CN107743129A - Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times - Google Patents

Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times Download PDF

Info

Publication number
CN107743129A
CN107743129A CN201711065778.0A CN201711065778A CN107743129A CN 107743129 A CN107743129 A CN 107743129A CN 201711065778 A CN201711065778 A CN 201711065778A CN 107743129 A CN107743129 A CN 107743129A
Authority
CN
China
Prior art keywords
value
login
information
total
time point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711065778.0A
Other languages
Chinese (zh)
Inventor
黄银阁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201711065778.0A priority Critical patent/CN107743129A/en
Publication of CN107743129A publication Critical patent/CN107743129A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Abstract

The embodiment of the invention discloses a kind of method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times, wherein method includes setting the initial value t of Cookie expired times;Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;The weighted value according to corresponding to the first preset rules determine every group of characteristic information;Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and total characteristic value is calculated in weighted value;The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.The embodiment of the present invention can be the most suitable expired time of Cookie dynamically distributes, not only ensure that the security of user profile, also reduce the burden of service terminal.

Description

Method, terminal and the computer-readable storage of dynamically distributes Cookie expired times Medium
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method, the terminal of dynamically distributes Cookie expired times And computer-readable recording medium.
Background technology
Cookie refers to some websites to distinguish user identity, carry out session tracking and be stored in user local eventually Data (generally going through encryption) on end.The website of various content-forms is typically necessary the essential information for recording visitor, Such as user name, password, the mode that user accesses the number of the website, user does shopping in the website.And record access person's information Method be that visitor information is placed into Cookie, Cookie recorded in visitor views device, when user visits again When asking some website, service terminal will require that the cookie information being previously sent is searched and returned to visitor views device, to identify This user.Therefore in order to ensure user information safety, prevent leaking, it is necessary to set an expired time with regular for user profile Clear up Cookie.
At present, periodic cleaning Cookie method includes following two, and wherein the first mainly passes through developer certainly Main setting Cookie expired time, can be such that user does not have in the range of Cookie expired times when logging in the website every time Username and password is inputted, will automated log on success;Second mainly according to the private information of user generation this time login Signature unique, and the signature is saved in service end, while developer independently sets Cookie expired time, works as next time When the user logs in the website again, Cookie expired time is not only verified, also to verify the signing messages specifically generated Whether the signing messages preserved with service end is consistent, if unanimously, can login successfully;If it is inconsistent, it can dispose Cookie.But though first method is simple and convenient, there is potential safety hazard, once Cookie is stolen, the information of user also will be by Leakage;And though second method solves safety problem present in first method, also need to increase generation signature, deposit The step such as signature and signature verification so that method is increasingly complex, while reduces the operating rate of service terminal.
The content of the invention
The embodiment of the present invention provides a kind of method of dynamically distributes Cookie expired times, terminal and computer-readable storage Medium, it can be the most suitable expired time of Cookie dynamically distributes, not only ensure that the security of user profile, also reduce clothes The burden for terminal of being engaged in.
In a first aspect, the embodiments of the invention provide a kind of method of dynamically distributes Cookie expired times, this method bag Include:
The initial value t of Cookie expired times is set;
Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics, The also corresponding default characteristic value of every group of characteristic information;
The weighted value according to corresponding to the first preset rules determine every group of characteristic information;
Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and weighted value is calculated always Characteristic value;
The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
The embodiment of the present invention is by setting the initial value t of Cookie expired times;Obtain multigroup feature letter of user account Breath, wherein, every group of characteristic information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information; The weighted value according to corresponding to the first preset rules determine every group of characteristic information;Believed according to the second preset rules, every group of feature Characteristic value is preset corresponding to breath and total characteristic value is calculated in weighted value;The initial value t is adjusted according to the total characteristic value To obtain corresponding Cookie expired times;Can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again The burden of signature verification is carried out, improves the operating rate of service terminal.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention one provides Figure;
Fig. 1 a are the schematic flow diagrams of step S105 sub-step in the embodiment of the present invention one;
Fig. 2 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention two provides Figure;
Fig. 3 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention three provides Figure;
Fig. 4 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention four provides Figure;
Fig. 5 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention five provides Figure;
Fig. 6 is a kind of schematic block diagram for terminal that the embodiment of the present invention six provides;
Fig. 6 a are the schematic block diagrams of the subelement of adjustment unit 105 in the embodiment of the present invention six;
Fig. 7 is a kind of schematic block diagram for terminal that the embodiment of the present invention seven provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Embodiment one
Referring to Fig. 1, it is a kind of method for dynamically distributes Cookie expired times that the embodiment of the present invention one is provided Schematic flow diagram, as shown in the figure method may include:
Step S101, the initial value t of Cookie expired times is set.
Wherein, generally, the initial value t of a Cookie expired time need to be set as initial expired time, Change in order to carry out the adjustment of Cookie expired times according to follow-up actual conditions.
Step S102, multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding Characteristic, the also corresponding default characteristic value of every group of characteristic information.
Wherein, when login user account, multigroup characteristic information that behavior correlation is logged in user account can be produced, than Such as IP address information, login time information, line duration information and operation behavior information.Meanwhile every group of characteristic information can With including multiple corresponding characteristics, i.e., including multiple different characteristics.
In addition, every group of characteristic information can also correspond to a default characteristic value, default characteristic value herein can be according to actual feelings Condition is set.For example, when one of which characteristic information plays a part of exceeding default scope to the security of user account When, default characteristic value corresponding to it can be set as 1, and when one of which characteristic information is to the security of user account When playing a part of being not above default scope, then default characteristic value corresponding to it can be set as 0.
In general, multigroup characteristic information of user account can be collected by web crawlers, follow-up so as to realize The analysis of data.Wherein, reptile is the important component of search engine as a kind of automatic program for obtaining web page contents, Web crawlers is a kind of according to certain rule, the automatic program or script for obtaining web page content information.In this life embodiment In, the program that user account information can also can be obtained by other carries out information, and is not only only limited to network and climbs Worm.
Step S103, the weighted value according to corresponding to the first preset rules determine every group of characteristic information.
Wherein, every group of characteristic information corresponds to a weighted value, and the weighted value can be by the first preset rules and use Characteristic information corresponding to the account of family is determined.For example, IP address information can correspond to a weighted value, login time information A weighted value can be corresponded to, line duration information can correspond to a weighted value, and operation behavior information can also correspond to one Weighted value.Specifically, the size of weighted value can be configured regulation, the result that all weighted values are added according to actual conditions 1, which can be equal to, can also be not equal to 1.Especially, when one group of characteristic information plays promotion for the security performance of user account When effect or role are less, now weighted value corresponding to this group of characteristic information takes negative value, and when one group of feature is believed When the security performance ceased for user account plays opposite effect, weighted value corresponding to this group of characteristic information can be taken just Value, so as to more reasonably set Cookie expired times;If for example, IP address information, line duration information and behaviour Make behavioural information etc. to change, generally, play opposite effect for the security performance of user account, now need Take on the occasion of.
Step S104, characteristic value and weighted value are preset according to corresponding to the second preset rules, every group of characteristic information Total characteristic value is calculated.
Wherein, user can select the suitable mode for calculating total characteristic value according to actual conditions.It is i.e. default according to second Rule, obtain total characteristic value.Total characteristic value is bigger, then shows that stolen risk of the user account in login process is got over Greatly, now just need to carry out Cookie expired times corresponding change extension, and total characteristic value is smaller, then shows user Stolen risk of the account risk in login process is smaller, now just needs to change Cookie expired times accordingly Shorten.
As preferred embodiment, second preset rules can be equation below:
R=p1θ1+p2θ2+p3θ3+p4θ4
Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For power corresponding to IP address information Weight values, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For it is online when Between characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To be preset corresponding to operation behavior information Characteristic value, θ4For weighted value corresponding to operation behavior information.
For example, work as p1、p2、p3And p4When equal value is 1, now R value is θ1、θ2、θ3And θ4The sum being added.Again For example, work as p1、p2、p3Equal value is 1, p4When value is 0, the value of R now is θ1、θ2And θ3The sum being added.Total For, the influence for the risk that certain group characteristic information is stolen under the conditions of a certain for user account is bigger, now then needs this Weighted value corresponding to group characteristic information carries out tuning up processing, and influences smaller, then weighted value corresponding to this group of characteristic information is entered Row turns processing down;If the but venture influence that this group of characteristic information is stolen under conditions of opposite with a certain condition to user account Bigger, it is negative now to need this group of weight assignment, namely carries out turning processing down, and influences smaller, then this group of feature is believed Weighted value corresponding to breath is entered as negative and carries out tuning up processing.
Step S105, the initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
Wherein it is possible to according to the size of the total characteristic value, carried out on the basis of the initial value t of Cookie expired times Adjust so as to obtain the corresponding Cookie expired times needed, and the scope adjusted can be carried out accordingly according to actual conditions Set.
Specifically, as preferred embodiment, as shown in Figure 1a, the step S105 in the embodiment of the present invention one can also be wrapped Include following steps,
Step S105a, if the total characteristic value is more than pre-set threshold value, the Cookie expired times are arranged to described first The difference that initial value t and the first preset value subtract each other.
Wherein, when the total characteristic value is more than pre-set threshold value, then show that now user account is stolen very risky, is needed Shorten Cookie expired times, i.e., on the basis of initial value t, reduced accordingly, reduced value can be then first pre- If the size of value, first preset value can be set accordingly according to the demand of user, therefore can certainly reduce other Rational numerical value.
Step S105b, if the total characteristic value is less than pre-set threshold value, the Cookie expired times are arranged to described first Initial value t is added with the second preset value and value.
Wherein, when the total characteristic value is less than pre-set threshold value, then show now user account it is stolen there is very little risk, can With proper extension Cookie expired times, i.e., on the basis of initial value t, accordingly increased, value added can be then the The size of two preset values, second preset value can be set accordingly according to the demand of user, therefore can certainly be increased Other rational numerical value.
Step S105c, if the total characteristic value is equal to pre-set threshold value, keep the initial value t expired for the Cookie Time.Wherein, when the total characteristic value is equal to pre-set threshold value, show that now user account can be in the extension set at present Certain security performance is kept in Cookie expired times, that is to say, that ensure that the information of user account within this period It is small probability event to be stolen.
In a word, the embodiment of the present invention one can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again The burden of signature verification is carried out, improves the operating rate of service terminal.
Embodiment two
Referring to Fig. 2, the difference for the method that method that the embodiment of the present invention two is provided is provided with the embodiment of the present invention one It is, the characteristic information of the user account includes IP address information.Wherein, the IP address information includes the institute of user account There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom The address registration frequency of abnormity occurred during address is recorded, the step S103 includes:
Step S201, obtain total login times of all IP entry address.
Wherein, corresponded to after the data according to corresponding to web crawlers obtains user account, it is necessary to obtain the user account All logged IP entry address, then also need to count the login times of each IP entry address, to calculate To total login times of the user account, total login times of user account are total login times of all IP entry address.
Step S202, calculates the address registration frequency of abnormity and the ratio of total login times is stepped on obtaining an address Record abnormal probability.
Wherein, it is also necessary to it is determined that an IP entry address is altered to the address occurred during next IP entry address therefrom Frequency of abnormity is logged in, user account is stolen or occurred the feelings that can not be logged in after address registration refers to entry address change extremely Condition.And IP entry address occurs user account when changing and logs in abnormal situation, then show the variation of IP entry address for The security performance of family account has considerable influence, now needs above-mentioned address registration frequency of abnormity and total login time Several ratio is as address registration exception probability, to carry out subsequent treatment.
Step S203, the address registration exception probability is arranged to weighted value corresponding to the IP address information.
Wherein it is possible to address registration exception probability obtained above is arranged to weight corresponding to the IP address information Value, it is of course also possible to according to actual conditions to corresponding to the IP address information on the basis of this address registration exception probability Weighted value is set accordingly.
For example, total login times of all IP entry address can be 10000 times, an IP entry address change therefrom The address registration frequency of abnormity occurred during to next IP entry address is 30 times, and now address registration exception probability is 3/ 1000, weighted value now can also be 3/1000 accordingly.
Embodiment three
Referring to Fig. 3, the difference for the method that method that the embodiment of the present invention three is provided is provided with the embodiment of the present invention two It is, the characteristic information of the user account also includes login time information, and the login time information includes user account All login time points and total time point log in frequency of abnormity, and each time point logs in an abnormal corresponding login time Point, the step S103 also include:
Step S301, a time point range is set.
Wherein, the login time information includes all login time points of useful family account, for the ease of distinguishing user The time of concentration section that account logs in is, it is necessary to set a time point range, for example, can be by 6:00-22:00 is used as a time point Scope, and then can obtain 6:00-22:The quantity of the login time point of 00 user account in the range of this, can also be obtained The not quantity of the login time point of user account within the range, that is, obtain 0:00-6:00、22:00-24:00 the two The quantity of the login time point of user account in period.
Step S302, if the quantity of the login time point in the range of time point this described and all login time points The ratio of quantity is more than pre-set threshold value, it is determined that the time present in the login time point in the range of the time point does not step on Record frequency of abnormity.
Wherein it is possible to calculate the quantity of the login time point in the range of time point this described and all login time points Quantity ratio, if the ratio is greater than pre-set threshold value, show login of the user account in the range of the time point time Number is more, in order to determine risk that login time point logs in user account, now it needs to be determined that not being located at the time point In the range of login time point.
Step S303, calculate time login present in the login time point in the range of the time point Frequency of abnormity and the ratio of total login times log in abnormal probability to obtain a time point.
Wherein, for example, calculate the time present in the login time point in the range of the time point log in it is different The ratio of normal number and total login times, you can be located at obtaining user account 0:00-6:00、22:00-24:00 this The situation that is stolen or can not log in the range of two periods, the ratio is bigger, then shows the security performance of user account It is more unstable.
Step S304, the time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information.
Wherein it is possible to time point obtained above is logged in into abnormal probability is arranged to power corresponding to the login time information Weight values, it is of course also possible to according to actual conditions to the login time information on the basis of logging in abnormal probability at this time point Corresponding weighted value is set accordingly.
For example, when total login times of all IP entry address are 10000 times, 0:00-6:00、22:00-24:00 It is 10 times that time in the range of the two periods, which logs in frequency of abnormity, and it is 1/1000 that now time point, which logs in abnormal probability, phase The weighted value now answered can also be 1/1000.
Step S305, if the quantity of the login time point in the range of time point this described and all login time points The ratio of quantity is not more than pre-set threshold value, it is determined that the time present in the login time point in the range of time point this described steps on Record frequency of abnormity.
Wherein, if the quantity and the quantity of all login time points of the login time point in the range of time point this described Ratio be not more than pre-set threshold value, then show, the time that user typically logs in is probably 6:00-22:00 this time range The outer time, i.e., positioned at 0:00-6:00、22:00-24:00 the two periods, then then abnormal secondary in order to calculate time login Number, then to determine to be located at 6:00-22:Time present in login time point in 00 this time range logs in frequency of abnormity.
Step S306, it is different to calculate time login present in the login time point in the range of the time point The ratio of normal number and total login times logs in abnormal probability to obtain a time point.
Wherein it is possible to it is different to calculate time login present in the login time point in the range of the time point The ratio of normal number and total login times, and log in abnormal probability using the ratio as time point.
Step S307, the inverse value that the time point is logged in abnormal probability are arranged to corresponding to the login time information Weighted value.
Wherein, because of the quantity and the quantity of all login time points of the login time point in the range of the time point Ratio be not more than under conditions of pre-set threshold value, then show present in the login time point in the range of the time point Influence of the time login frequency of abnormity for the security performance of account is smaller, in order to which total characteristic value is more accurately calculated, needs The inverse value that the time point is logged in abnormal probability is arranged to weighted value corresponding to the login time information.
For example, when total login times of all IP entry address are 10000 times, 6:00-22:In 00 this period To log in frequency of abnormity be 10 times time, it is -1/1000 that now time point, which logs in abnormal probability, accordingly weighted value now Can be -1/1000.
Example IV
Referring to Fig. 4, the difference for the method that method that the embodiment of the present invention four is provided is provided with the embodiment of the present invention three It is, the characteristic information of the user account is additionally included in line temporal information, and it is every that the line duration information includes user account The time span of secondary login and total online login frequency of abnormity, it is online every time to log in the abnormal time length for corresponding to and once logging in Degree, the step S103 also include:
Step S401, according to total online login frequency of abnormity, it is determined that the time span that wherein ought once log in is with The difference of the time span once logged in is more than the existing online number for logging in exception during preset critical.Wherein, it is described Line temporal information includes the time span that user account logs in every time, further comprises total online login frequency of abnormity, now needs Judge whether the time span wherein once logged in and the difference of the time span logged in next time are more than preset critical, if greatly In preset critical, then show that the stolen risk of user account may increase, now need to further determine that all wherein one The difference of time span of the time span of secondary login with logging in next time when being more than preset critical it is existing log in online it is different Normal number.
Step S402, the online ratio for logging in abnormal number and total login times is calculated to obtain the time Length logs in abnormal probability.
Wherein, the online ratio for logging in abnormal number and total login times can be calculated, so as to further Obtain time span and log in abnormal probability, the follow-up weighted value of abnormal determine the probability is logged in further according to time span.
Step S403, the time span is logged in into abnormal probability and is arranged to weight corresponding to the line duration information Value.
Wherein it is possible to the time span is logged in into abnormal probability is arranged to weight corresponding to the line duration information Value, can also be set accordingly according to actual conditions.
For example, when total login times of all IP entry address are 10000 times, i.e. total login times of user account are At 10000 times, when wherein a login time is 3 small, and back to back login time next time is 10 minutes, and is preset It is as once online to log in the secondary of exception if situations such as user account generation is stolen or can not logged in when critical value is 2 hours Number, in this way, it is 50 times that the abnormal number of public online login, which is calculated, then time span now logs in abnormal probability It is then 5/1000, i.e., weighted value can also be 5/1000 accordingly corresponding to line duration information.
Embodiment five
Referring to Fig. 5, the difference for the method that method that the embodiment of the present invention five is provided is provided with the embodiment of the present invention four It is, the characteristic information of the user account also includes operation behavior information, and the operation behavior information includes user account pair Class of operation, total number of operations and the total operation answered log in frequency of abnormity, described to determine every group of spy according to the first preset rules Weighted value corresponding to reference breath also includes:
Step S501, frequency of abnormity is logged according to total operation, it is determined that when the class of operation is default abnormal operation classification When it is existing operation log in frequency of abnormity;
Wherein, manipulation behavior includes class of operation corresponding to user account, and the class of operation can include normal behaviour Make behavior, and the abnormal operation in class of operation can include the operations such as change password, modification subscriber data, and always operate login Frequency of abnormity then refers to all in progress change of secret code.Time that the user account occurred in subscriber data change procedure is stolen Number.
Step S502, the ratio for calculating the operation login frequency of abnormity and total login times are stepped on obtaining an operation Record abnormal probability.
Wherein, calculating the operation login frequency of abnormity and the always ratio of login times can talk endlessly one to operate and step on Abnormal probability is recorded, is calculated in order to carry out analysis in next step.
Step S503, the operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
Wherein, for example, when total login times of user account are 10000 times, if it is 20 times that operation, which logs in frequency of abnormity, Now, it is 1/500 that the operation, which logs in abnormal probability, and weighted value corresponding to the operation behavior information can also be 1/500.
Embodiment six
The embodiment of the present invention six also provides a kind of terminal, and the terminal is used to perform the method described in any one of foregoing embodiment Unit.Specifically, it is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 6.The terminal of the present embodiment 100 include:Setting unit 101, acquiring unit 102, determining unit 103, computing unit 104 and adjustment unit 105.
Setting unit 101, for setting the initial value t of Cookie expired times.
Specifically, wherein, generally, the initial value t of a Cookie expired time need to be set as initial mistake Time phase, change in order to carry out the adjustment of Cookie expired times according to follow-up actual conditions.
Acquiring unit 102, for obtaining multigroup characteristic information of user account, wherein, every group of characteristic information includes more Individual corresponding characteristic, the also corresponding default characteristic value of every group of characteristic information.
Specifically, wherein, when login user account, it can produce and multigroup log in the related feature of behavior with user account Information, such as IP address information, login time information, line duration information and operation behavior information etc..Meanwhile every group of feature Information can include multiple corresponding characteristics, i.e., including multiple different characteristics.
In addition, every group of characteristic information can also correspond to a default characteristic value, default characteristic value herein can be according to actual feelings Condition is set.For example, when one of which characteristic information plays a part of exceeding default scope to the security of user account When, default characteristic value corresponding to it can be set as 1, and when one of which characteristic information is to the security of user account When playing a part of being not above default scope, then default characteristic value corresponding to it can be set as 0.
In general, multigroup characteristic information of user account can be collected by web crawlers, follow-up so as to realize The analysis of data.Wherein, reptile is the important component of search engine as a kind of automatic program for obtaining web page contents, Web crawlers is a kind of according to certain rule, the automatic program or script for obtaining web page content information.In this life embodiment In, the program that user account information can also can be obtained by other carries out information, and is not only only limited to network and climbs Worm.
Determining unit 103, for weighted value corresponding to determining every group of characteristic information according to the first preset rules.
Specifically, every group of characteristic information corresponds to a weighted value, the weighted value can by the first preset rules and Characteristic information corresponding to user account is determined.For example, IP address information can correspond to a weighted value, login time letter Breath can correspond to a weighted value, and line duration information can correspond to a weighted value, and operation behavior information can also correspond to one Individual weighted value.Specifically, the size of weighted value can be configured regulation, the knot that all weighted values are added according to actual conditions Fruit, which can be equal to 1, can also be not equal to 1.Especially, when one group of characteristic information plays rush for the security performance of user account When entering effect or less role, now weighted value corresponding to this group of characteristic information takes negative value, and when one group of feature When information plays opposite effect for the security performance of user account, weighted value corresponding to this group of characteristic information can be taken just Value, so as to more reasonably set Cookie expired times;If for example, IP address information, line duration information and behaviour Make behavioural information etc. to change, generally, play opposite effect for the security performance of user account, now need Take on the occasion of.
Computing unit 104, for according to corresponding to the second preset rules, every group of characteristic information preset characteristic value and Total characteristic value is calculated in weighted value.
Specifically, user can select the suitable mode for calculating total characteristic value according to actual conditions.It is i.e. pre- according to second If regular, total characteristic value is obtained.Total characteristic value is bigger, then shows stolen risk of the user account in login process It is bigger, now just need to carry out Cookie expired times corresponding change extension, and total characteristic value is smaller, then shows to use Stolen risk of the family account risk in login process is smaller, now just needs to become Cookie expired times accordingly More shorten.
As preferred embodiment, second preset rules can be equation below:
R=p1θ1+p2θ2+p3θ3+p4θ4
Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For power corresponding to IP address information Weight values, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For it is online when Between characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To be preset corresponding to operation behavior information Characteristic value, θ4For weighted value corresponding to operation behavior information.
For example, work as p1、p2、p3And p4When equal value is 1, now R value is θ1、θ2、θ3And θ4The sum being added.Again For example, work as p1、p2、p3Equal value is 1, p4When value is 0, the value of R now is θ1、θ2And θ3The sum being added.Total For, the influence for the risk that certain group characteristic information is stolen under the conditions of a certain for user account is bigger, now then needs this Weighted value corresponding to group characteristic information carries out tuning up processing, and influences smaller, then weighted value corresponding to this group of characteristic information is entered Row turns processing down;If the but venture influence that this group of characteristic information is stolen under conditions of opposite with a certain condition to user account Bigger, it is negative now to need this group of weight assignment, namely carries out turning processing down, and influences smaller, then this group of feature is believed Weighted value corresponding to breath is entered as negative and carries out tuning up processing.
Adjustment unit 105, it is expired to obtain corresponding Cookie for adjusting the initial value t according to the total characteristic value Time.
Wherein it is possible to according to the size of the total characteristic value, carried out on the basis of the initial value t of Cookie expired times Adjust so as to obtain the corresponding Cookie expired times needed, and the scope adjusted can be carried out accordingly according to actual conditions Set.
Specifically, as preferred embodiment, as shown in Figure 6 a, the adjustment unit 105 in the embodiment of the present invention six may be used also With including with lower unit,
First processing units 105a, if being more than pre-set threshold value for the total characteristic value, by the Cookie expired times It is arranged to the difference that the initial value t and the first preset value subtract each other.
Specifically, when the total characteristic value is more than pre-set threshold value, then show that now user account is stolen very risky, Need to shorten Cookie expired times, i.e., on the basis of initial value t, reduced accordingly, reduced value can be then first The size of preset value, first preset value can be set accordingly according to the demand of user, therefore can certainly reduce it His rational numerical value.
As preferred embodiment, the embodiment of the present invention one can also comprise the following steps,
Second processing unit 105b, if being less than pre-set threshold value for the total characteristic value, by the Cookie expired times It is arranged to the initial value t is added with the second preset value and value.
Specifically, when the total characteristic value is less than pre-set threshold value, then show now user account it is stolen there is very little risk, That is, on the basis of initial value t, it can be accordingly increased, value added can be then with proper extension Cookie expired times The size of second preset value, second preset value can be set accordingly according to the demand of user, therefore can certainly be increased Add other rational numerical value.
3rd processing unit 105c, if being equal to pre-set threshold value for the total characteristic value, it is described to keep the initial value t Cookie expired times.Wherein, when the total characteristic value is equal to pre-set threshold value, show that now user account can be set at present Certain security performance is kept in the extension Cookie expired times put, that is to say, that ensure that the information of user account at this Be stolen in period is small probability event.
In a word, the embodiment of the present invention one can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again The burden of signature verification is carried out, improves the operating rate of service terminal.
Embodiment 7
It is a kind of terminal schematic block diagram that another embodiment of the present invention provides referring to Fig. 7.In the present embodiment as depicted Terminal can include:One or more processors 701;One or more input equipments 702, one or more output equipments 703 and memory 704.Above-mentioned processor 701, input equipment 702, output equipment 703 and memory 704 are connected by bus 705 Connect.Memory 702 is used to store computer program, and the computer program includes programmed instruction, and processor 701 is deposited for execution The programmed instruction that reservoir 702 stores.Wherein, processor 701 is arranged to call described program instruction to perform:
The initial value t of Cookie expired times is set;Multigroup characteristic information of user account is obtained, wherein, every group of feature Information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;According to the first preset rules Determine weighted value corresponding to every group of characteristic information;Feature is preset according to corresponding to the second preset rules, every group of characteristic information Total characteristic value is calculated in value and weighted value;It is corresponding to obtain that the initial value t is adjusted according to the total characteristic value Cookie expired times.
If the processor 701, which also performs the total characteristic value, is more than pre-set threshold value, the Cookie expired times are set It is set to the difference that the initial value t and the first preset value subtract each other;If the total characteristic value is less than pre-set threshold value, by the Cookie Expired time is arranged to the initial value t is added with the second preset value and value;If the total characteristic value is equal to pre-set threshold value, protect It is the Cookie expired times to hold the initial value t.
When the characteristic information of the user account includes IP address information, the IP address information includes the institute of user account There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom When recording the address registration frequency of abnormity occurred during address, the processor 701, which also performs, obtains always stepping on for all IP entry address Record number;Calculate the address registration frequency of abnormity and the ratio of total login times is extremely general to obtain an address registration Rate;The address registration exception probability is arranged to weighted value corresponding to the IP address information.
When the characteristic information of the user account also includes login time information, the login time information includes user's account Number all login time points and total time point log in frequency of abnormity, when each time point logs in abnormal corresponding one and logged in Between when putting, the processor 701, which is additionally operable to perform, sets a time point range;If the login in the range of time point this described The ratio of the quantity at time point and the quantity of all login time points is more than pre-set threshold value, it is determined that not being located at the time point model Time present in login time point in enclosing logs in frequency of abnormity;It is not located at stepping in the range of the time point described in calculating It is abnormal to obtain time point login with the ratio of total login times that time present in record time point logs in frequency of abnormity Probability;The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;It is if described positioned at this The ratio of the quantity of login time point in the range of time point and the quantity of all login time points is not more than pre-set threshold value, it is determined that Time present in login time point in the range of time point this described logs in frequency of abnormity;Calculate described described positioned at this Time present in login time point in the range of time point logs in frequency of abnormity with the ratio of the always login times to obtain One time point logged in abnormal probability;The inverse value that the time point is logged in abnormal probability is arranged to the login time information pair The weighted value answered.
When the characteristic information of the user account is additionally included in line temporal information, the line duration information includes user's account Number time span logged in every time and it is total it is online log in frequency of abnormity, every time it is online log in it is abnormal it is corresponding once log in when Between length when, the processor 701 be additionally operable to perform according to it is described it is total online log in frequency of abnormity, it is determined that wherein ought once log in Time span and the difference of time span that logs in next time be more than during preset critical it is existing it is online log in it is abnormal secondary Number;It is abnormal general to obtain time span login with the ratio of total login times to calculate the online number for logging in exception Rate;The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
When the characteristic information of the user account also includes operation behavior information, the operation behavior information includes user's account When class of operation, total number of operations and total operation log in frequency of abnormity corresponding to number, the processor 701 is additionally operable to perform root According to total operation login frequency of abnormity, it is determined that existing operation logs in exception when the class of operation is default abnormal operation classification Number;Calculate the operation login frequency of abnormity and the ratio of total login times logs in abnormal probability to obtain an operation; The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 703 can include display (LCD etc.), loudspeaker etc..
The memory 704 can include read-only storage and random access memory, and to processor 701 provide instruction and Data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory 704 can also be deposited Store up the information of device type.
In the specific implementation, processor 701, input equipment 702, the output equipment 703 described in the embodiment of the present invention can In the first embodiment and second embodiment that perform the method for dynamically distributes Cookie expired times provided in an embodiment of the present invention Described implementation, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction is realized when being executed by processor:
The initial value t of Cookie expired times is set;Multigroup characteristic information of user account is obtained, wherein, every group of feature Information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;According to the first preset rules Determine weighted value corresponding to every group of characteristic information;Feature is preset according to corresponding to the second preset rules, every group of characteristic information Total characteristic value is calculated in value and weighted value;It is corresponding to obtain that the initial value t is adjusted according to the total characteristic value Cookie expired times.
If the processor, which also performs the total characteristic value, is more than pre-set threshold value, the Cookie expired times are arranged to The difference that the initial value t and the first preset value subtract each other;If realizing, the total characteristic value is less than pre-set threshold value, by the Cookie Expired time is arranged to the initial value t is added with the second preset value and value;If the total characteristic value is equal to pre-set threshold value, protect It is the Cookie expired times to hold the initial value t.
When the characteristic information of the user account includes IP address information, the IP address information includes the institute of user account There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom When recording the address registration frequency of abnormity occurred during address, the processor, which also performs, realizes always stepping on for all IP entry address of acquisition Record number;Calculate the address registration frequency of abnormity and the ratio of total login times is extremely general to obtain an address registration Rate;The address registration exception probability is arranged to weighted value corresponding to the IP address information.
When the characteristic information of the user account also includes login time information, the login time information includes user's account Number all login time points and total time point log in frequency of abnormity, when each time point logs in abnormal corresponding one and logged in Between when putting, the processor, which is additionally operable to perform, to be realized and sets a time point range;If stepping in the range of time point this described The ratio for recording the quantity at time point and the quantity of all login time points is more than pre-set threshold value, it is determined that not being located at the time point In the range of login time point present in the time log in frequency of abnormity;Described in calculating not in the range of the time point It is different to obtain time point login with the ratio of total login times that time present in login time point logs in frequency of abnormity Normal probability;The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;If positioned at the institute The ratio for stating the quantity of the login time point in the range of time point and the quantity of all login time points is not more than pre-set threshold value, really Time present in the login time point being positioned in the range of the time point logs in frequency of abnormity;Calculate described positioned at the institute State time present in the login time point in the range of time point log in the ratio of frequency of abnormity and total login times with Abnormal probability is logged in a time point;The inverse value that the time point is logged in abnormal probability is arranged to the login time information Corresponding weighted value.
When the characteristic information of the user account is additionally included in line temporal information, the line duration information includes user's account Number time span logged in every time and it is total it is online log in frequency of abnormity, every time it is online log in it is abnormal it is corresponding once log in when Between length when, the processor be additionally operable to perform realize according to it is described it is total online log in frequency of abnormity, it is determined that wherein ought once step on The difference of the time span of record and the time span logged in next time is more than existing online login exception during preset critical Number;The ratio for calculating the abnormal number of the online login and total login times logs in exception to obtain a time span Probability;The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
When the characteristic information of the user account also includes operation behavior information, the operation behavior information includes user's account When class of operation, total number of operations and total operation log in frequency of abnormity corresponding to number, the processor is additionally operable to perform realization Frequency of abnormity is logged according to total operation, it is determined that the existing operation when the class of operation of operation behavior is default abnormal operation classification Log in frequency of abnormity;It is different to obtain operation login with the ratio of total login times to calculate the operation login frequency of abnormity Normal probability;The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. method of dynamically distributes Cookie expired times, it is characterised in that including:
    The initial value t of Cookie expired times is set;
    Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics, every group The also corresponding default characteristic value of characteristic information;
    The weighted value according to corresponding to the first preset rules determine every group of characteristic information;
    Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and total characteristic is calculated in weighted value Value;
    The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
  2. 2. according to the method for claim 1, it is characterised in that described that the initial value t is adjusted according to the total characteristic value To obtain corresponding Cookie expired times, including:
    If the total characteristic value is more than pre-set threshold value, it is pre- that the Cookie expired times are arranged to the initial value t and first If the difference that value is subtracted each other;
    If the total characteristic value is less than pre-set threshold value, it is pre- that the Cookie expired times are arranged to the initial value t and second If value is added and value;
    If the total characteristic value is equal to pre-set threshold value, it is the Cookie expired times to keep the initial value t.
  3. 3. according to the method for claim 1, it is characterised in that the characteristic information of the user account is believed including IP address Breath, all IP entry address of the IP address information including user account, the login times of each IP entry address and from One of IP entry address is altered to the address registration frequency of abnormity occurred during next IP entry address, described according to first Preset rules determine that weighted value corresponding to every group of characteristic information includes:
    Obtain total login times of all IP entry address;
    The ratio of the address registration frequency of abnormity and total login times is calculated to obtain an address registration exception probability;
    The address registration exception probability is arranged to weighted value corresponding to the IP address information.
  4. 4. according to the method for claim 3, it is characterised in that the characteristic information of the user account also includes login time Information, the login time information includes all login time points of user account and total time point logs in frequency of abnormity, often Secondary time point logs in an abnormal corresponding login time point, described to determine that every group of characteristic information is corresponding according to the first preset rules Weighted value also include:
    One time point range is set;
    If the ratio of the quantity of the login time point in the range of time point this described and the quantity of all login time points is big In pre-set threshold value, it is determined that the time present in the login time point in the range of the time point does not log in frequency of abnormity;
    It is not located at time login frequency of abnormity and institute present in the login time point in the range of the time point described in calculating The ratio for stating total login times logs in abnormal probability to obtain a time point;
    The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;
    If the ratio of the quantity of the login time point in the range of time point this described and the quantity of all login time points is not More than pre-set threshold value, it is determined that the time present in login time point in the range of time point this described logs in frequency of abnormity;
    Calculate the time present in the login time point in the range of the time point log in frequency of abnormity with it is described The ratio of total login times logs in abnormal probability to obtain a time point;
    The inverse value that the time point is logged in abnormal probability is arranged to weighted value corresponding to the login time information.
  5. 5. according to the method for claim 4, it is characterised in that the characteristic information of the user account is additionally included in the line time Information, the line duration information include time span and the total online login frequency of abnormity that user account logs in every time, often The secondary online exception that logs in corresponds to the time span once logged in, described to determine every group of characteristic information pair according to the first preset rules The weighted value answered also includes:
    According to total online login frequency of abnormity, it is determined that the time span that wherein ought once log in and the time logged in next time The difference of length is more than the existing online number for logging in exception during preset critical;
    The ratio for calculating the abnormal number of the online login and total login times logs in exception to obtain a time span Probability;
    The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
  6. 6. according to the method for claim 5, it is characterised in that the characteristic information of the user account also includes operation behavior Information, the operation behavior information include class of operation corresponding to user account, total number of operations and total operation and log in exception Number, the weighted value according to corresponding to the first preset rules determine every group of characteristic information also include:
    Frequency of abnormity is logged according to total operation, it is determined that existing operation is stepped on when the class of operation is default abnormal operation classification Record frequency of abnormity;
    Calculate the operation login frequency of abnormity and the ratio of total login times logs in abnormal probability to obtain an operation;
    The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
  7. 7. according to the method for claim 6, it is characterised in that second preset rules are equation below:
    R=p1θ1+p2θ2+p3θ3+p4θ4
    Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For weight corresponding to IP address information Value, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For line duration Characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To preset spy corresponding to operation behavior information Value indicative, θ4For weighted value corresponding to operation behavior information.
  8. 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
  9. 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
CN201711065778.0A 2017-11-02 2017-11-02 Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times Withdrawn CN107743129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711065778.0A CN107743129A (en) 2017-11-02 2017-11-02 Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711065778.0A CN107743129A (en) 2017-11-02 2017-11-02 Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times

Publications (1)

Publication Number Publication Date
CN107743129A true CN107743129A (en) 2018-02-27

Family

ID=61233114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711065778.0A Withdrawn CN107743129A (en) 2017-11-02 2017-11-02 Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times

Country Status (1)

Country Link
CN (1) CN107743129A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444534A (en) * 2020-03-12 2020-07-24 中国建设银行股份有限公司 Method, device, equipment and computer readable medium for monitoring user operation

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration
CN104852886A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Protection method and device for user account
CN106611026A (en) * 2015-10-27 2017-05-03 北京国双科技有限公司 Cookie planting and processing methods and devices
CN107172104A (en) * 2017-07-17 2017-09-15 顺丰科技有限公司 One kind logs in method for detecting abnormality, system and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration
CN104852886A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Protection method and device for user account
CN106611026A (en) * 2015-10-27 2017-05-03 北京国双科技有限公司 Cookie planting and processing methods and devices
CN107172104A (en) * 2017-07-17 2017-09-15 顺丰科技有限公司 One kind logs in method for detecting abnormality, system and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111444534A (en) * 2020-03-12 2020-07-24 中国建设银行股份有限公司 Method, device, equipment and computer readable medium for monitoring user operation

Similar Documents

Publication Publication Date Title
Li et al. Privacy protection for preventing data over-collection in smart city
Chin et al. Measuring user confidence in smartphone security and privacy
US8365246B2 (en) Protecting confidential information on network sites based on security awareness
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN107515890A (en) A kind of method and terminal for identifying resident point
CN106534572A (en) Information display method and device and terminal
US20120239540A1 (en) Systems, devices and methods for automatic detection and masking of private data
CN107632722A (en) A kind of various dimensions user ID authentication method and device
CN109241302B (en) Online course comment authorization method and device and terminal equipment
CN109937564A (en) The fraudulent account detected in distributed computing system uses
CN107657156A (en) User ID authentication method and device based on user operation habits and contact pressure area
CN107491732A (en) A kind of identity authentication method and terminal
Shema Effective credit scoring using limited mobile phone data
CN108400868A (en) Storage method, device and the mobile terminal of seed key
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107491300A (en) The reminding method and its terminal of a kind of intelligent function
WO2014113405A2 (en) Systems and methods for processing and displaying user-generated content
CN109274639A (en) The recognition methods of open platform abnormal data access and device
CN107466031A (en) A kind of method and terminal for protecting data
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN107766708A (en) Nullify method, terminal and the computer-readable recording medium of account Entered state
CN108289028A (en) A kind of signature authentication method, relevant device and computer readable storage medium
CN105868625B (en) Method and device for intercepting restart deletion of file
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN106851613A (en) Service request method, the verification method of business handling number and its terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180227

WW01 Invention patent application withdrawn after publication