step 208 performs perform, and the present embodiment does not limit its concrete execution sequence.
Step 208, obtains the security strategy corresponding with the segmentation determined according to predetermined corresponding relation;
Because server has determined the segmentation at the numerical value place that user account history consumes, so after server obtains predetermined corresponding relation, server can obtain the security strategy corresponding with the segmentation determined according to predetermined corresponding relation.Wherein, predetermined corresponding relation is the corresponding relation between each segmentation and security strategy in predetermined segment mode, thus determines the security strategy corresponding with accumulation numerical value.
Such as, cumulative spend amount last segmentation in predetermined segment mode of the user account that server gets, and in predetermined corresponding relation, the security strategy of medium and high two kinds of protection dynamics of the corresponding protection dynamics of this segmentation, the security strategy corresponding with the segmentation determined that then now server gets comprises: arrange the Spending Limit in the 3rd time period, dynamic password verification is set, the COS that setting can use is verified according to user's occupation mode with arranging, also namely corresponding with the cumulative spend amount of user account security strategy can comprise above-mentioned several.
Whether step 209 is identical with the security strategy of the current configuration of user account according to the security strategy that the label detection of user account gets;
In order to reduce complexity when server is user account configuration security strategy, improve efficiency when server is user account configuration security strategy, after server gets the security strategy corresponding with the segmentation determined, server can detect according to the mark of the user account in service request information the security strategy whether security strategy that gets is the current configuration of user account.
Step 311, if testing result is not identical, then performs the step of the security strategy according to the mark of user account, the security strategy got being configured to user account;
If the testing result of server is the security strategy got is not the security strategy of the current configuration of user account, then now server can perform the step of the security strategy according to the mark of user account, the security strategy got being configured to user account.
But, if the testing result of server is the security strategy of the security strategy that the gets current configuration of user account just, then in order to reduce complexity when server is user account configuration security strategy, improve efficiency when server is user account configuration security strategy, server can not change the security strategy of user account, and the present embodiment repeats no more this.
Step 312, is configured to the security strategy of user account by the security strategy got according to the mark of user account.
The security strategy got can be configured to the security strategy of user account by server according to the mark of user account.Concrete, server can be given tacit consent to allows user account use all security strategies got, and now server can be verified user account by all security strategies got; Server can also send all security strategies of getting to user account, and therefrom selected the security strategy oneself needed by user, the present embodiment does not limit this.
In sum, the security policy configuration method that the present embodiment provides, by receiving the service request information from user account, service request information comprises the mark of user account, according to the accumulation numerical value that service request acquisition of information user account history consumes, obtain the security strategy corresponding with accumulation numerical value, according to the mark of user account, the security strategy got is configured to the security strategy of user account; The security strategy supplying method that solving prior art provides can cause, because the security strategy of user's selection is improper, making the problem that the poor stability of user account is very easily stolen; Reach and according to the accumulation numerical value of user account history consumption for user account provides suitable security strategy automatically, thus the effect of the account safety of user account can be ensured;
Simultaneously, the predetermined segment mode determined is upgraded at the accumulation numerical value of the second time period internal consumption by using the second sample of users account, each segmentation in predetermined segment mode is made more to meet the distribution situation of current accumulation numerical value, the accumulation numerical value avoiding As time goes on each user account all drops on the higher segmentation of numeric ratio, and then is the problem that each user account all configures the very high security strategy of protection dynamics;
In addition, before configuring for user account the security strategy got, whether identically with the security strategy of the current configuration of user account first detect the security strategy got, thus only when testing result is different, use the security strategy got to upgrade the current security strategy of user account, decrease redundant operation during configuration security strategy, improve as treatment effeciency during user account configuration security strategy.
Embodiment three
Please refer to Fig. 3, it illustrates the block diagram of the security strategy inking device that the embodiment of the present invention three provides, this security strategy inking device can realize becoming all or part of of server by software, hardware or both combinations, and this security strategy inking device can comprise: information receiving module 410, numerical value acquisition module 420, tactful acquisition module 430 and tactful configuration module 440;
Information receiving module 410, for receiving the service request information from user account, described service request information comprises the mark of described user account;
Numerical value acquisition module 420, the described service request information for receiving according to described information receiving module 410 obtains the accumulation numerical value that described user account history consumes;
Strategy acquisition module 430, for the security strategy that the described numerical value obtained with described accumulation numerical value acquisition module 420 gets is corresponding;
Strategy configuration module 440, for being configured to the security strategy of described user account by the described security strategy that described tactful acquisition module 430 gets according to the mark of described user account.
In sum, the security strategy inking device that the present embodiment provides, by receiving the service request information from user account, service request information comprises the mark of user account, according to the accumulation numerical value that service request acquisition of information user account history consumes, obtain the security strategy corresponding with accumulation numerical value, according to the mark of user account, the security strategy got is configured to the security strategy of user account; The security strategy supplying method that solving prior art provides can cause, because the security strategy of user's selection is improper, making the problem that the poor stability of user account is very easily stolen; Reach and according to the accumulation numerical value of user account history consumption for user account provides suitable security strategy automatically, thus the effect of the account safety of user account can be ensured.
Embodiment four
Please refer to Fig. 4, it illustrates the block diagram of the security strategy inking device that the embodiment of the present invention four provides, this security strategy inking device can realize becoming all or part of of server by software, hardware or both combinations, and this security strategy inking device can comprise: information receiving module 410, numerical value acquisition module 420, tactful acquisition module 430 and tactful configuration module 440;
Information receiving module 410, for receiving the service request information from user account, described service request information comprises the mark of described user account;
Numerical value acquisition module 420, the described service request information for receiving according to described information receiving module 410 obtains the accumulation numerical value that described user account history consumes;
Strategy acquisition module 430, for the security strategy that the described numerical value obtained with described accumulation numerical value acquisition module 420 gets is corresponding;
Strategy configuration module 440, for being configured to the security strategy of described user account by the described security strategy that described tactful acquisition module 430 gets according to the mark of described user account.
In the first possible implementation of the present embodiment, described tactful acquisition module 430, comprising:
Segmentation determining unit 431, for determining the segmentation at described accumulation numerical value place according to predetermined segment mode, described predetermined segment mode comprises at least two segmentations and adjacent two segmentations are end to end;
Strategy acquiring unit 432, for obtaining the security strategy corresponding with the described segmentation that described segmentation determining unit 431 is determined according to predetermined corresponding relation, described predetermined corresponding relation is the corresponding relation between each segmentation and security strategy in described predetermined segment mode, thus determines the security strategy corresponding with described accumulation numerical value.
In the implementation that the second of the present embodiment is possible, described device, can also comprise: the first acquisition module 450 and segmentation determination module 460;
First acquisition module 450, for obtaining the accumulation numerical value of the first sample of users account at first time period internal consumption, described first sample of users account comprises at least one user account;
Segmentation determination module 460, determines described predetermined segment mode for each accumulation numerical value got according to described first acquisition module 450.
In the third possible implementation of the present embodiment, described segmentation determination module 460, comprising:
First sequencing unit 461, sorts according to numerical values recited for each accumulation numerical value got by described first acquisition module 450;
First division unit 462, for carrying out segmentation according to the first segmentation scales to the accumulation numerical value after described first sequencing unit 461 sequence, and using described segmented mode as described predetermined segment mode.
In the 4th kind of possible implementation of the present embodiment, described device also comprises: the second acquisition module 470 and segmentation update module 480;
Second acquisition module 470, for obtaining the accumulation numerical value of the second sample of users account at the second time period internal consumption, described second sample of users account comprises at least one user account;
Segmentation update module 480, upgrades for each accumulation numerical value got according to described second acquisition module 470 the described predetermined segment mode determined.
In the 5th kind of possible implementation of the present embodiment, described segmentation update module 480, comprising:
Second sequencing unit 481, sorts according to numerical values recited for each accumulation numerical value got by described second acquisition module 470;
Second division unit 482, for carrying out segmentation according to the second segmentation scales to the accumulation numerical value after described second sequencing unit 481 sequence;
Segmentation updating block 483, upgrades described predetermined segment mode for the described segmentation divided according to described second division unit 482.
In the 6th kind of possible implementation of the present embodiment, described device also comprises: relation sets up module 490 and relationship determination module 510;
Relation sets up module 490, for the height of the accumulation numerical value corresponding to each segmentation in the protection dynamics of security strategy that provides according to this locality and described predetermined segment mode, set up the corresponding relation between each segmentation and security strategy in described predetermined segment mode;
Relationship determination module 510, for setting up described corresponding relation that module 490 sets up as described predetermined corresponding relation using described relation.
In the 7th kind of possible implementation of the present embodiment, described relation sets up module 490, comprising:
Policy class unit 491, classifies according to the protection dynamics of correspondence for the security strategy provided this locality;
Relation sets up unit 492, for being the security strategy that corresponding classification is selected in each segmentation in described predetermined segment mode by predetermined policy, the protection dynamics of the security strategy that described predetermined policy comprises corresponding to the high segmentation of accumulation numerical value is not less than the protection dynamics of the security strategy corresponding to the low segmentation of accumulation numerical value.
In the 8th kind of possible implementation of the present embodiment, described device also comprises: tactful detection module 520 and configuration Executive Module 530;
Whether strategy detection module 520 is identical with the security strategy of the current configuration of described user account for the described security strategy got according to the label detection of described user account;
Configuration Executive Module 530, for when the testing result of described tactful detection module 520 is not identical, performs the step that the described security strategy got is configured to the security strategy of described user account by the described mark according to described user account.
In the 9th kind of possible implementation of the present embodiment, described security strategy comprises as at least one under type:
The accumulation numerical value limit that can consume in the 3rd time period is set;
The COS that setting can use;
Arrange predetermined alerting pattern to remind, described predetermined alerting pattern comprises at least one in inform by short message, mail reminder and personal letter prompting;
Dynamic password verification is set;
Arrange according to the checking of user's occupation mode, described occupation mode comprises described user account, and to send described service request information, described user account in the service that predetermined geographic locality sends described service request information and described service request information request by predetermined terminal be at least one in the service in reservation service list.
In sum, the security strategy inking device that the present embodiment provides, by receiving the service request information from user account, service request information comprises the mark of user account, according to the accumulation numerical value that service request acquisition of information user account history consumes, obtain the security strategy corresponding with accumulation numerical value, according to the mark of user account, the security strategy got is configured to the security strategy of user account; The security strategy supplying method that solving prior art provides can cause, because the security strategy of user's selection is improper, making the problem that the poor stability of user account is very easily stolen; Reach and according to the accumulation numerical value of user account history consumption for user account provides suitable security strategy automatically, thus the effect of the account safety of user account can be ensured;
Simultaneously, the predetermined segment mode determined is upgraded at the accumulation numerical value of the second time period internal consumption by using the second sample of users account, each segmentation in predetermined segment mode is made more to meet the distribution situation of current accumulation numerical value, the accumulation numerical value avoiding As time goes on each user account all drops on the higher segmentation of numeric ratio, and then is the problem that each user account all configures the very high security strategy of protection dynamics;
In addition, before configuring for user account the security strategy got, whether identically with the security strategy of the current configuration of user account first detect the security strategy got, thus only when testing result is different, use the security strategy got to upgrade the current security strategy of user account, decrease redundant operation during configuration security strategy, improve as treatment effeciency during user account configuration security strategy.
It should be noted that: the security strategy inking device that above-described embodiment provides and server are when configuring security strategy, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by equipment is divided into different functional modules, to complete all or part of function described above.In addition, the security strategy inking device that above-described embodiment provides and the embodiment of the method for server and security policy configuration method belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (21)
1. a security policy configuration method, is characterized in that, described method comprises:
Receive the service request information from user account, described service request information comprises the mark of described user account;
The accumulation numerical value of described user account history consumption is obtained according to described service request information;
Obtain the security strategy corresponding with described accumulation numerical value;
According to the mark of described user account, the described security strategy got is configured to the security strategy of described user account.
2. security policy configuration method according to claim 1, is characterized in that, the security strategy that described acquisition is corresponding with described accumulation numerical value, comprising:
Determine the segmentation at described accumulation numerical value place according to predetermined segment mode, described predetermined segment mode comprises at least two segmentations and adjacent two segmentations are end to end;
The security strategy corresponding with the described segmentation determined is obtained according to predetermined corresponding relation, described predetermined corresponding relation is the corresponding relation between each segmentation and security strategy in described predetermined segment mode, thus determines the security strategy corresponding with described accumulation numerical value.
3. security policy configuration method according to claim 2, is characterized in that, described determine the segmentation at described accumulation numerical value place according to predetermined segment mode before, described method also comprises:
Obtain the accumulation numerical value of the first sample of users account at first time period internal consumption, described first sample of users account comprises at least one user account;
Each accumulation numerical value according to getting determines described predetermined segment mode.
4. security policy configuration method according to claim 3, is characterized in that, each accumulation numerical value that described basis gets determines described predetermined segment mode, comprising:
Each accumulation numerical value got is sorted according to numerical values recited;
According to the first segmentation scales, segmentation is carried out to the accumulation numerical value after sequence, and using described segmented mode as described predetermined segment mode.
5. security policy configuration method according to claim 3, is characterized in that, after each accumulation numerical value that described basis gets determines described predetermined segment mode, described method also comprises:
Obtain the accumulation numerical value of the second sample of users account at the second time period internal consumption, described second sample of users account comprises at least one user account;
The described predetermined segment mode determined is upgraded according to each accumulation numerical value got.
6. security policy configuration method according to claim 5, is characterized in that, each accumulation numerical value that described basis gets upgrades the described predetermined segment mode determined, comprising:
Each accumulation numerical value got is sorted according to numerical values recited;
According to the second segmentation scales, segmentation is carried out to the accumulation numerical value after sequence;
Described predetermined segment mode is upgraded according to described segmentation.
7. security policy configuration method according to claim 2, is characterized in that, before the described security strategy corresponding with the described segmentation determined according to predetermined corresponding relation acquisition, described method also comprises:
The height of the accumulation numerical value corresponding to each segmentation in the protection dynamics of the security strategy provided according to this locality and described predetermined segment mode, sets up the corresponding relation between each segmentation and security strategy in described predetermined segment mode;
Using the described corresponding relation of foundation as described predetermined corresponding relation.
8. security policy configuration method according to claim 7, it is characterized in that, the height of the accumulation numerical value corresponding to each segmentation in the protection dynamics of the described security strategy provided according to this locality and described predetermined segment mode, set up the corresponding relation between each segmentation and security strategy in described predetermined segment mode, comprising:
The security strategy provided this locality is classified according to the protection dynamics of correspondence;
Be the security strategy that corresponding classification is selected in each segmentation in described predetermined segment mode by predetermined policy, the protection dynamics of the security strategy that described predetermined policy comprises corresponding to the high segmentation of accumulation numerical value is not less than the protection dynamics of the security strategy corresponding to the low segmentation of accumulation numerical value.
9., according to the arbitrary described security policy configuration method of claim 1 to 8, it is characterized in that, before the described security strategy got is configured to the security strategy of described user account by the described mark according to described user account, described method also comprises:
Whether identical with the security strategy of the current configuration of described user account according to the described security strategy that the label detection of described user account gets;
If testing result is not identical, then perform the step that the described security strategy got is configured to the security strategy of described user account by the described mark according to described user account.
10., according to the arbitrary described security policy configuration method of claim 1 to 8, it is characterized in that, described security strategy comprises as at least one under type:
The accumulation numerical value limit that can consume in the 3rd time period is set;
The COS that setting can use;
Arrange predetermined alerting pattern to remind, described predetermined alerting pattern comprises at least one in inform by short message, mail reminder and personal letter prompting;
Dynamic password verification is set;
Arrange according to the checking of user's occupation mode, described occupation mode comprises described user account, and to send described service request information, described user account in the service that predetermined geographic locality sends described service request information and described service request information request by predetermined terminal be at least one in the service in reservation service list.
11. 1 kinds of security strategy inking devices, is characterized in that, described device comprises:
Information receiving module, for receiving the service request information from user account, described service request information comprises the mark of described user account;
Numerical value acquisition module, the described service request information for receiving according to described information receiving module obtains the accumulation numerical value that described user account history consumes;
Strategy acquisition module, for obtaining the security strategy corresponding with the described accumulation numerical value that described numerical value acquisition module gets;
Strategy configuration module, for being configured to the security strategy of described user account by the described security strategy that described tactful acquisition module gets according to the mark of described user account.
12. security strategy inking devices according to claim 11, is characterized in that, described tactful acquisition module, comprising:
Segmentation determining unit, for determining the segmentation at described accumulation numerical value place according to predetermined segment mode, described predetermined segment mode comprises at least two segmentations and adjacent two segmentations are end to end;
Strategy acquiring unit, for obtaining the security strategy corresponding with the described segmentation that described segmentation determining unit is determined according to predetermined corresponding relation, described predetermined corresponding relation is the corresponding relation between each segmentation and security strategy in described predetermined segment mode, thus determines the security strategy corresponding with described accumulation numerical value.
13. security strategy inking devices according to claim 12, it is characterized in that, described device, also comprises:
First acquisition module, for obtaining the accumulation numerical value of the first sample of users account at first time period internal consumption, described first sample of users account comprises at least one user account;
Segmentation determination module, determines described predetermined segment mode for each accumulation numerical value got according to described first acquisition module.
14. security strategy inking devices according to claim 13, is characterized in that, described segmentation determination module, comprising:
First sequencing unit, sorts according to numerical values recited for each accumulation numerical value got by described first acquisition module;
First division unit, for carrying out segmentation according to the first segmentation scales to the accumulation numerical value after described first sequencing unit sequence, and using described segmented mode as described predetermined segment mode.
15. security strategy inking devices according to claim 13, it is characterized in that, described device also comprises:
Second acquisition module, for obtaining the accumulation numerical value of the second sample of users account at the second time period internal consumption, described second sample of users account comprises at least one user account;
Segmentation update module, upgrades for each accumulation numerical value got according to described second acquisition module the described predetermined segment mode determined.
16. security strategy inking devices according to claim 15, is characterized in that, described segmentation update module, comprising:
Second sequencing unit, sorts according to numerical values recited for each accumulation numerical value got by described second acquisition module;
Second division unit, for carrying out segmentation according to the second segmentation scales to the accumulation numerical value after described second sequencing unit sequence;
Segmentation updating block, upgrades described predetermined segment mode for the described segmentation divided according to described second division unit.
17. security strategy inking devices according to claim 12, it is characterized in that, described device also comprises:
Relation sets up module, for the height of the accumulation numerical value corresponding to each segmentation in the protection dynamics of security strategy that provides according to this locality and described predetermined segment mode, set up the corresponding relation between each segmentation and security strategy in described predetermined segment mode;
Relationship determination module, for setting up the described corresponding relation of module foundation as described predetermined corresponding relation using described relation.
18. security strategy inking devices according to claim 17, it is characterized in that, described relation sets up module, comprising:
Policy class unit, classifies according to the protection dynamics of correspondence for the security strategy provided this locality;
Relation sets up unit, for being the security strategy that corresponding classification is selected in each segmentation in described predetermined segment mode by predetermined policy, the protection dynamics of the security strategy that described predetermined policy comprises corresponding to the high segmentation of accumulation numerical value is not less than the protection dynamics of the security strategy corresponding to the low segmentation of accumulation numerical value.
19. according to claim 10 to 18 arbitrary described security strategy inking devices, and it is characterized in that, described device also comprises:
Whether strategy detection module is identical with the security strategy of the current configuration of described user account for the described security strategy got according to the label detection of described user account;
Configuration Executive Module, for when the testing result of described tactful detection module is not identical, performs the step that the described security strategy got is configured to the security strategy of described user account by the described mark according to described user account.
20. according to claim 10 to 18 arbitrary described security strategy inking devices, and it is characterized in that, described security strategy comprises as at least one under type:
The accumulation numerical value limit that can consume in the 3rd time period is set;
The COS that setting can use;
Arrange predetermined alerting pattern to remind, described predetermined alerting pattern comprises at least one in inform by short message, mail reminder and personal letter prompting;
Dynamic password verification is set;
Arrange according to the checking of user's occupation mode, described occupation mode comprises described user account, and to send described service request information, described user account in the service that predetermined geographic locality sends described service request information and described service request information request by predetermined terminal be at least one in the service in reservation service list.
21. 1 kinds of servers, is characterized in that, it comprise as arbitrary in claim 10 to 20 as described in security strategy inking device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310377022.5A CN104426860B (en) | 2013-08-26 | 2013-08-26 | Security policy configuration method, device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310377022.5A CN104426860B (en) | 2013-08-26 | 2013-08-26 | Security policy configuration method, device and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104426860A true CN104426860A (en) | 2015-03-18 |
CN104426860B CN104426860B (en) | 2019-05-28 |
Family
ID=52974817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310377022.5A Active CN104426860B (en) | 2013-08-26 | 2013-08-26 | Security policy configuration method, device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104426860B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669928A (en) * | 2018-12-11 | 2019-04-23 | 广东电网有限责任公司 | Tactics configuring method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1741057A (en) * | 2004-08-23 | 2006-03-01 | 祁勇 | Payment method and system based on authorization and control mechanism |
CN101308588A (en) * | 2007-05-15 | 2008-11-19 | 胡美英 | Method and system for user information check |
CN101447051A (en) * | 2007-11-27 | 2009-06-03 | 联想(北京)有限公司 | Payment method and payment device |
CN101582808A (en) * | 2009-06-10 | 2009-11-18 | 中兴通讯股份有限公司南京分公司 | Method, terminal and system for P2P up-down flow statistical management |
CN101621523A (en) * | 2009-07-22 | 2010-01-06 | 中兴通讯股份有限公司 | User security access control method as well as device and system thereof |
CN102082729A (en) * | 2011-01-30 | 2011-06-01 | 瑞斯康达科技发展股份有限公司 | Safety control method of access layer switch port and switch |
CN102082663A (en) * | 2009-11-27 | 2011-06-01 | 深圳市深信服电子科技有限公司 | Method for accessing application server based on VPN (virtual private network) security, network equipment and network system |
US20130018920A1 (en) * | 2011-07-12 | 2013-01-17 | Griffin Andrew M | Configuration management database security |
-
2013
- 2013-08-26 CN CN201310377022.5A patent/CN104426860B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1741057A (en) * | 2004-08-23 | 2006-03-01 | 祁勇 | Payment method and system based on authorization and control mechanism |
CN101308588A (en) * | 2007-05-15 | 2008-11-19 | 胡美英 | Method and system for user information check |
CN101447051A (en) * | 2007-11-27 | 2009-06-03 | 联想(北京)有限公司 | Payment method and payment device |
CN101582808A (en) * | 2009-06-10 | 2009-11-18 | 中兴通讯股份有限公司南京分公司 | Method, terminal and system for P2P up-down flow statistical management |
CN101621523A (en) * | 2009-07-22 | 2010-01-06 | 中兴通讯股份有限公司 | User security access control method as well as device and system thereof |
CN102082663A (en) * | 2009-11-27 | 2011-06-01 | 深圳市深信服电子科技有限公司 | Method for accessing application server based on VPN (virtual private network) security, network equipment and network system |
CN102082729A (en) * | 2011-01-30 | 2011-06-01 | 瑞斯康达科技发展股份有限公司 | Safety control method of access layer switch port and switch |
US20130018920A1 (en) * | 2011-07-12 | 2013-01-17 | Griffin Andrew M | Configuration management database security |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109669928A (en) * | 2018-12-11 | 2019-04-23 | 广东电网有限责任公司 | Tactics configuring method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104426860B (en) | 2019-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240340622A1 (en) | Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management | |
US10462627B2 (en) | Service plan design, user interfaces, application programming interfaces, and device management | |
CN104793938B (en) | Notification bar message display method and system | |
US9557889B2 (en) | Service plan design, user interfaces, application programming interfaces, and device management | |
EP2807835B1 (en) | Service plan design, user interfaces, application programming interfaces, and device management | |
CN106296142A (en) | A kind of method and system of pay this extra Channel Selection | |
CN108234475B (en) | Account management method, electronic equipment and computer storage medium | |
CN105103506B (en) | For the method and system for the non-homogeneous bandwidth request allocation bandwidth in system for cloud computing | |
CN102880956B (en) | Paying server and payment channel integration method | |
CN103679498B (en) | A kind of information-pushing method and its system to the network terminal | |
CN102104635A (en) | Method and device for updating Internet protocol (IP) address base | |
CN110493754B (en) | SIM card resource allocation method, system, terminal equipment and storage medium | |
CN105630977A (en) | Application recommending method, device and system | |
CN105871888A (en) | Identity authentication method, device and system | |
CN102902754A (en) | Method and device for searching interest point | |
CN102315955A (en) | Control method for setting obstruction for junk information and corresponding control device | |
CN106210153A (en) | The method for pushing of a kind of resource information, system and electronic equipment thereof | |
CN103415847B (en) | System and method for accessing service | |
CN109086289A (en) | A kind of media data processing method, client, medium and equipment | |
CN106355470A (en) | E-commerce snapping-up method and system | |
US8719927B2 (en) | Data filtering by using a communication device including an interface on a display showing a domain name | |
CN103095945A (en) | Charging method and charging system based on bill classification and classification charging device | |
CN106933822A (en) | A kind of content recommendation method and device | |
Yu et al. | Economics of public Wi-Fi monetization and advertising | |
KR102320337B1 (en) | Technology for Dynamic Zero-Rated Server Clusters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |