Service request processing method and device

A business request and business technology, applied in the computer field, can solve problems such as misjudgment of business request security, single security judgment method, etc., to achieve the effect of ensuring risk prevention, strong pertinence, and avoiding mistakes or security problems

Active Publication Date: 2017-01-18
UNION MOBILE PAY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for processing service requests, which are used to solve the technical problem that the security of service requests is judged by the application firewall in a single way, which leads to misjudgment of the security of service requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service request processing method and device
  • Service request processing method and device
  • Service request processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. In the case of no conflict, the embodiments and the features in the embodiments of the present invention can be combined arbitrarily with each other. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0052] In add...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a service request processing method and device, and solves the technical problem that an application firewall determines the safety of a service request in a relatively single manner and further the safety of the service request may be judged for mistake. The method comprises that service request information corresponding to the service request is received; according to the service request information, risk level information for representing the risk level of the service request is determined; according to the risk level, a first service server is determined among M service servers connected to the application firewall, the first service server is configured to receive a predetermined risk level set, and M is a positive integer; and the service request information is sent to the first service server.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for processing service requests. Background technique [0002] With the vigorous development and wide application of computer technology and the Internet, computers and the Internet have been integrated into every aspect of people's lives. However, hidden behind the prosperity is the risk of information security. Malicious users often attack computer equipment including servers through the network, which may cause the server to fail to work normally, and even lead to information leakage, posing threats to information security. , and the general attack method is that a malicious user sends a service request containing attack information to the server. [0003] At present, the business requests uploaded by users are generally screened and filtered through the application firewall, so as to avoid the transmission of business requests containing attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/105
Inventor 余兴华赵志强刘胜殷舒
Owner UNION MOBILE PAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products