OPERATION DEFENSE METHOD AND DEVICE, APPARATUS, AND COMPUTER-READABLE STORAGE MEDIUM

    公开(公告)号:US20200019904A1

    公开(公告)日:2020-01-16

    申请号:US16447248

    申请日:2019-06-20

    Abstract: An operation defense method and device, apparatus and computer-readable storage medium are provided. The method includes: receiving an operation request from a business system through a shared interface; according to a parameter carried in the operation request, selecting at least one risk evaluation algorithm for the operation request from an algorithm rule library shared by a plurality of service systems; performing risk evaluation to the operation request with the selected risk evaluation algorithm; and according to a risk evaluation result, determining to allow the operation request. In the present application, a centralized operation defense mechanism is used to analyze the operation requests from different service systems and to select an appropriate risk evaluation algorithm to calculate the risk coefficient of each operation request, so that an operation with a high risk can be prevented, and a diffusion range of an abnormality can be reduced.

    Operation defense method and device, apparatus, and computer-readable storage medium

    公开(公告)号:US11475383B2

    公开(公告)日:2022-10-18

    申请号:US16447248

    申请日:2019-06-20

    Abstract: An operation defense method and device, apparatus and computer-readable storage medium are provided. The method includes: receiving an operation request from a business system through a shared interface; according to a parameter carried in the operation request, selecting at least one risk evaluation algorithm for the operation request from an algorithm rule library shared by a plurality of service systems; performing risk evaluation to the operation request with the selected risk evaluation algorithm; and according to a risk evaluation result, determining to allow the operation request. In the present application, a centralized operation defense mechanism is used to analyze the operation requests from different service systems and to select an appropriate risk evaluation algorithm to calculate the risk coefficient of each operation request, so that an operation with a high risk can be prevented, and a diffusion range of an abnormality can be reduced.

Patent Agency Ranking