HK1218355A1 - 種網絡耗盡性資源的使用方法及裝置 - Google Patents

種網絡耗盡性資源的使用方法及裝置

Info

Publication number
HK1218355A1
HK1218355A1 HK16106244.3A HK16106244A HK1218355A1 HK 1218355 A1 HK1218355 A1 HK 1218355A1 HK 16106244 A HK16106244 A HK 16106244A HK 1218355 A1 HK1218355 A1 HK 1218355A1
Authority
HK
Hong Kong
Prior art keywords
exhaustible
utilizing
network resource
resource
network
Prior art date
Application number
HK16106244.3A
Other languages
English (en)
Inventor
王進
鄧玉良
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of HK1218355A1 publication Critical patent/HK1218355A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
HK16106244.3A 2014-07-24 2016-06-02 種網絡耗盡性資源的使用方法及裝置 HK1218355A1 (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410356190.0A CN105376265B (zh) 2014-07-24 2014-07-24 一种网络耗尽性资源的使用方法及装置

Publications (1)

Publication Number Publication Date
HK1218355A1 true HK1218355A1 (zh) 2017-02-10

Family

ID=55162496

Family Applications (1)

Application Number Title Priority Date Filing Date
HK16106244.3A HK1218355A1 (zh) 2014-07-24 2016-06-02 種網絡耗盡性資源的使用方法及裝置

Country Status (9)

Country Link
US (1) US20170208018A1 (zh)
EP (1) EP3174268B1 (zh)
JP (1) JP6674443B2 (zh)
KR (1) KR102179854B1 (zh)
CN (1) CN105376265B (zh)
ES (1) ES2834400T3 (zh)
HK (1) HK1218355A1 (zh)
PL (1) PL3174268T3 (zh)
WO (1) WO2016011884A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154999B (zh) * 2017-03-31 2020-06-02 捷开通讯(深圳)有限公司 终端及其基于环境信息的解锁方法、存储装置
CN107330319B (zh) * 2017-06-29 2020-12-18 广东源泉科技有限公司 一种交互控制方法、设备及计算机可读存储介质
CN112019505A (zh) * 2020-07-22 2020-12-01 北京达佳互联信息技术有限公司 登录方法、装置、服务器、电子设备及存储介质

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5699514A (en) * 1995-12-26 1997-12-16 Lucent Technologies Inc. Access control system with lockout
JP2001318892A (ja) * 2000-05-11 2001-11-16 Cyber Sign Japan Inc オンラインサービスにおける個人認証方法及びオンラインサービス提供装置
JP2002183734A (ja) * 2000-12-15 2002-06-28 Toshiba Corp 顔認証装置および顔認証方法
KR20010044823A (ko) * 2001-03-29 2001-06-05 이종우 컴퓨터에서 사용자 인증이 필요한 자료의 보호방법 및그에 관한 시스템
JP4082028B2 (ja) * 2001-12-28 2008-04-30 ソニー株式会社 情報処理装置および情報処理方法、並びに、プログラム
US6938167B2 (en) * 2002-12-18 2005-08-30 America Online, Inc. Using trusted communication channel to combat user name/password theft
GB2409069B (en) * 2003-12-11 2007-03-07 Hewlett Packard Development Co Administration of computing entities in a network
JP2005316836A (ja) * 2004-04-30 2005-11-10 Nippon Telegraph & Telephone West Corp コンテンツ保護システム及びコンテンツ保護方法並びにそのコンピュータプログラム
US8443049B1 (en) * 2004-08-20 2013-05-14 Sprint Spectrum L.P. Call processing using trust scores based on messaging patterns of message source
CN100498641C (zh) * 2004-11-12 2009-06-10 上海电气集团股份有限公司 一种防止智能装置输入密码被破译的密码安全保护方法
JP4814599B2 (ja) * 2004-11-26 2011-11-16 株式会社ソニー・コンピュータエンタテインメント 認証装置及び認証対象装置、及び認証方法
US20070136573A1 (en) * 2005-12-05 2007-06-14 Joseph Steinberg System and method of using two or more multi-factor authentication mechanisms to authenticate online parties
JP5492370B2 (ja) * 2006-12-07 2014-05-14 株式会社タイトー Snsサーバ、sns制御プログラム
CN1975789A (zh) * 2006-12-22 2007-06-06 重庆交通大学 多功能门禁、监控与报警综合系统
US8347358B2 (en) * 2007-06-25 2013-01-01 Microsoft Corporation Open enhanced federation security techniques
CN101162992B (zh) * 2007-09-29 2010-05-19 中国人民解放军信息工程大学 容忍入侵的密码协议安全运行防护方法和系统
US8225106B2 (en) * 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
JP4931881B2 (ja) * 2008-08-13 2012-05-16 日本電信電話株式会社 ホワイトリストを利用したサーバ割り当てシステムおよびその方法
US20100306821A1 (en) * 2009-05-29 2010-12-02 Google, Inc. Account-recovery technique
US9081958B2 (en) * 2009-08-13 2015-07-14 Symantec Corporation Using confidence about user intent in a reputation system
JP5612756B2 (ja) * 2011-03-11 2014-10-22 株式会社Nttドコモ 移動情報端末、把持特徴認証方法及びプログラム
US9177125B2 (en) * 2011-05-27 2015-11-03 Microsoft Technology Licensing, Llc Protection from unfamiliar login locations
CN102880560A (zh) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 用户隐私数据保护方法以及使用该方法的移动终端
JP2013073416A (ja) * 2011-09-28 2013-04-22 Hitachi Ltd 認証中継装置、認証中継システム及び認証中継方法
US8898752B2 (en) * 2012-02-01 2014-11-25 Microsoft Corporation Efficiently throttling user authentication
US9317689B2 (en) * 2012-06-15 2016-04-19 Visa International Service Association Method and apparatus for secure application execution
US10110578B1 (en) * 2013-03-12 2018-10-23 Amazon Technologies, Inc. Source-inclusive credential verification
CN103853986B (zh) * 2014-01-03 2017-02-15 李凤华 一种访问控制方法和装置
CN103813334A (zh) * 2014-02-24 2014-05-21 宇龙计算机通信科技(深圳)有限公司 权限控制方法和权限控制装置

Also Published As

Publication number Publication date
KR102179854B1 (ko) 2020-11-18
KR20170051423A (ko) 2017-05-11
JP2017527018A (ja) 2017-09-14
CN105376265B (zh) 2019-04-02
JP6674443B2 (ja) 2020-04-01
EP3174268B1 (en) 2020-10-07
EP3174268A1 (en) 2017-05-31
WO2016011884A1 (zh) 2016-01-28
US20170208018A1 (en) 2017-07-20
EP3174268A4 (en) 2017-06-07
ES2834400T3 (es) 2021-06-17
CN105376265A (zh) 2016-03-02
PL3174268T3 (pl) 2021-05-04

Similar Documents

Publication Publication Date Title
ZA201904259B (en) Device and method
EP3557406C0 (en) DEVICE AND METHOD FOR PERFORMING FUNCTIONS
ZA201702900B (en) Device and method
EP3082314A4 (en) RESOURCE MANAGEMENT PROCESS AND DEVICE
EP3148145A4 (en) Resource allocation method and device
EP3113146A4 (en) Local location computation device and local location computation method
HK1211150A1 (zh) 流量調度方法和裝置
HK1213111A1 (zh) 種網絡應用中訪問功能的方法和設備
EP3100162A4 (en) Task scheduling method and apparatus
HK1222082A1 (zh) 種網絡定位方法及裝置
EP3113148A4 (en) Local location computation device and local location computation method
HK1219336A1 (zh) 種網絡支付控制方法和裝置
EP3142434A4 (en) Resource allocation method and resource allocation device
EP3113150A4 (en) Local location computation device and local location computation method
EP3113149A4 (en) Local location computation device and local location computation method
HK1219816A1 (zh) 通信裝置和通信方法
EP3206451A4 (en) Resource scheduling method and apparatus
EP3113147A4 (en) Local location computation device and local location computation method
EP3113145A4 (en) Local location computation device and local location computation method
EP3337095A4 (en) Resource management method and device
EP3206422A4 (en) Method and device for creating subscription resource
EP3297379A4 (en) Resource coordination method and device
HK1224102A1 (zh) 網絡操作處理方法及裝置
EP3358785A4 (en) Method and device for acquiring resource
EP3160092A4 (en) Method and device for network resource balancing