Security verification method and device

The invention provides a security verification method, comprising the steps of: acquiring log data associated with a to-be-verified first terminal device, the log data comprising request log data and response log data; based on the log data, performing security verification on the first terminal dev...

Full description

Saved in:
Bibliographic Details
Main Authors XU CAIBING, GAO YANMING, JIA XINDONG, GUO XIAODAN
Format Patent
LanguageChinese
English
Published 04.06.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention provides a security verification method, comprising the steps of: acquiring log data associated with a to-be-verified first terminal device, the log data comprising request log data and response log data; based on the log data, performing security verification on the first terminal device to determine whether the first terminal device has a suspicious behavior record and obtain a verification result, the suspicious behavior including a suspicious login behavior and/or a suspicious transaction behavior; and according to the verification result, determining whether the first terminal device is a suspicious device needing security protection. The invention further provides a security verification device, electronic equipment and a computer storage medium. 本公开提供了一种安全验证方法,包括:获取与待验证的第一终端设备关联的日志数据,所述日志数据包括请求日志数据和响应日志数据;基于所述日志数据进行针对所述第一终端设备的安全验证,以确定所述第一终端设备是否存在可疑行为记录,得到验证结果,其中,所述可疑行为包括可疑登录行为和/或可疑交易行为;根据所述验证结果,确定所述第一终端设备是否为需进行安全防护的可疑设备。本公开还提供了一种安全验证装置、一种电子设备及一种计算机存储介质。
Bibliography:Application Number: CN202110169890