Security verification method and device
The invention provides a security verification method, comprising the steps of: acquiring log data associated with a to-be-verified first terminal device, the log data comprising request log data and response log data; based on the log data, performing security verification on the first terminal dev...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
04.06.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention provides a security verification method, comprising the steps of: acquiring log data associated with a to-be-verified first terminal device, the log data comprising request log data and response log data; based on the log data, performing security verification on the first terminal device to determine whether the first terminal device has a suspicious behavior record and obtain a verification result, the suspicious behavior including a suspicious login behavior and/or a suspicious transaction behavior; and according to the verification result, determining whether the first terminal device is a suspicious device needing security protection. The invention further provides a security verification device, electronic equipment and a computer storage medium.
本公开提供了一种安全验证方法,包括:获取与待验证的第一终端设备关联的日志数据,所述日志数据包括请求日志数据和响应日志数据;基于所述日志数据进行针对所述第一终端设备的安全验证,以确定所述第一终端设备是否存在可疑行为记录,得到验证结果,其中,所述可疑行为包括可疑登录行为和/或可疑交易行为;根据所述验证结果,确定所述第一终端设备是否为需进行安全防护的可疑设备。本公开还提供了一种安全验证装置、一种电子设备及一种计算机存储介质。 |
---|---|
Bibliography: | Application Number: CN202110169890 |