CN111049810A - Network security suite matching method, device, equipment and medium - Google Patents

Network security suite matching method, device, equipment and medium Download PDF

Info

Publication number
CN111049810A
CN111049810A CN201911192840.1A CN201911192840A CN111049810A CN 111049810 A CN111049810 A CN 111049810A CN 201911192840 A CN201911192840 A CN 201911192840A CN 111049810 A CN111049810 A CN 111049810A
Authority
CN
China
Prior art keywords
user
network security
package
price
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911192840.1A
Other languages
Chinese (zh)
Inventor
楼畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangtong Tianxia Network Technology Co ltd
Original Assignee
Guangtong Tianxia Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangtong Tianxia Network Technology Co ltd filed Critical Guangtong Tianxia Network Technology Co ltd
Priority to CN201911192840.1A priority Critical patent/CN111049810A/en
Publication of CN111049810A publication Critical patent/CN111049810A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a network security package matching method, relates to the technical field of communication, and is used for solving the problems of various types and poor user experience of the existing network security packages, and the method comprises the following steps: receiving a user purchase request, and acquiring a user industry type and a user grade according to the user purchase request; matching a network safety package according to the user industry type; matching the price of the network security package according to the user grade; and returning the matched network security package and the price. The invention also discloses a network security package matching device, electronic equipment and a computer storage medium. According to the invention, the most suitable package is matched according to the industry type and the user grade of the user, so that the user experience is improved.

Description

Network security suite matching method, device, equipment and medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a medium for matching a network security package.
Background
With the rapid development of computer technology, enterprises need computer support in daily operation. There is also an increasing amount of information stored in the computers of the enterprise, including sensitive information in the enterprise, business secrets, etc. The network is a carrier of information transmission, and as long as a computer accesses the internet, the network has the risk of being attacked, such as hacking, information leakage, information stealing, data tampering, data addition and deletion, computer viruses and the like.
Therefore, enterprises generally perform network security protection by purchasing security defense packages, such as cloud defense packages, local high-defense packages, and the like.
However, with the development of network security technology, the types of network security packages provided by network security companies are gradually increased, so that customers need to spend a lot of time selecting a suitable security defense package, and may select a wrong package due to insufficient experience.
Disclosure of Invention
In order to overcome the defects of the prior art, an object of the present invention is to provide a network security package matching method, which matches a user with a suitable network security package according to a user industry category and a user class.
One of the purposes of the invention is realized by adopting the following technical scheme:
a network security package matching method comprises the following steps:
receiving a user purchase request, and acquiring a user industry type and a user grade according to the user purchase request;
matching a network safety package according to the user industry type;
matching the price of the network security package according to the user grade;
and returning the matched network security package and the price.
Further, receiving a user purchase request, further comprising the steps of:
when the user is a registered user, acquiring a user industry type and a user grade according to the user purchase request;
when the user is an unregistered user, registering the unregistered user and storing the unregistered user information; and matching a new user preference package for the unregistered user.
Further, the unregistered user information includes an industry type, a user name and a login password.
Further, the user industry types include e-commerce, internet advertising, video, gaming, synthesis, and others.
Further, the user classes include basic, advanced, and honored.
Further, matching the price of the network security package according to the user grade further comprises the following steps:
querying and analyzing the historical orders and the historical browsing records of the user;
matching the price of the network security package according to the historical browsing record;
if the network security package is changed compared with the network security packages in the historical orders within the preset time, and the protection value of the network security package is larger than that of the network security package in the historical orders, the price of the matched network security package is reduced.
Further, the method also comprises the following steps:
establishing an updating task of the user grade according to the user purchase request and storing the updating task into a message queue;
and after the matched network security package and the matched price are returned, executing an updating task of the user level:
when the history order of the user has a record that the protection value and the package price exceed a preset basic value, updating the user grade to be high grade; otherwise, updating the user grade as a basis;
when the history order of the user has a record that the protection value and the package price exceed the preset high-level value, updating the user level as honorable; otherwise, the user level is updated to be high.
Another object of the present invention is to provide a network security package matching device, which matches a suitable network security package for a user according to the user industry category and the user class.
The second purpose of the invention is realized by adopting the following technical scheme:
a network security package matching device, comprising:
the receiving module is used for receiving a user purchase request and acquiring a user industry type and a user grade according to the user purchase request;
the matching module is used for matching the network safety package according to the user industry type; matching the price of the network security package according to the user grade;
and the output module is used for returning the matched network security package and the price.
It is a further object of the present invention to provide an electronic device for performing one of the above objects, comprising a processor, a storage medium, and a computer program, the computer program being stored in the storage medium, the computer program, when executed by the processor, implementing the above network security suite matching method.
It is a further object of the present invention to provide a computer-readable storage medium storing one of the objects of the invention, having a computer program stored thereon, which when executed by a processor, implements the network security package matching method described above.
Compared with the prior art, the invention has the beneficial effects that:
according to the invention, the corresponding network security package is automatically matched according to the user industry category, and the price of the network security package is determined according to the user grade mechanism, so that the purpose of accurately pushing the appropriate package for the user is achieved.
Drawings
FIG. 1 is a flow diagram of a network security suite matching method according to an embodiment;
fig. 2 is a flowchart of a user registration method according to the first embodiment;
FIG. 3 is a flowchart of a network security package price matching method according to the first embodiment;
FIG. 4 is a flowchart of a user level updating method according to the second embodiment;
FIG. 5 is a block diagram showing the configuration of a network security package matching apparatus according to a third embodiment;
fig. 6 is a block diagram of the electronic apparatus according to the fourth embodiment.
Detailed Description
The present invention will now be described in more detail with reference to the accompanying drawings, in which the description of the invention is given by way of illustration and not of limitation. The various embodiments may be combined with each other to form other embodiments not shown in the following description.
Example one
The embodiment one provides a network security package matching method, aiming at establishing an industry type matching mechanism and a user grade matching mechanism aiming at a user, so as to push a proper network security package and offer for the user.
Referring to fig. 1, a network security package matching method includes the following steps:
s110, receiving a user purchase request, and acquiring a user industry type and a user grade according to the user purchase request;
the user purchase request comprises a user name and a user password, the user name and the user password are used for confirming user identity information, a server for processing the user purchase request stores the user information, the user information comprises the user name, the user industry type and the like, and the server can match the corresponding user information according to the user name. The login request and the user information are set by the user and stored in the server when the user registers.
The user usually accesses the network security package purchasing interface through the web page, and is based on the http protocol when accessing the web page, because the http protocol is stateless, that is, the previous request and the next request do not have any association, but the operation performed by the user when accessing the web purchasing interface is contextual and not stateless, so that the server can record the current state of the user in a certain way. The traditional recording mode is to record the state of the user in the server through Session. In order to determine user information more quickly, the status of the user can also be recorded by a JSON Web Token (JWT), which is a JSON-based open standard (RFC 7519) that defines a compact and independent data format for securely transmitting data between multiple parties. The Token is a string of character strings generated by the server and used as a Token requested by the client, after the server logs in for the first time, the server generates a Token according to the user information, the Token is returned to the user side sending the purchase request, and the user side only needs to request data through the Token without inputting a user name and a password again. The simplest token components include ID (user unique identity), Time (timestamp), Sign (signature to prevent malicious third parties from splicing the token request server).
Referring to fig. 2, S110 further includes the following steps:
s1101, when the user is a registered user, acquiring a user industry type and a user grade according to the user purchase request;
s1102, when the user is an unregistered user, registering the unregistered user and storing the unregistered user information; and matching a new user preference package for the unregistered user.
In S1102, when the user is an unregistered user, a registration process is initiated, and the user is required to fill in information such as a created user name, a login password, an industry type, and the like.
For the unregistered user, the server matches the corresponding network security suite according to the industry type, and for the network security suite for which the user who buys for the first time gives a preferential price, the specific preferential amount is not limited in this embodiment, and the setting can be performed according to the actual situation.
S120, matching a network safety package according to the industry type of the user;
the types of industries in S120 include e-commerce, internet advertising, video, gaming, synthesis, and others. Users with low networking flow such as games and videos can be matched with local high-defense packages; for users with high networking traffic such as e-commerce and internet advertisements, packages such as cloud defense and cloud reactance can be matched, and users with other and comprehensive industry categories can be matched with all packages due to difficulty in confirming purchasing requirements. It should be noted that the package matching condition described above is only an example in this embodiment, and in the actual package matching, the setting may be performed according to the actual situation, for example, the corresponding network security package is matched according to the conditions such as the enterprise scale of the user, the number of computers, and the like.
S130, matching the price of the network security package according to the user grade;
in this embodiment, the user level includes basic, advanced, and respected, and the user level may be set according to an actual situation, and is not limited to the user level in this embodiment; for basic level users, packages with low price are matched, for advanced level users, packages with medium price are matched, and packages with high price are matched. Each package contains a choice of different price points, for example, the price is higher when the protection value in the package is higher, so that the network security package with the proper price point is recommended by setting the user grade. The user rating is typically a user rating that is customized by the user at the time of registration.
Referring to fig. 3, S130 specifically includes the following steps:
s1301, querying and analyzing the historical orders and the historical browsing records of the user;
the historical orders are inquired and analyzed in the steps, and the defense value and the price of the orders in the historical orders of the user are inquired and analyzed to obtain the purchasing trend and the purchasing intention of the user. All orders in the invention are network security packages, so that the data of defense value is available, and the defense value indicates the strength of network security protection.
S1302, matching the price of the network safety package according to the historical browsing record.
S1303, if the network security package is changed compared with the network security packages in the historical order within the preset time, and the protection value of the network security package is greater than that of the network security package in the historical order, the price of the matched network security package is reduced.
For the price reduction, a price reduction limit is preset at the server, which may be one or more fixed limits, such as 5% price reduction, or a price reduction interval, such as 5% -10% price reduction according to the protection value increase value or the original price of the package. The preset time is set according to actual requirements, for example, 30 days. When the user changes the package within the preset time and selects the package with a larger protection value, the requirement and purchase intention of the user are larger, so that the possibility of purchasing by the user can be further increased by giving a discount price on the basis of the last purchase price or the current price of the user, and certainly, if no historical order change exists within the preset time, the price reduction operation is not carried out. By analyzing the historical browsing records of the user in real time, the price of the network security package which is most likely to be purchased (i.e. browsing the most price interval) is matched for the user, and a preset price reduction amount can be directly given on the basis of the price, or price reduction operation is performed according to the change of the protection value in the historical order on the basis of the price. The price interval of the package browsed by the user can be obtained according to the historical browsing record, and the price of the network security package is matched according to the price interval; the embodiment is not particularly limited to a specific historical browsing record analysis method, and the browsing record may be uploaded to a big data platform in real time to obtain an analysis result, or may be processed and analyzed in real time by big data analysis software in a server.
And S140, returning the matched network security package and the price.
It should be noted that the matched network security packages are the network security packages that are preferentially displayed, and the unmatched network security packages are also displayed, so as to provide multiple choices for the client.
Example two
The second embodiment is performed on the basis of the first embodiment, and mainly explains and explains the updating method of the user level.
And the processing procedure for the user purchase request comprises asynchronous processing and synchronous processing. Asynchronous processing refers to processing problems according to unsynchronized programs. The asynchronous processing can improve the utilization rate of equipment, thereby improving the operating efficiency of programs. In the process of synchronization, since multiple requests need to be processed simultaneously, the utilization rate of the device is reduced, which results in reduced running efficiency of the program, and many systems or running environments also pay much extra system resource expense for maintaining the effectiveness of synchronization when processing synchronization, which has a considerable impact on performance.
The embodiment performs asynchronous processing through the RabbitMQ and the AMQP so as to dynamically control the user level.
RabbitMQ is an open source message broker software (also known as message-oriented middleware) that implements the Advanced Message Queuing Protocol (AMQP). The RabbitMQ server is written in Erlang language, and the clustering and failover are built on an open telecommunications platform framework.
The Advanced Message Queuing Protocol (AMQP) is an application layer protocol specification used for asynchronous messaging. Being a line layer protocol, rather than an API (e.g., JMS), the AMQP client can send and accept information arbitrarily, regardless of the source of the message.
According to the above principle, please refer to fig. 4, the method for receiving a user purchase request further comprises the following steps:
s210, establishing an updating task of the user grade according to the user purchase request and storing the updating task into a message queue;
in the embodiment, after a user purchase request is received, the purchase request is synchronously processed, and a corresponding network security package and the price thereof are matched according to the current user level; and the level updating task in the message queue is processed asynchronously after the network security package matching is completed.
S220, after the matched network security package and the matched price are returned, executing an updating task of the user level;
s230, when the protection value and the package price in the historical order exceed a preset basic value, updating the user grade to be high grade; otherwise, updating the user grade as a basis;
s240, when the protection value and the package price in the historical order exceed the preset high-level value, updating the user level to be honored; otherwise, the user grade is updated to be high grade.
When the user level update task is asynchronously processed, if the user has placed an order, the purchase order record of this time also belongs to the historical orders in S230 and S240.
The preset basic value and the preset advanced value in the above steps may be set according to an actual situation, and the preset basic/advanced value includes a preset protection value and a preset package price, which is not specifically limited in this embodiment. The user grade can be updated when either the protection value or the package price exceeds the preset basic/advanced value, or the user grade can be updated when both the protection value and the package price meet the preset basic/advanced value; otherwise, when the protection value and the package price of the user are lower than the preset basic/advanced value of the current grade, the degradation processing is automatically carried out. The results of either the upgrade or the downgrade are returned to the user side that sent the purchase request.
It should be noted that, for the level update task in the message queue, the task may be deleted from the message queue after the level update is completed, or may continue to remain in the message queue, and the level update task is periodically executed, that is, the user level is polled, so as to achieve the effect of dynamically controlling the user level.
EXAMPLE III
The third embodiment discloses a device corresponding to the network security suite matching method in the third embodiment, which is a virtual device structure in the third embodiment, and as shown in fig. 5, the device includes:
the receiving module 310 is configured to receive a user purchase request, and obtain a user industry type and a user grade according to the user purchase request;
a matching module 320, configured to match a network package according to the user industry type; matching the price of the network security package according to the user grade;
and the output module 330 is configured to return the matched network security package and the price.
Preferably, the method for receiving the user purchase request further comprises the following steps:
when the user is a registered user, acquiring a user industry type and a user grade according to the user purchase request;
when the user is an unregistered user, registering the unregistered user and storing the unregistered user information; and matching a new user preference package for the unregistered user.
Preferably, the unregistered user information includes an industry type, a user name, and a login password.
Preferably, the user industry types include e-commerce, internet advertising, video, gaming, synthesis, and others.
Preferably, the user ratings include basic, advanced, and honor.
Preferably, matching the price of the network security package according to the user rank further comprises the following steps:
querying and analyzing the historical orders and the historical browsing records of the user;
matching the price of the network security package according to the historical browsing record;
and if the network security package is changed compared with the network security packages in the historical order within the preset time, and the protection value of the network security package is greater than that of the network security package in the historical order, the price of the matched network security package is reduced.
Preferably, the method further comprises the following steps:
establishing an updating task of the user grade according to the user purchase request and storing the updating task into a message queue;
returning the matched network security package and the matched price, and executing the updating task of the user level;
updating the user grade according to the historical orders of the user:
when the historical order has a protection value and the package price exceeds a preset basic value, updating the user grade to be high grade; otherwise, updating the user grade as a basis;
when the historical order has a protection value and the package price exceeds a preset high-level value, updating the user level to be honored; otherwise, the user grade is updated to be high grade.
Example four
Fig. 6 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention, as shown in fig. 6, the electronic device includes a processor 410, a memory 420, an input device 430, and an output device 440; the number of the processors 410 in the computer device may be one or more, and one processor 410 is taken as an example in fig. 6; the processor 410, the memory 420, the input device 430 and the output device 440 in the electronic apparatus may be connected by a bus or other means, and the bus connection is exemplified in fig. 6.
The memory 420 serves as a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the network security package matching method in the embodiment of the present invention (for example, the receiving module 310, the matching module 320, and the output module 330 in the network security package matching method apparatus). The processor 410 executes various functional applications and data processing of the electronic device by executing the software programs, instructions and modules stored in the memory 420, so as to implement the network security package matching method of the first embodiment and the second embodiment.
The memory 420 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, memory 420 may further include memory located remotely from processor 410, which may be connected to an electronic device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may be used to receive input of user identification information, user rating, industry type, and preset base/high-level value, etc. The output device 440 may include a display device such as a display screen.
EXAMPLE five
The fifth embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the storage medium is used for a computer to execute a network security suite matching method, and the method includes:
receiving a user purchase request, and acquiring a user industry type and a user grade according to the user purchase request;
matching a network safety package according to the user industry type;
matching the price of the network security package according to the user grade;
and returning the matched network security package and the price.
Of course, the storage medium containing the computer-executable instructions provided by the embodiments of the present invention is not limited to the method operations described above, and may also perform related operations in the network-based security suite matching method provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling an electronic device (which may be a mobile phone, a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It should be noted that, in the embodiment of the network-based security package matching method apparatus, each included unit and module are only divided according to functional logic, but are not limited to the above division, as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.

Claims (10)

1. A network security package matching method is characterized by comprising the following steps:
receiving a user purchase request, and acquiring a user industry type and a user grade according to the user purchase request;
matching a network safety package according to the user industry type;
matching the price of the network security package according to the user grade;
and returning the matched network security package and the price.
2. The network security package matching method of claim 1, wherein receiving a user purchase request, further comprising the steps of:
when the user is a registered user, acquiring a user industry type and a user grade according to the user purchase request;
when the user is an unregistered user, registering the unregistered user and storing the unregistered user information; and matching a new user preference package for the unregistered user.
3. The network security package matching method of claim 2, wherein the unregistered user information includes an industry type, a user name, and a login password.
4. The network security suite matching method of any of claims 1-3, wherein the user industry type includes e-commerce, internet advertising, video, gaming, synthesis, and others.
5. The network security suite matching method of claim 1, wherein the user level comprises basic, advanced, and honor.
6. The network security package matching method according to claim 1 or 5, wherein matching the price of the network security package according to the user rank further comprises the steps of:
querying and analyzing the historical orders and the historical browsing records of the user;
matching the price of the network security package according to the historical browsing record;
if the network security package is changed compared with the network security packages in the historical orders within the preset time, and the protection value of the network security package is larger than that of the network security package in the historical orders, the price of the matched network security package is reduced.
7. The network security suite matching method of claim 5, further comprising the steps of:
establishing an updating task of the user grade according to the user purchase request and storing the updating task into a message queue;
and after the matched network security package and the matched price are returned, executing an updating task of the user level:
when the history order of the user has a record that the protection value and the package price exceed a preset basic value, updating the user grade to be high grade; otherwise, updating the user grade as a basis;
when the history order of the user has a record that the protection value and the package price exceed the preset high-level value, updating the user level as honorable; otherwise, the user level is updated to be high.
8. A network security package matching device, comprising:
the receiving module is used for receiving a user purchase request and acquiring a user industry type and a user grade according to the user purchase request;
the matching module is used for matching the network safety package according to the user industry type; matching the price of the network security package according to the user grade;
and the output module is used for returning the matched network security package and the price.
9. An electronic device comprising a processor, a storage medium, and a computer program, the computer program being stored in the storage medium, wherein the computer program, when executed by the processor, implements the network security package matching method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the network security suite matching method according to any one of claims 1 to 7.
CN201911192840.1A 2019-11-28 2019-11-28 Network security suite matching method, device, equipment and medium Pending CN111049810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911192840.1A CN111049810A (en) 2019-11-28 2019-11-28 Network security suite matching method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911192840.1A CN111049810A (en) 2019-11-28 2019-11-28 Network security suite matching method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN111049810A true CN111049810A (en) 2020-04-21

Family

ID=70234022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911192840.1A Pending CN111049810A (en) 2019-11-28 2019-11-28 Network security suite matching method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111049810A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483860A (en) * 2009-01-23 2009-07-15 清华大学 Negotiation control method based on SIP security policy grade in IMS network
CN108108210A (en) * 2018-01-11 2018-06-01 上海有云信息技术有限公司 Management method, device, server and the storage medium of safety product
US10068089B1 (en) * 2015-09-25 2018-09-04 Symantec Corporation Systems and methods for network security
CN109286630A (en) * 2018-10-15 2019-01-29 深信服科技股份有限公司 Deng guarantor's processing method, device, equipment and storage medium
CN109903143A (en) * 2019-03-27 2019-06-18 深圳市活力天汇科技股份有限公司 A kind of flight recommended method based on customer consumption level

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483860A (en) * 2009-01-23 2009-07-15 清华大学 Negotiation control method based on SIP security policy grade in IMS network
US10068089B1 (en) * 2015-09-25 2018-09-04 Symantec Corporation Systems and methods for network security
CN108108210A (en) * 2018-01-11 2018-06-01 上海有云信息技术有限公司 Management method, device, server and the storage medium of safety product
CN109286630A (en) * 2018-10-15 2019-01-29 深信服科技股份有限公司 Deng guarantor's processing method, device, equipment and storage medium
CN109903143A (en) * 2019-03-27 2019-06-18 深圳市活力天汇科技股份有限公司 A kind of flight recommended method based on customer consumption level

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙亮等: "3G行业应用的创新与发展", 《邮电设计技术》 *

Similar Documents

Publication Publication Date Title
US9559992B2 (en) System and method for updating information in an instant messaging application
US10318988B2 (en) Managing cookie data
US11175796B2 (en) Menu management method, server, and system
KR102504075B1 (en) Matching and attributes of user device events
CN110337075A (en) A kind of short message sending method, device and electronic equipment based on APP type of service
US20140095355A1 (en) Platform, Method, and Device for Managing Application
CN107370780B (en) Media pushing method, device and system based on Internet
US20160342674A1 (en) System and method for managing customer address information in electronic commerce using the internet
CN108122124B (en) Information pushing method, platform and system
WO2014176896A1 (en) System and method for updating information in an instant messaging application
CN109274705A (en) Service providing method, apparatus and system based on user identity
CN112381453A (en) Information processing method, information processing apparatus, electronic device, and medium
CN111930786A (en) Resource acquisition request processing system, method and device
CN108874836B (en) Method and device for transferring electronic ticket
CN115641180A (en) Request processing method, related device and equipment
CN106817296B (en) Information recommendation test method and device and electronic equipment
CN111275542A (en) Loan request processing method, device and system
US10482397B2 (en) Managing identifiers
CN111049810A (en) Network security suite matching method, device, equipment and medium
CN113971245A (en) Information pushing method, device and system
CN114445128A (en) Card ticket management method and device, electronic equipment and computer readable medium
CN112836201A (en) Method, device, equipment and computer readable medium for multi-platform information intercommunication
US10616293B1 (en) Multiple account binding
CN109829103A (en) A kind of method for down loading and device of application program
CN113037608B (en) Message reply method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421