Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormity judgment method and device for terminal device network access

A technology of network access and terminal equipment, applied in the field of security detection, can solve the problems that websites cannot make correct judgments, threaten website security, and have high error rates, save the workload of statistics and analysis, and make the analysis process simple and accurate. high rate effect

Active Publication Date: 2019-10-08
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current network access, one of the main means of threatening the security of the website is to access the website through web crawlers, which makes the website unable to make correct judgments, and thus easily leads to wrong responses.
To solve this problem, the current method is to collect data such as click time and mouse dragging trajectory during the user verification process, and identify the type of user based on this behavior data. This method has a high error rate, and it is easy to identify real users as abnormal users. low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity judgment method and device for terminal device network access
  • Abnormity judgment method and device for terminal device network access
  • Abnormity judgment method and device for terminal device network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0041] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security detection, and provides an abnormity judgment method and device for terminal device network access, and the method comprises the steps: responding to a network access request sent by a terminal device, obtaining a plurality of nonlinear feature values of the terminal device through a script, and forming a nonlinear combination feature set; solving an average value of all corresponding characteristic values in a set time period for the characteristic values of the nonlinear combination characteristic set, and calculating a chi-square statistic of the characteristic values of the terminal device; and when the corresponding characteristic value obtained by utilizing the chi-square statistics is an outlier, judging that the correspondingnetwork access is abnormal access. The method is beneficial for improving the judgment capability of judging the abnormal access of the current network access of the terminal device.

Description

technical field [0001] The present invention relates to the technical field of security detection, and in particular, the present invention relates to a method and device for determining abnormalities in network access of terminal equipment. Background technique [0002] In the current network access, one of the main means of threatening the security of the website is to access the website through web crawlers, which makes the website unable to make correct judgments, and thus easily leads to wrong responses. To solve this problem, the current method is to collect data such as click time and mouse dragging trajectory during the user verification process, and identify the type of user based on this behavior data. This method has a high error rate, and it is easy to identify real users as abnormal users. The accuracy is low. Contents of the invention [0003] In order to overcome the above technical problems, especially the problem in the prior art that when logging into th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products