A method and system for user request verification based on variable security level

A technology of user request and security level, applied in the network field, it can solve the problems of stopping the security proxy service, too simple user authentication, and low security of the external service of the mailbox system, so as to achieve the effect of improving efficiency, stability and security.

Active Publication Date: 2022-07-08
新浪技术(中国)有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a user request verification method and system based on a variable security level. After verifying the user name of the user request, the verification process of the user's mobile terminal device is added to solve the problem that the user verification is too simple and difficult in the normal operating state of the system. The problem of low security of the external service of the mailbox system; the method of automatically adjusting the security verification level by further monitoring the operation status of the activation device of the mobile terminal equipment in real time, so that the security verification process has the ability of automatic maintenance, so as to solve the problem of security in the system failure state Proxy service stop problem, so that the system can continue to provide services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for user request verification based on variable security level
  • A method and system for user request verification based on variable security level
  • A method and system for user request verification based on variable security level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0024] like figure 1 As shown, the present invention provides a user request verification method based on a variable security level, comprising:

[0025] S101. Detect whether the user's mobile terminal activation device can be accessed normally according to the set frequency;

[0026] S102. If the user mobile terminal activation device can be accessed normally, after receiving the user request for accessing the mailbox sent by the u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the present invention provides a user request verification method based on a variable security level, which is characterized by comprising: detecting whether the user's mobile terminal activation device can be accessed normally according to a set frequency; if the user's mobile terminal activation device can be accessed normally , then after receiving the user request for accessing the mailbox sent by the user's mobile terminal, verify the user's request by means of a normal security verification level; if the user's mobile terminal activation device cannot be accessed normally, after receiving the user's After the user request for accessing the mailbox sent by the mobile terminal, the user request is verified by lowering the security verification level. Through this solution, the method of automatically adjusting the security verification level according to the operating status of the system solves the problem that the security proxy service stops in the case of system failure, so that the system can continuously provide the security proxy service.

Description

technical field [0001] The invention relates to the field of network technologies, in particular to a user request verification method and system based on a variable security level. Background technique [0002] In the prior art, many intranet corporate mailbox services are directly exposed to the extranet; some corporate mailboxes use simple proxy technology for basic security protection, which only provides a basic limit on the number of access devices, and does not have the ability to control the list of user-specific mobile devices. There is no additional comprehensive defense strategy for restrictions such as device ID authentication of mailbox users and the number of user devices, and there is no authentication process for user mobile terminal devices accessing the mailbox server. [0003] At the same time, the existing technology does not have an automatic joint analysis and processing mechanism for service monitoring and fault analysis. When the user's mobile termin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L51/42
CPCH04L63/10H04L63/105H04L51/42
Inventor 盛洋康宇
Owner 新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products