CN107743129A - Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times - Google Patents
Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times Download PDFInfo
- Publication number
- CN107743129A CN107743129A CN201711065778.0A CN201711065778A CN107743129A CN 107743129 A CN107743129 A CN 107743129A CN 201711065778 A CN201711065778 A CN 201711065778A CN 107743129 A CN107743129 A CN 107743129A
- Authority
- CN
- China
- Prior art keywords
- value
- login
- information
- total
- time point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
The embodiment of the invention discloses a kind of method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times, wherein method includes setting the initial value t of Cookie expired times;Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;The weighted value according to corresponding to the first preset rules determine every group of characteristic information;Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and total characteristic value is calculated in weighted value;The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.The embodiment of the present invention can be the most suitable expired time of Cookie dynamically distributes, not only ensure that the security of user profile, also reduce the burden of service terminal.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method, the terminal of dynamically distributes Cookie expired times
And computer-readable recording medium.
Background technology
Cookie refers to some websites to distinguish user identity, carry out session tracking and be stored in user local eventually
Data (generally going through encryption) on end.The website of various content-forms is typically necessary the essential information for recording visitor,
Such as user name, password, the mode that user accesses the number of the website, user does shopping in the website.And record access person's information
Method be that visitor information is placed into Cookie, Cookie recorded in visitor views device, when user visits again
When asking some website, service terminal will require that the cookie information being previously sent is searched and returned to visitor views device, to identify
This user.Therefore in order to ensure user information safety, prevent leaking, it is necessary to set an expired time with regular for user profile
Clear up Cookie.
At present, periodic cleaning Cookie method includes following two, and wherein the first mainly passes through developer certainly
Main setting Cookie expired time, can be such that user does not have in the range of Cookie expired times when logging in the website every time
Username and password is inputted, will automated log on success;Second mainly according to the private information of user generation this time login
Signature unique, and the signature is saved in service end, while developer independently sets Cookie expired time, works as next time
When the user logs in the website again, Cookie expired time is not only verified, also to verify the signing messages specifically generated
Whether the signing messages preserved with service end is consistent, if unanimously, can login successfully;If it is inconsistent, it can dispose
Cookie.But though first method is simple and convenient, there is potential safety hazard, once Cookie is stolen, the information of user also will be by
Leakage;And though second method solves safety problem present in first method, also need to increase generation signature, deposit
The step such as signature and signature verification so that method is increasingly complex, while reduces the operating rate of service terminal.
The content of the invention
The embodiment of the present invention provides a kind of method of dynamically distributes Cookie expired times, terminal and computer-readable storage
Medium, it can be the most suitable expired time of Cookie dynamically distributes, not only ensure that the security of user profile, also reduce clothes
The burden for terminal of being engaged in.
In a first aspect, the embodiments of the invention provide a kind of method of dynamically distributes Cookie expired times, this method bag
Include:
The initial value t of Cookie expired times is set;
Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics,
The also corresponding default characteristic value of every group of characteristic information;
The weighted value according to corresponding to the first preset rules determine every group of characteristic information;
Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and weighted value is calculated always
Characteristic value;
The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect
The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch
The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use
In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
The embodiment of the present invention is by setting the initial value t of Cookie expired times;Obtain multigroup feature letter of user account
Breath, wherein, every group of characteristic information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;
The weighted value according to corresponding to the first preset rules determine every group of characteristic information;Believed according to the second preset rules, every group of feature
Characteristic value is preset corresponding to breath and total characteristic value is calculated in weighted value;The initial value t is adjusted according to the total characteristic value
To obtain corresponding Cookie expired times;Can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter
The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again
The burden of signature verification is carried out, improves the operating rate of service terminal.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention one provides
Figure;
Fig. 1 a are the schematic flow diagrams of step S105 sub-step in the embodiment of the present invention one;
Fig. 2 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention two provides
Figure;
Fig. 3 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention three provides
Figure;
Fig. 4 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention four provides
Figure;
Fig. 5 is a kind of exemplary flow of the method for dynamically distributes Cookie expired times that the embodiment of the present invention five provides
Figure;
Fig. 6 is a kind of schematic block diagram for terminal that the embodiment of the present invention six provides;
Fig. 6 a are the schematic block diagrams of the subelement of adjustment unit 105 in the embodiment of the present invention six;
Fig. 7 is a kind of schematic block diagram for terminal that the embodiment of the present invention seven provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Embodiment one
Referring to Fig. 1, it is a kind of method for dynamically distributes Cookie expired times that the embodiment of the present invention one is provided
Schematic flow diagram, as shown in the figure method may include:
Step S101, the initial value t of Cookie expired times is set.
Wherein, generally, the initial value t of a Cookie expired time need to be set as initial expired time,
Change in order to carry out the adjustment of Cookie expired times according to follow-up actual conditions.
Step S102, multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding
Characteristic, the also corresponding default characteristic value of every group of characteristic information.
Wherein, when login user account, multigroup characteristic information that behavior correlation is logged in user account can be produced, than
Such as IP address information, login time information, line duration information and operation behavior information.Meanwhile every group of characteristic information can
With including multiple corresponding characteristics, i.e., including multiple different characteristics.
In addition, every group of characteristic information can also correspond to a default characteristic value, default characteristic value herein can be according to actual feelings
Condition is set.For example, when one of which characteristic information plays a part of exceeding default scope to the security of user account
When, default characteristic value corresponding to it can be set as 1, and when one of which characteristic information is to the security of user account
When playing a part of being not above default scope, then default characteristic value corresponding to it can be set as 0.
In general, multigroup characteristic information of user account can be collected by web crawlers, follow-up so as to realize
The analysis of data.Wherein, reptile is the important component of search engine as a kind of automatic program for obtaining web page contents,
Web crawlers is a kind of according to certain rule, the automatic program or script for obtaining web page content information.In this life embodiment
In, the program that user account information can also can be obtained by other carries out information, and is not only only limited to network and climbs
Worm.
Step S103, the weighted value according to corresponding to the first preset rules determine every group of characteristic information.
Wherein, every group of characteristic information corresponds to a weighted value, and the weighted value can be by the first preset rules and use
Characteristic information corresponding to the account of family is determined.For example, IP address information can correspond to a weighted value, login time information
A weighted value can be corresponded to, line duration information can correspond to a weighted value, and operation behavior information can also correspond to one
Weighted value.Specifically, the size of weighted value can be configured regulation, the result that all weighted values are added according to actual conditions
1, which can be equal to, can also be not equal to 1.Especially, when one group of characteristic information plays promotion for the security performance of user account
When effect or role are less, now weighted value corresponding to this group of characteristic information takes negative value, and when one group of feature is believed
When the security performance ceased for user account plays opposite effect, weighted value corresponding to this group of characteristic information can be taken just
Value, so as to more reasonably set Cookie expired times;If for example, IP address information, line duration information and behaviour
Make behavioural information etc. to change, generally, play opposite effect for the security performance of user account, now need
Take on the occasion of.
Step S104, characteristic value and weighted value are preset according to corresponding to the second preset rules, every group of characteristic information
Total characteristic value is calculated.
Wherein, user can select the suitable mode for calculating total characteristic value according to actual conditions.It is i.e. default according to second
Rule, obtain total characteristic value.Total characteristic value is bigger, then shows that stolen risk of the user account in login process is got over
Greatly, now just need to carry out Cookie expired times corresponding change extension, and total characteristic value is smaller, then shows user
Stolen risk of the account risk in login process is smaller, now just needs to change Cookie expired times accordingly
Shorten.
As preferred embodiment, second preset rules can be equation below:
R=p1θ1+p2θ2+p3θ3+p4θ4
Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For power corresponding to IP address information
Weight values, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For it is online when
Between characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To be preset corresponding to operation behavior information
Characteristic value, θ4For weighted value corresponding to operation behavior information.
For example, work as p1、p2、p3And p4When equal value is 1, now R value is θ1、θ2、θ3And θ4The sum being added.Again
For example, work as p1、p2、p3Equal value is 1, p4When value is 0, the value of R now is θ1、θ2And θ3The sum being added.Total
For, the influence for the risk that certain group characteristic information is stolen under the conditions of a certain for user account is bigger, now then needs this
Weighted value corresponding to group characteristic information carries out tuning up processing, and influences smaller, then weighted value corresponding to this group of characteristic information is entered
Row turns processing down;If the but venture influence that this group of characteristic information is stolen under conditions of opposite with a certain condition to user account
Bigger, it is negative now to need this group of weight assignment, namely carries out turning processing down, and influences smaller, then this group of feature is believed
Weighted value corresponding to breath is entered as negative and carries out tuning up processing.
Step S105, the initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
Wherein it is possible to according to the size of the total characteristic value, carried out on the basis of the initial value t of Cookie expired times
Adjust so as to obtain the corresponding Cookie expired times needed, and the scope adjusted can be carried out accordingly according to actual conditions
Set.
Specifically, as preferred embodiment, as shown in Figure 1a, the step S105 in the embodiment of the present invention one can also be wrapped
Include following steps,
Step S105a, if the total characteristic value is more than pre-set threshold value, the Cookie expired times are arranged to described first
The difference that initial value t and the first preset value subtract each other.
Wherein, when the total characteristic value is more than pre-set threshold value, then show that now user account is stolen very risky, is needed
Shorten Cookie expired times, i.e., on the basis of initial value t, reduced accordingly, reduced value can be then first pre-
If the size of value, first preset value can be set accordingly according to the demand of user, therefore can certainly reduce other
Rational numerical value.
Step S105b, if the total characteristic value is less than pre-set threshold value, the Cookie expired times are arranged to described first
Initial value t is added with the second preset value and value.
Wherein, when the total characteristic value is less than pre-set threshold value, then show now user account it is stolen there is very little risk, can
With proper extension Cookie expired times, i.e., on the basis of initial value t, accordingly increased, value added can be then the
The size of two preset values, second preset value can be set accordingly according to the demand of user, therefore can certainly be increased
Other rational numerical value.
Step S105c, if the total characteristic value is equal to pre-set threshold value, keep the initial value t expired for the Cookie
Time.Wherein, when the total characteristic value is equal to pre-set threshold value, show that now user account can be in the extension set at present
Certain security performance is kept in Cookie expired times, that is to say, that ensure that the information of user account within this period
It is small probability event to be stolen.
In a word, the embodiment of the present invention one can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter
The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again
The burden of signature verification is carried out, improves the operating rate of service terminal.
Embodiment two
Referring to Fig. 2, the difference for the method that method that the embodiment of the present invention two is provided is provided with the embodiment of the present invention one
It is, the characteristic information of the user account includes IP address information.Wherein, the IP address information includes the institute of user account
There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom
The address registration frequency of abnormity occurred during address is recorded, the step S103 includes:
Step S201, obtain total login times of all IP entry address.
Wherein, corresponded to after the data according to corresponding to web crawlers obtains user account, it is necessary to obtain the user account
All logged IP entry address, then also need to count the login times of each IP entry address, to calculate
To total login times of the user account, total login times of user account are total login times of all IP entry address.
Step S202, calculates the address registration frequency of abnormity and the ratio of total login times is stepped on obtaining an address
Record abnormal probability.
Wherein, it is also necessary to it is determined that an IP entry address is altered to the address occurred during next IP entry address therefrom
Frequency of abnormity is logged in, user account is stolen or occurred the feelings that can not be logged in after address registration refers to entry address change extremely
Condition.And IP entry address occurs user account when changing and logs in abnormal situation, then show the variation of IP entry address for
The security performance of family account has considerable influence, now needs above-mentioned address registration frequency of abnormity and total login time
Several ratio is as address registration exception probability, to carry out subsequent treatment.
Step S203, the address registration exception probability is arranged to weighted value corresponding to the IP address information.
Wherein it is possible to address registration exception probability obtained above is arranged to weight corresponding to the IP address information
Value, it is of course also possible to according to actual conditions to corresponding to the IP address information on the basis of this address registration exception probability
Weighted value is set accordingly.
For example, total login times of all IP entry address can be 10000 times, an IP entry address change therefrom
The address registration frequency of abnormity occurred during to next IP entry address is 30 times, and now address registration exception probability is 3/
1000, weighted value now can also be 3/1000 accordingly.
Embodiment three
Referring to Fig. 3, the difference for the method that method that the embodiment of the present invention three is provided is provided with the embodiment of the present invention two
It is, the characteristic information of the user account also includes login time information, and the login time information includes user account
All login time points and total time point log in frequency of abnormity, and each time point logs in an abnormal corresponding login time
Point, the step S103 also include:
Step S301, a time point range is set.
Wherein, the login time information includes all login time points of useful family account, for the ease of distinguishing user
The time of concentration section that account logs in is, it is necessary to set a time point range, for example, can be by 6:00-22:00 is used as a time point
Scope, and then can obtain 6:00-22:The quantity of the login time point of 00 user account in the range of this, can also be obtained
The not quantity of the login time point of user account within the range, that is, obtain 0:00-6:00、22:00-24:00 the two
The quantity of the login time point of user account in period.
Step S302, if the quantity of the login time point in the range of time point this described and all login time points
The ratio of quantity is more than pre-set threshold value, it is determined that the time present in the login time point in the range of the time point does not step on
Record frequency of abnormity.
Wherein it is possible to calculate the quantity of the login time point in the range of time point this described and all login time points
Quantity ratio, if the ratio is greater than pre-set threshold value, show login of the user account in the range of the time point time
Number is more, in order to determine risk that login time point logs in user account, now it needs to be determined that not being located at the time point
In the range of login time point.
Step S303, calculate time login present in the login time point in the range of the time point
Frequency of abnormity and the ratio of total login times log in abnormal probability to obtain a time point.
Wherein, for example, calculate the time present in the login time point in the range of the time point log in it is different
The ratio of normal number and total login times, you can be located at obtaining user account 0:00-6:00、22:00-24:00 this
The situation that is stolen or can not log in the range of two periods, the ratio is bigger, then shows the security performance of user account
It is more unstable.
Step S304, the time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information.
Wherein it is possible to time point obtained above is logged in into abnormal probability is arranged to power corresponding to the login time information
Weight values, it is of course also possible to according to actual conditions to the login time information on the basis of logging in abnormal probability at this time point
Corresponding weighted value is set accordingly.
For example, when total login times of all IP entry address are 10000 times, 0:00-6:00、22:00-24:00
It is 10 times that time in the range of the two periods, which logs in frequency of abnormity, and it is 1/1000 that now time point, which logs in abnormal probability, phase
The weighted value now answered can also be 1/1000.
Step S305, if the quantity of the login time point in the range of time point this described and all login time points
The ratio of quantity is not more than pre-set threshold value, it is determined that the time present in the login time point in the range of time point this described steps on
Record frequency of abnormity.
Wherein, if the quantity and the quantity of all login time points of the login time point in the range of time point this described
Ratio be not more than pre-set threshold value, then show, the time that user typically logs in is probably 6:00-22:00 this time range
The outer time, i.e., positioned at 0:00-6:00、22:00-24:00 the two periods, then then abnormal secondary in order to calculate time login
Number, then to determine to be located at 6:00-22:Time present in login time point in 00 this time range logs in frequency of abnormity.
Step S306, it is different to calculate time login present in the login time point in the range of the time point
The ratio of normal number and total login times logs in abnormal probability to obtain a time point.
Wherein it is possible to it is different to calculate time login present in the login time point in the range of the time point
The ratio of normal number and total login times, and log in abnormal probability using the ratio as time point.
Step S307, the inverse value that the time point is logged in abnormal probability are arranged to corresponding to the login time information
Weighted value.
Wherein, because of the quantity and the quantity of all login time points of the login time point in the range of the time point
Ratio be not more than under conditions of pre-set threshold value, then show present in the login time point in the range of the time point
Influence of the time login frequency of abnormity for the security performance of account is smaller, in order to which total characteristic value is more accurately calculated, needs
The inverse value that the time point is logged in abnormal probability is arranged to weighted value corresponding to the login time information.
For example, when total login times of all IP entry address are 10000 times, 6:00-22:In 00 this period
To log in frequency of abnormity be 10 times time, it is -1/1000 that now time point, which logs in abnormal probability, accordingly weighted value now
Can be -1/1000.
Example IV
Referring to Fig. 4, the difference for the method that method that the embodiment of the present invention four is provided is provided with the embodiment of the present invention three
It is, the characteristic information of the user account is additionally included in line temporal information, and it is every that the line duration information includes user account
The time span of secondary login and total online login frequency of abnormity, it is online every time to log in the abnormal time length for corresponding to and once logging in
Degree, the step S103 also include:
Step S401, according to total online login frequency of abnormity, it is determined that the time span that wherein ought once log in is with
The difference of the time span once logged in is more than the existing online number for logging in exception during preset critical.Wherein, it is described
Line temporal information includes the time span that user account logs in every time, further comprises total online login frequency of abnormity, now needs
Judge whether the time span wherein once logged in and the difference of the time span logged in next time are more than preset critical, if greatly
In preset critical, then show that the stolen risk of user account may increase, now need to further determine that all wherein one
The difference of time span of the time span of secondary login with logging in next time when being more than preset critical it is existing log in online it is different
Normal number.
Step S402, the online ratio for logging in abnormal number and total login times is calculated to obtain the time
Length logs in abnormal probability.
Wherein, the online ratio for logging in abnormal number and total login times can be calculated, so as to further
Obtain time span and log in abnormal probability, the follow-up weighted value of abnormal determine the probability is logged in further according to time span.
Step S403, the time span is logged in into abnormal probability and is arranged to weight corresponding to the line duration information
Value.
Wherein it is possible to the time span is logged in into abnormal probability is arranged to weight corresponding to the line duration information
Value, can also be set accordingly according to actual conditions.
For example, when total login times of all IP entry address are 10000 times, i.e. total login times of user account are
At 10000 times, when wherein a login time is 3 small, and back to back login time next time is 10 minutes, and is preset
It is as once online to log in the secondary of exception if situations such as user account generation is stolen or can not logged in when critical value is 2 hours
Number, in this way, it is 50 times that the abnormal number of public online login, which is calculated, then time span now logs in abnormal probability
It is then 5/1000, i.e., weighted value can also be 5/1000 accordingly corresponding to line duration information.
Embodiment five
Referring to Fig. 5, the difference for the method that method that the embodiment of the present invention five is provided is provided with the embodiment of the present invention four
It is, the characteristic information of the user account also includes operation behavior information, and the operation behavior information includes user account pair
Class of operation, total number of operations and the total operation answered log in frequency of abnormity, described to determine every group of spy according to the first preset rules
Weighted value corresponding to reference breath also includes:
Step S501, frequency of abnormity is logged according to total operation, it is determined that when the class of operation is default abnormal operation classification
When it is existing operation log in frequency of abnormity;
Wherein, manipulation behavior includes class of operation corresponding to user account, and the class of operation can include normal behaviour
Make behavior, and the abnormal operation in class of operation can include the operations such as change password, modification subscriber data, and always operate login
Frequency of abnormity then refers to all in progress change of secret code.Time that the user account occurred in subscriber data change procedure is stolen
Number.
Step S502, the ratio for calculating the operation login frequency of abnormity and total login times are stepped on obtaining an operation
Record abnormal probability.
Wherein, calculating the operation login frequency of abnormity and the always ratio of login times can talk endlessly one to operate and step on
Abnormal probability is recorded, is calculated in order to carry out analysis in next step.
Step S503, the operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
Wherein, for example, when total login times of user account are 10000 times, if it is 20 times that operation, which logs in frequency of abnormity,
Now, it is 1/500 that the operation, which logs in abnormal probability, and weighted value corresponding to the operation behavior information can also be 1/500.
Embodiment six
The embodiment of the present invention six also provides a kind of terminal, and the terminal is used to perform the method described in any one of foregoing embodiment
Unit.Specifically, it is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 6.The terminal of the present embodiment
100 include:Setting unit 101, acquiring unit 102, determining unit 103, computing unit 104 and adjustment unit 105.
Setting unit 101, for setting the initial value t of Cookie expired times.
Specifically, wherein, generally, the initial value t of a Cookie expired time need to be set as initial mistake
Time phase, change in order to carry out the adjustment of Cookie expired times according to follow-up actual conditions.
Acquiring unit 102, for obtaining multigroup characteristic information of user account, wherein, every group of characteristic information includes more
Individual corresponding characteristic, the also corresponding default characteristic value of every group of characteristic information.
Specifically, wherein, when login user account, it can produce and multigroup log in the related feature of behavior with user account
Information, such as IP address information, login time information, line duration information and operation behavior information etc..Meanwhile every group of feature
Information can include multiple corresponding characteristics, i.e., including multiple different characteristics.
In addition, every group of characteristic information can also correspond to a default characteristic value, default characteristic value herein can be according to actual feelings
Condition is set.For example, when one of which characteristic information plays a part of exceeding default scope to the security of user account
When, default characteristic value corresponding to it can be set as 1, and when one of which characteristic information is to the security of user account
When playing a part of being not above default scope, then default characteristic value corresponding to it can be set as 0.
In general, multigroup characteristic information of user account can be collected by web crawlers, follow-up so as to realize
The analysis of data.Wherein, reptile is the important component of search engine as a kind of automatic program for obtaining web page contents,
Web crawlers is a kind of according to certain rule, the automatic program or script for obtaining web page content information.In this life embodiment
In, the program that user account information can also can be obtained by other carries out information, and is not only only limited to network and climbs
Worm.
Determining unit 103, for weighted value corresponding to determining every group of characteristic information according to the first preset rules.
Specifically, every group of characteristic information corresponds to a weighted value, the weighted value can by the first preset rules and
Characteristic information corresponding to user account is determined.For example, IP address information can correspond to a weighted value, login time letter
Breath can correspond to a weighted value, and line duration information can correspond to a weighted value, and operation behavior information can also correspond to one
Individual weighted value.Specifically, the size of weighted value can be configured regulation, the knot that all weighted values are added according to actual conditions
Fruit, which can be equal to 1, can also be not equal to 1.Especially, when one group of characteristic information plays rush for the security performance of user account
When entering effect or less role, now weighted value corresponding to this group of characteristic information takes negative value, and when one group of feature
When information plays opposite effect for the security performance of user account, weighted value corresponding to this group of characteristic information can be taken just
Value, so as to more reasonably set Cookie expired times;If for example, IP address information, line duration information and behaviour
Make behavioural information etc. to change, generally, play opposite effect for the security performance of user account, now need
Take on the occasion of.
Computing unit 104, for according to corresponding to the second preset rules, every group of characteristic information preset characteristic value and
Total characteristic value is calculated in weighted value.
Specifically, user can select the suitable mode for calculating total characteristic value according to actual conditions.It is i.e. pre- according to second
If regular, total characteristic value is obtained.Total characteristic value is bigger, then shows stolen risk of the user account in login process
It is bigger, now just need to carry out Cookie expired times corresponding change extension, and total characteristic value is smaller, then shows to use
Stolen risk of the family account risk in login process is smaller, now just needs to become Cookie expired times accordingly
More shorten.
As preferred embodiment, second preset rules can be equation below:
R=p1θ1+p2θ2+p3θ3+p4θ4
Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For power corresponding to IP address information
Weight values, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For it is online when
Between characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To be preset corresponding to operation behavior information
Characteristic value, θ4For weighted value corresponding to operation behavior information.
For example, work as p1、p2、p3And p4When equal value is 1, now R value is θ1、θ2、θ3And θ4The sum being added.Again
For example, work as p1、p2、p3Equal value is 1, p4When value is 0, the value of R now is θ1、θ2And θ3The sum being added.Total
For, the influence for the risk that certain group characteristic information is stolen under the conditions of a certain for user account is bigger, now then needs this
Weighted value corresponding to group characteristic information carries out tuning up processing, and influences smaller, then weighted value corresponding to this group of characteristic information is entered
Row turns processing down;If the but venture influence that this group of characteristic information is stolen under conditions of opposite with a certain condition to user account
Bigger, it is negative now to need this group of weight assignment, namely carries out turning processing down, and influences smaller, then this group of feature is believed
Weighted value corresponding to breath is entered as negative and carries out tuning up processing.
Adjustment unit 105, it is expired to obtain corresponding Cookie for adjusting the initial value t according to the total characteristic value
Time.
Wherein it is possible to according to the size of the total characteristic value, carried out on the basis of the initial value t of Cookie expired times
Adjust so as to obtain the corresponding Cookie expired times needed, and the scope adjusted can be carried out accordingly according to actual conditions
Set.
Specifically, as preferred embodiment, as shown in Figure 6 a, the adjustment unit 105 in the embodiment of the present invention six may be used also
With including with lower unit,
First processing units 105a, if being more than pre-set threshold value for the total characteristic value, by the Cookie expired times
It is arranged to the difference that the initial value t and the first preset value subtract each other.
Specifically, when the total characteristic value is more than pre-set threshold value, then show that now user account is stolen very risky,
Need to shorten Cookie expired times, i.e., on the basis of initial value t, reduced accordingly, reduced value can be then first
The size of preset value, first preset value can be set accordingly according to the demand of user, therefore can certainly reduce it
His rational numerical value.
As preferred embodiment, the embodiment of the present invention one can also comprise the following steps,
Second processing unit 105b, if being less than pre-set threshold value for the total characteristic value, by the Cookie expired times
It is arranged to the initial value t is added with the second preset value and value.
Specifically, when the total characteristic value is less than pre-set threshold value, then show now user account it is stolen there is very little risk,
That is, on the basis of initial value t, it can be accordingly increased, value added can be then with proper extension Cookie expired times
The size of second preset value, second preset value can be set accordingly according to the demand of user, therefore can certainly be increased
Add other rational numerical value.
3rd processing unit 105c, if being equal to pre-set threshold value for the total characteristic value, it is described to keep the initial value t
Cookie expired times.Wherein, when the total characteristic value is equal to pre-set threshold value, show that now user account can be set at present
Certain security performance is kept in the extension Cookie expired times put, that is to say, that ensure that the information of user account at this
Be stolen in period is small probability event.
In a word, the embodiment of the present invention one can be the most suitable expired time of Cookie dynamically distributes, to reduce user's letter
The probability being stolen within this period is ceased, the security of user profile is not only ensure that, reduces service terminal needs again
The burden of signature verification is carried out, improves the operating rate of service terminal.
Embodiment 7
It is a kind of terminal schematic block diagram that another embodiment of the present invention provides referring to Fig. 7.In the present embodiment as depicted
Terminal can include:One or more processors 701;One or more input equipments 702, one or more output equipments
703 and memory 704.Above-mentioned processor 701, input equipment 702, output equipment 703 and memory 704 are connected by bus 705
Connect.Memory 702 is used to store computer program, and the computer program includes programmed instruction, and processor 701 is deposited for execution
The programmed instruction that reservoir 702 stores.Wherein, processor 701 is arranged to call described program instruction to perform:
The initial value t of Cookie expired times is set;Multigroup characteristic information of user account is obtained, wherein, every group of feature
Information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;According to the first preset rules
Determine weighted value corresponding to every group of characteristic information;Feature is preset according to corresponding to the second preset rules, every group of characteristic information
Total characteristic value is calculated in value and weighted value;It is corresponding to obtain that the initial value t is adjusted according to the total characteristic value
Cookie expired times.
If the processor 701, which also performs the total characteristic value, is more than pre-set threshold value, the Cookie expired times are set
It is set to the difference that the initial value t and the first preset value subtract each other;If the total characteristic value is less than pre-set threshold value, by the Cookie
Expired time is arranged to the initial value t is added with the second preset value and value;If the total characteristic value is equal to pre-set threshold value, protect
It is the Cookie expired times to hold the initial value t.
When the characteristic information of the user account includes IP address information, the IP address information includes the institute of user account
There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom
When recording the address registration frequency of abnormity occurred during address, the processor 701, which also performs, obtains always stepping on for all IP entry address
Record number;Calculate the address registration frequency of abnormity and the ratio of total login times is extremely general to obtain an address registration
Rate;The address registration exception probability is arranged to weighted value corresponding to the IP address information.
When the characteristic information of the user account also includes login time information, the login time information includes user's account
Number all login time points and total time point log in frequency of abnormity, when each time point logs in abnormal corresponding one and logged in
Between when putting, the processor 701, which is additionally operable to perform, sets a time point range;If the login in the range of time point this described
The ratio of the quantity at time point and the quantity of all login time points is more than pre-set threshold value, it is determined that not being located at the time point model
Time present in login time point in enclosing logs in frequency of abnormity;It is not located at stepping in the range of the time point described in calculating
It is abnormal to obtain time point login with the ratio of total login times that time present in record time point logs in frequency of abnormity
Probability;The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;It is if described positioned at this
The ratio of the quantity of login time point in the range of time point and the quantity of all login time points is not more than pre-set threshold value, it is determined that
Time present in login time point in the range of time point this described logs in frequency of abnormity;Calculate described described positioned at this
Time present in login time point in the range of time point logs in frequency of abnormity with the ratio of the always login times to obtain
One time point logged in abnormal probability;The inverse value that the time point is logged in abnormal probability is arranged to the login time information pair
The weighted value answered.
When the characteristic information of the user account is additionally included in line temporal information, the line duration information includes user's account
Number time span logged in every time and it is total it is online log in frequency of abnormity, every time it is online log in it is abnormal it is corresponding once log in when
Between length when, the processor 701 be additionally operable to perform according to it is described it is total online log in frequency of abnormity, it is determined that wherein ought once log in
Time span and the difference of time span that logs in next time be more than during preset critical it is existing it is online log in it is abnormal secondary
Number;It is abnormal general to obtain time span login with the ratio of total login times to calculate the online number for logging in exception
Rate;The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
When the characteristic information of the user account also includes operation behavior information, the operation behavior information includes user's account
When class of operation, total number of operations and total operation log in frequency of abnormity corresponding to number, the processor 701 is additionally operable to perform root
According to total operation login frequency of abnormity, it is determined that existing operation logs in exception when the class of operation is default abnormal operation classification
Number;Calculate the operation login frequency of abnormity and the ratio of total login times logs in abnormal probability to obtain an operation;
The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 703 can include display (LCD etc.), loudspeaker etc..
The memory 704 can include read-only storage and random access memory, and to processor 701 provide instruction and
Data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory 704 can also be deposited
Store up the information of device type.
In the specific implementation, processor 701, input equipment 702, the output equipment 703 described in the embodiment of the present invention can
In the first embodiment and second embodiment that perform the method for dynamically distributes Cookie expired times provided in an embodiment of the present invention
Described implementation, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction is realized when being executed by processor:
The initial value t of Cookie expired times is set;Multigroup characteristic information of user account is obtained, wherein, every group of feature
Information includes multiple corresponding characteristics, the also corresponding default characteristic value of every group of characteristic information;According to the first preset rules
Determine weighted value corresponding to every group of characteristic information;Feature is preset according to corresponding to the second preset rules, every group of characteristic information
Total characteristic value is calculated in value and weighted value;It is corresponding to obtain that the initial value t is adjusted according to the total characteristic value
Cookie expired times.
If the processor, which also performs the total characteristic value, is more than pre-set threshold value, the Cookie expired times are arranged to
The difference that the initial value t and the first preset value subtract each other;If realizing, the total characteristic value is less than pre-set threshold value, by the Cookie
Expired time is arranged to the initial value t is added with the second preset value and value;If the total characteristic value is equal to pre-set threshold value, protect
It is the Cookie expired times to hold the initial value t.
When the characteristic information of the user account includes IP address information, the IP address information includes the institute of user account
There are IP entry address, the login times of each IP entry address and an IP entry address is altered to next IP and stepped on therefrom
When recording the address registration frequency of abnormity occurred during address, the processor, which also performs, realizes always stepping on for all IP entry address of acquisition
Record number;Calculate the address registration frequency of abnormity and the ratio of total login times is extremely general to obtain an address registration
Rate;The address registration exception probability is arranged to weighted value corresponding to the IP address information.
When the characteristic information of the user account also includes login time information, the login time information includes user's account
Number all login time points and total time point log in frequency of abnormity, when each time point logs in abnormal corresponding one and logged in
Between when putting, the processor, which is additionally operable to perform, to be realized and sets a time point range;If stepping in the range of time point this described
The ratio for recording the quantity at time point and the quantity of all login time points is more than pre-set threshold value, it is determined that not being located at the time point
In the range of login time point present in the time log in frequency of abnormity;Described in calculating not in the range of the time point
It is different to obtain time point login with the ratio of total login times that time present in login time point logs in frequency of abnormity
Normal probability;The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;If positioned at the institute
The ratio for stating the quantity of the login time point in the range of time point and the quantity of all login time points is not more than pre-set threshold value, really
Time present in the login time point being positioned in the range of the time point logs in frequency of abnormity;Calculate described positioned at the institute
State time present in the login time point in the range of time point log in the ratio of frequency of abnormity and total login times with
Abnormal probability is logged in a time point;The inverse value that the time point is logged in abnormal probability is arranged to the login time information
Corresponding weighted value.
When the characteristic information of the user account is additionally included in line temporal information, the line duration information includes user's account
Number time span logged in every time and it is total it is online log in frequency of abnormity, every time it is online log in it is abnormal it is corresponding once log in when
Between length when, the processor be additionally operable to perform realize according to it is described it is total online log in frequency of abnormity, it is determined that wherein ought once step on
The difference of the time span of record and the time span logged in next time is more than existing online login exception during preset critical
Number;The ratio for calculating the abnormal number of the online login and total login times logs in exception to obtain a time span
Probability;The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
When the characteristic information of the user account also includes operation behavior information, the operation behavior information includes user's account
When class of operation, total number of operations and total operation log in frequency of abnormity corresponding to number, the processor is additionally operable to perform realization
Frequency of abnormity is logged according to total operation, it is determined that the existing operation when the class of operation of operation behavior is default abnormal operation classification
Log in frequency of abnormity;It is different to obtain operation login with the ratio of total login times to calculate the operation login frequency of abnormity
Normal probability;The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
- A kind of 1. method of dynamically distributes Cookie expired times, it is characterised in that including:The initial value t of Cookie expired times is set;Multigroup characteristic information of user account is obtained, wherein, every group of characteristic information includes multiple corresponding characteristics, every group The also corresponding default characteristic value of characteristic information;The weighted value according to corresponding to the first preset rules determine every group of characteristic information;Characteristic value is preset according to corresponding to the second preset rules, every group of characteristic information and total characteristic is calculated in weighted value Value;The initial value t is adjusted according to the total characteristic value to obtain corresponding Cookie expired times.
- 2. according to the method for claim 1, it is characterised in that described that the initial value t is adjusted according to the total characteristic value To obtain corresponding Cookie expired times, including:If the total characteristic value is more than pre-set threshold value, it is pre- that the Cookie expired times are arranged to the initial value t and first If the difference that value is subtracted each other;If the total characteristic value is less than pre-set threshold value, it is pre- that the Cookie expired times are arranged to the initial value t and second If value is added and value;If the total characteristic value is equal to pre-set threshold value, it is the Cookie expired times to keep the initial value t.
- 3. according to the method for claim 1, it is characterised in that the characteristic information of the user account is believed including IP address Breath, all IP entry address of the IP address information including user account, the login times of each IP entry address and from One of IP entry address is altered to the address registration frequency of abnormity occurred during next IP entry address, described according to first Preset rules determine that weighted value corresponding to every group of characteristic information includes:Obtain total login times of all IP entry address;The ratio of the address registration frequency of abnormity and total login times is calculated to obtain an address registration exception probability;The address registration exception probability is arranged to weighted value corresponding to the IP address information.
- 4. according to the method for claim 3, it is characterised in that the characteristic information of the user account also includes login time Information, the login time information includes all login time points of user account and total time point logs in frequency of abnormity, often Secondary time point logs in an abnormal corresponding login time point, described to determine that every group of characteristic information is corresponding according to the first preset rules Weighted value also include:One time point range is set;If the ratio of the quantity of the login time point in the range of time point this described and the quantity of all login time points is big In pre-set threshold value, it is determined that the time present in the login time point in the range of the time point does not log in frequency of abnormity;It is not located at time login frequency of abnormity and institute present in the login time point in the range of the time point described in calculating The ratio for stating total login times logs in abnormal probability to obtain a time point;The time point is logged in into abnormal probability and is arranged to weighted value corresponding to the login time information;If the ratio of the quantity of the login time point in the range of time point this described and the quantity of all login time points is not More than pre-set threshold value, it is determined that the time present in login time point in the range of time point this described logs in frequency of abnormity;Calculate the time present in the login time point in the range of the time point log in frequency of abnormity with it is described The ratio of total login times logs in abnormal probability to obtain a time point;The inverse value that the time point is logged in abnormal probability is arranged to weighted value corresponding to the login time information.
- 5. according to the method for claim 4, it is characterised in that the characteristic information of the user account is additionally included in the line time Information, the line duration information include time span and the total online login frequency of abnormity that user account logs in every time, often The secondary online exception that logs in corresponds to the time span once logged in, described to determine every group of characteristic information pair according to the first preset rules The weighted value answered also includes:According to total online login frequency of abnormity, it is determined that the time span that wherein ought once log in and the time logged in next time The difference of length is more than the existing online number for logging in exception during preset critical;The ratio for calculating the abnormal number of the online login and total login times logs in exception to obtain a time span Probability;The time span is logged in into abnormal probability and is arranged to weighted value corresponding to the line duration information.
- 6. according to the method for claim 5, it is characterised in that the characteristic information of the user account also includes operation behavior Information, the operation behavior information include class of operation corresponding to user account, total number of operations and total operation and log in exception Number, the weighted value according to corresponding to the first preset rules determine every group of characteristic information also include:Frequency of abnormity is logged according to total operation, it is determined that existing operation is stepped on when the class of operation is default abnormal operation classification Record frequency of abnormity;Calculate the operation login frequency of abnormity and the ratio of total login times logs in abnormal probability to obtain an operation;The operation is logged in into abnormal probability and is arranged to weighted value corresponding to the operation behavior information.
- 7. according to the method for claim 6, it is characterised in that second preset rules are equation below:R=p1θ1+p2θ2+p3θ3+p4θ4Wherein, R is total characteristic value, p1To preset characteristic value, θ corresponding to IP address information1For weight corresponding to IP address information Value, p2To preset characteristic value, θ corresponding to login time information2For weighted value, p corresponding to login time information3For line duration Characteristic value, θ are preset corresponding to information3For weighted value, p corresponding to line duration information4To preset spy corresponding to operation behavior information Value indicative, θ4For weighted value corresponding to operation behavior information.
- 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
- 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711065778.0A CN107743129A (en) | 2017-11-02 | 2017-11-02 | Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711065778.0A CN107743129A (en) | 2017-11-02 | 2017-11-02 | Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107743129A true CN107743129A (en) | 2018-02-27 |
Family
ID=61233114
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711065778.0A Withdrawn CN107743129A (en) | 2017-11-02 | 2017-11-02 | Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107743129A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444534A (en) * | 2020-03-12 | 2020-07-24 | 中国建设银行股份有限公司 | Method, device, equipment and computer readable medium for monitoring user operation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN104852886A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Protection method and device for user account |
CN106611026A (en) * | 2015-10-27 | 2017-05-03 | 北京国双科技有限公司 | Cookie planting and processing methods and devices |
CN107172104A (en) * | 2017-07-17 | 2017-09-15 | 顺丰科技有限公司 | One kind logs in method for detecting abnormality, system and equipment |
-
2017
- 2017-11-02 CN CN201711065778.0A patent/CN107743129A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN104852886A (en) * | 2014-02-14 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Protection method and device for user account |
CN106611026A (en) * | 2015-10-27 | 2017-05-03 | 北京国双科技有限公司 | Cookie planting and processing methods and devices |
CN107172104A (en) * | 2017-07-17 | 2017-09-15 | 顺丰科技有限公司 | One kind logs in method for detecting abnormality, system and equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444534A (en) * | 2020-03-12 | 2020-07-24 | 中国建设银行股份有限公司 | Method, device, equipment and computer readable medium for monitoring user operation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Privacy protection for preventing data over-collection in smart city | |
Chin et al. | Measuring user confidence in smartphone security and privacy | |
US8365246B2 (en) | Protecting confidential information on network sites based on security awareness | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN107515890A (en) | A kind of method and terminal for identifying resident point | |
CN106534572A (en) | Information display method and device and terminal | |
US20120239540A1 (en) | Systems, devices and methods for automatic detection and masking of private data | |
CN107632722A (en) | A kind of various dimensions user ID authentication method and device | |
CN109241302B (en) | Online course comment authorization method and device and terminal equipment | |
CN109937564A (en) | The fraudulent account detected in distributed computing system uses | |
CN107657156A (en) | User ID authentication method and device based on user operation habits and contact pressure area | |
CN107491732A (en) | A kind of identity authentication method and terminal | |
Shema | Effective credit scoring using limited mobile phone data | |
CN108400868A (en) | Storage method, device and the mobile terminal of seed key | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN107491300A (en) | The reminding method and its terminal of a kind of intelligent function | |
WO2014113405A2 (en) | Systems and methods for processing and displaying user-generated content | |
CN109274639A (en) | The recognition methods of open platform abnormal data access and device | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN107766708A (en) | Nullify method, terminal and the computer-readable recording medium of account Entered state | |
CN108289028A (en) | A kind of signature authentication method, relevant device and computer readable storage medium | |
CN105868625B (en) | Method and device for intercepting restart deletion of file | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180227 |
|
WW01 | Invention patent application withdrawn after publication |