CN105553996B - Handle the method and device of data access request - Google Patents

Handle the method and device of data access request Download PDF

Info

Publication number
CN105553996B
CN105553996B CN201510974879.4A CN201510974879A CN105553996B CN 105553996 B CN105553996 B CN 105553996B CN 201510974879 A CN201510974879 A CN 201510974879A CN 105553996 B CN105553996 B CN 105553996B
Authority
CN
China
Prior art keywords
data
access
interface
request
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510974879.4A
Other languages
Chinese (zh)
Other versions
CN105553996A (en
Inventor
赵宇翔
任建峰
李跃红
袁研根
洪伟
李勇智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qizhi Business Consulting Co ltd
Beijing Qihoo Technology Co Ltd
360 Digital Security Technology Group Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510974879.4A priority Critical patent/CN105553996B/en
Publication of CN105553996A publication Critical patent/CN105553996A/en
Application granted granted Critical
Publication of CN105553996B publication Critical patent/CN105553996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of method and devices for handling data access request, which comprises detection is from the user for accessing the data access request of data-interface, and extracts the request relevant information of the data access request;Based on the request relevant information, rule is verified by access corresponding with the data-interface, judges whether the data access request has the access authority to the data-interface;If the data access request has the access authority to the data-interface, the data access request is sent to the data-interface.The above method and device realize the access times limitation to data-interface, to achieve the purpose that the load for reducing to server-side request and then reducing server-side corresponding data interface.

Description

Handle the method and device of data access request
Technical field
The present invention relates to Internet technical fields, specifically, the present invention relates to a kind of sides for handling data access request Method and device.
Background technique
With the development of the times, various terminal equipment has become essential tool in for people's lives, and various functions are strong Big terminal operating system and end application continues to bring out, and brings more convenient and fast experience for user.User is using During end application, it is often necessary to carry out data interaction with server.In the prior art, user passes through terminal applies When program sends data access request to server, server or end application do not ask user data access request Ask number to be verified, thus can not judge user data access request whether be it is extra, if multiple data access request In a short time when frequent requests data-interface, mass data access request is sent to data-interface by client, will be increased The data processing pressure of server-side corresponding data interface, causes server load excessive, influences data-handling efficiency, meanwhile, drop The response speed of the data access request of low terminal.
Therefore, it is necessary to a kind of schemes for handling data access request, so that solving server-side receives mass data access The problem of leading to server-side overload after request.
Summary of the invention
To overcome above-mentioned technical problem or at least being partially solved above-mentioned technical problem, spy proposes following technical scheme:
The embodiment of the present invention proposes a kind of method for handling data access request, comprising:
The data access request from the user for being used to access data-interface is detected, and extracts the data access request Request relevant information;
Based on the request relevant information, rule is verified by access corresponding with the data-interface, judges the number Whether there is the access authority to the data-interface according to access request;
If the data access request has the access authority to the data-interface, the data access request is sent out It send to the data-interface.
Preferably, this method further include:
Rule is verified by pre-stored access corresponding with the data-interface, whether judges the data access request With the access authority to the data-interface.
Preferably, this method further include:
Access verification rule corresponding with the data-interface is set.
Preferably, the request relevant information includes but is not limited to:
The identification information of data-interface;The identification information of user;The request time of data access request.
Preferably, the access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
It is preferably based on the request relevant information, rule, judgement are verified by access corresponding with the data-interface Whether the data access request has the access authority to the data-interface, further comprises:
For the user, the data access request asking in expired time corresponding with the data-interface is determined Seek number;
Judge the big of the request number of times and the maximum access times in expired time corresponding with the data-interface Small relationship;
If judging, the request number of times without departing from the maximum access times, determines that the data access request has to institute State the access authority of data-interface;
If judging, the request number of times beyond the maximum access times, determines that the data access request does not have to institute State the access authority of data-interface.
Preferably, this method further include:
If the data access request does not have the access authority to the data-interface, intercepts the data access and ask It asks;
It generates and sends failure prompt information, and the failure prompt information is provided to the user.
Another embodiment of the present invention proposes a kind of method for handling data access request, comprising:
It receives from the user for accessing the data access request of data-interface;
Extract the request relevant information of the data access request, and be based on the request relevant information, using with it is described The corresponding access verification rule of data-interface, judges whether the data access request has the access right to the data-interface Limit;
If judging, the data access request has the access authority to the data-interface, and the data access is forwarded to ask It asks to corresponding data-interface.
It is preferably based on the request relevant information, verifies rule, judgement using access corresponding with the data-interface Whether the data access request has the access authority to the data-interface, comprising:
For the user, the data access request asking in expired time corresponding with the data-interface is determined Seek number;
Judge the big of the request number of times and the maximum access times in expired time corresponding with the data-interface Small relationship;
If judging, the request number of times without departing from the maximum access times, determines that the data access request has to institute State the access authority of data-interface.
Preferably, this method further include:
If judging, the request number of times is equal to the maximum access times, issues the corresponding access verification of the data-interface Rule.
Preferably, this method further include:
If judging, the data access request does not have the access authority to the data-interface, generates and issues transmission and loses Lose prompt information.
Preferably, the access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
Another embodiment of the present invention proposes a kind of device for handling data access request, comprising:
Detection module, it is from the user for accessing the data access request of data-interface for detecting, and described in extraction The request relevant information of data access request;
First judgment module passes through access corresponding with data-interface school for being based on the request relevant information Rule is tested, judges whether the data access request has the access authority to the data-interface;
Sending module will be described if having the access authority to the data-interface for the data access request Data access request is sent to the data-interface.
Preferably, the device further include:
Second judgment module judges institute for verifying rule by pre-stored access corresponding with the data-interface State whether data access request has access authority to the data-interface.
Preferably, the device further include:
Setup module, for access verification rule corresponding with the data-interface to be arranged.
Preferably, the request relevant information includes but is not limited to:
The identification information of data-interface;The identification information of user;The request time of data access request.
Preferably, the access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
Preferably, the first judgment module further comprises:
First determination unit, for be directed to the user, determine the data access request with the data-interface pair The request number of times in expired time answered;
First judging unit, for judging the request number of times and in expired time corresponding with the data-interface The size relation of maximum access times;
Second determination unit, if for judging that the request number of times without departing from the maximum access times, determines the number There is the access authority to the data-interface according to access request;
Third determination unit, if for judging that the request number of times beyond the maximum access times, determines the data Access request does not have the access authority to the data-interface.
Preferably, the device further include:
Blocking module intercepts institute if not having the access authority to the data-interface for the data access request State data access request;
Sending module is generated, sends failure prompt information for generating, and the failure prompt information is provided to described User.
Another embodiment of the present invention proposes a kind of device for handling data access request, comprising:
Receiving module, it is from the user for accessing the data access request of data-interface for receiving;
Third judgment module for extracting the request relevant information of the data access request, and is based on the request phase Information is closed, rule is verified using access corresponding with the data-interface, judges whether the data access request has to institute State the access authority of data-interface;
Forwarding module, if for judging that the data access request has the access authority to the data-interface, forwarding The data access request is to corresponding data-interface.
Preferably, the third judgment module includes:
4th determination unit, for be directed to the user, determine the data access request with the data-interface pair The request number of times in expired time answered;
Second judgment unit, for judging the request number of times and in expired time corresponding with the data-interface The size relation of maximum access times;
5th determination unit, if for judging that the request number of times without departing from the maximum access times, determines the number There is the access authority to the data-interface according to access request.
Preferably, the device further include:
Module is issued, if issuing the data-interface for judging that the request number of times is equal to the maximum access times Corresponding access verification rule.
Preferably, the device further include:
Generation issues module, if for judging that the data access request does not have the access right to the data-interface Limit generates and issues transmission failure prompt information.
Preferably, the access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
In the embodiment of the present invention, a kind of scheme for handling data access request is proposed, according to data from the user The request relevant information of interface access request, the corresponding access verification rule of combined data interface, can accurately judge the data Whether access request has the access authority to data-interface;Access verification rule can be configured by client, user The access to data-interface can be limited according to itself requirements for access, while can also be existed by the access verification rule that server issues Client verifies the access times of data access request, realizes and accurately judges that data access request is in client The no access times beyond for the data-interface limit, if repeatedly frequent requests data connect data access request in a short time When mouth, locally data access request can be intercepted in client, and no longer send data access request to server-side, with this Achieve the purpose that reduce the load requested server-side, and then reduce server-side corresponding data interface;Meanwhile improving server-side number According to the client for the treatment of effeciency and terminal device to the response speed of data access request.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow diagram of the method for the processing data access request of one embodiment in the present invention;
Fig. 2 is the flow diagram of the method for the processing data access request of a preferred embodiment in the present invention;
Fig. 3 is the flow diagram of the method for the processing data access request of another embodiment in the present invention;
Fig. 4 is the structural schematic diagram of the device of the processing data access request of another embodiment in the present invention;
Fig. 5 is the structural schematic diagram of the device of the processing data access request of another preferred embodiment in the present invention;
Fig. 6 is the structural schematic diagram of the device of the processing data access request of another embodiment in the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Fig. 1 is the flow diagram of the method for the processing data access request of one embodiment in the present invention.The present embodiment Operations described below is executed in terminal to realize the processing to data access request.
Step S110: detection is from the user for accessing the data access request of data-interface, and extracts data access The request relevant information of request;Step S120: it based on request relevant information, is verified and is advised by access corresponding with data-interface Then, judge whether data access request has the access authority to data-interface;Step S130: if data access request have pair The access authority of data-interface, then be sent to data-interface for data access request.
In the embodiment of the present invention, a kind of scheme for handling data access request is proposed, according to data from the user The request relevant information of interface access request, the corresponding access verification rule of combined data interface, can accurately judge the data Whether access request has the access authority to data-interface;Access verification rule can be configured by client, user The access to data-interface can be limited according to itself requirements for access, while can also be existed by the access verification rule that server issues Client verifies the access times of data access request, realizes and accurately judges that data access request is in client The no access times beyond for the data-interface limit, if repeatedly frequent requests data connect data access request in a short time When mouth, locally data access request can be intercepted in client, and no longer send data access request to server-side, with this Achieve the purpose that reduce the load requested server-side, and then reduce server end corresponding data interface;Meanwhile improving server Response speed of the client of end data treatment effeciency and terminal device to data access request.
Step S110: detection is from the user for accessing the data access request of data-interface, and extracts data access The request relevant information of request.
Wherein, request relevant information includes but is not limited to:
The identification information of data-interface;
The identification information of user;
The request time of data access request.
For example, in terminal device, when detecting that the data from the user for access associated data interface visit every time When asking request, the request relevant information of data access request is extracted, as the identification information of user, the data that request access to connect Identification information, request time of request of data access of mouth etc., and request relevant information is recorded;Such as, the number extracted According in access request, the ID of user is " 0000001 ", the request time of request of data access be " 2015-11-18 00:00: When 00 ", the data-interface which is directed to is "/index/vote ";Then, data in request relevant information are visited It asks the identification information of the request time of request, the identification information of data-interface and user associated record, such as records User ID A data access is executed at " 2015-11-18 00:00:00 " for interface "/index/vote " for the user of " 0000001 " Request.
Step S120: based on request relevant information, rule is verified by access corresponding with data-interface, judges that data are visited Ask whether request has the access authority to data-interface.
Wherein, access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
Specifically, the request relevant information based on user verifies rule by access corresponding with data-interface, sentences first Whether the data-interface of disconnected user's access is more than expired time, is subsequently determined whether in expired time corresponding with data-interface most Big access times, finally, the request number of times based on expired time and maximum access times judges whether data access request has To the access authority of data-interface.
Step S120 is specifically included: being verified rule by pre-stored access corresponding with data-interface, is judged that data are visited Ask whether request has the access authority to data-interface.
For example, in the preset access verification rule of client, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times, and the request relevant information from user's User1 data access request includes: user User1 requests access to data-interface A at " 2015-12-19 13:10:00 " moment;It is corresponding with data-interface A by what is be pre-stored Access verify rule, judge the access authority for whether having to data-interface A from user User1 data access request.
Preferably, this method further includes step S140 (not shown);Step S140: setting is corresponding with data-interface Access verification rule.
For example, the corresponding access verification rule of data-interface A can be locally located by client in user User1, such as set Setting user User1 and accessing the total degree of data-interface A in 24 hours may not exceed 8 times.
In another example the corresponding access verification rule of data-interface A that server issues are as follows: all users visit in 24 hours Ask that the total degree of data-interface A may not exceed 6 times, after client receives the verification rule of the access from server, saving should Access verification rule simultaneously carries out corresponding parameter setting.
Wherein, in locally pre-stored access verification rule corresponding with data-interface, such as in web terminal, it can pass through HTML5's LocalStorage carries out persistent storage, can also be stored by modes such as cookie;Such as in client, then this is stored to In ground database.
In a preferred embodiment, as shown in Fig. 2, passing through access corresponding with data-interface based on request relevant information Verification rule, judges that the step of whether data access request has the access authority to data-interface further comprises step S221, step S222, step S223 and step S224.Step S221: it is directed to user, determines that data access request connects with data Request number of times in the corresponding expired time of mouth;Step S222: judge request number of times and when corresponding with data-interface expired The size relation of interior maximum access times;Step S223: if judging, request number of times without departing from maximum access times, determines number There is the access authority to data-interface according to access request;Step S224: if judging, request number of times exceeds maximum access times, really Data access request is determined without the access authority to data-interface.
For example, the user User2 that client is extracted requests access to the request relevant information of data-interface A, including user The request time that ID " User2 ", the title " data-interface A " of the data-interface requested access to, request of data access is " 2015- 12-19 13:10:00";Expired time corresponding with data-interface " data-interface A " is one day, corresponding with data-interface Maximum access times in expired time are 5 times;According to User ID " User2 " and the title " data-interface A " of data-interface, The record that User ID " User2 " is directed to " data-interface A " corresponding data access request is inquired in storage region, is inquired from head Secondary User ID " User2 " request " data-interface A ", request time is " 2015-12-19 08:05:00 " for the first time, until this is requested Request time " 2015-12-19 13:10:00 " between data access request number be 5, that is, judge request number of times 5 not Beyond in intraday maximum access times 5 corresponding with data-interface A, it may be determined that user's User2 data access request has To the access authority of data-interface A;If user requests access to data-interface A again, user User2 this time requests access to data In the relevant information of interface A, the identification information of identification information " User2 ", the data-interface requested access to including user " data-interface A ", the number requested access in the time on the day of 2015-12-19 are the 6th time, for user User2, judge this Secondary request number of times 6 is beyond the maximum access times 5 in the time on the day of 2015-12-19 corresponding with data-interface A, it may be determined that This time data access request does not have the access authority to data-interface A to user User2.
In another example client is received at " 2015-11-18 00:04:11 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", determine in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:04:11 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 4 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user The request number of times of " 0000001 " data access request in 5 minutes is 4 times, and is less than maximum access times 5 times, therefore can be sentenced This data access request of breaking has the access authority to data-interface "/index/vote ".
In another example client is received at " 2015-11-18 00:05:20 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:05:20 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 6 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user " 0000001 " number is 6 times according to the request number of times of access request in 5 minutes, has been more than maximum access times 5 times, therefore can sentence This data access request of breaking does not have the access authority to data-interface "/index/vote ".
Step S130: if data access request has the access authority to data-interface, data access request is sent To data-interface.
Specifically, when judgement, which obtains data access request, to be had to the access authority of data-interface, client is by user Data access request be sent to the corresponding data-interface of server-side.
(refer to Fig. 1) in a preferred embodiment, this method further includes step S150 (not shown) and step S160 (not shown).Step S150: if data access request does not have the access authority to data-interface, data interception access is asked It asks;Step S160: it generates and sends failure prompt information, and failure prompt information is provided to user.
For example, when determining that the data access request from user User2 does not have the access authority to data-interface A, User User2 is intercepted to the data access request of data-interface A, and generates transmission failure prompt information, " has been more than such as maximum visit Ask number ", and failure prompt information is provided to user User2.
Fig. 3 is the flow diagram of the method for the processing data access request of another embodiment in the present invention.
Step S310: it receives from the user for accessing the data access request of data-interface;Step S320: number is extracted According to the request relevant information of access request, and based on request relevant information, rule is verified using access corresponding with data-interface, Judge whether data access request has the access authority to data-interface;Step S330: if judging, data access request has To the access authority of data-interface, forward data access request to corresponding data-interface.
Wherein, access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
For example, in the preset access verification rule of server-side, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times;Server receives the data for accessing data-interface A from user User3 and visits Ask request, the request relevant information from user's User3 data access request includes: that the ID of user is " User3 ", data access The data-interface that the request time of request is " 2015-12-19 13:10:00 ", the data access request is directed to is " data-interface A";And request relevant information is recorded;Such as, in the data access request extracted, the ID of user is " User3 ", data The request time requested access to is " 2015-12-19 13:10:00 ", and the data-interface which is directed to is " data Interface A ";Then, the request time of data access request in relevant information, the identification information of data-interface and user will be requested The associated record of identification information, such as record User ID be " User3 " user for interface A " 2015-12-19 13:10: 00 " executes a data access request;Then, rule is verified by the access corresponding with data-interface A that server-side is pre-stored, The access authority for whether having to data-interface A from user User3 data access request is judged, if judging user's User3 number There is the access authority to data-interface A, forwarding data access request to data-interface A according to access request.
Step S320 specifically includes step S321 (not shown), step S322 (not shown), step S323 (figure In be not shown) and step S324 (not shown).Step S321: it is directed to user, determines that data access request connects with data Request number of times in the corresponding expired time of mouth;Step S322: judge request number of times and when corresponding with data-interface expired The size relation of interior maximum access times;Step S323: if judging, request number of times without departing from maximum access times, determines number There is the access authority to data-interface according to access request.
Specifically, the request relevant information based on user verifies rule by access corresponding with data-interface, sentences first Whether the data-interface of disconnected user's access is more than expired time, is subsequently determined whether in expired time corresponding with data-interface most Big access times, finally, the request number of times based on expired time and maximum access times judges whether data access request has To the access authority of data-interface.
For example, in the preset access verification rule of server-side, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times;Server receives the data for accessing data-interface A from user User3 and visits It asks request, extracts the request relevant information of data access request, the ID including user is " User3 ", data access request The data-interface that request time is " 2015-12-19 15:10:00 ", the data access request is directed to is " data-interface A ", really It is scheduled on the time that the time point " 2015-12-19 00:00:00 " of user " User3 " request data interface A for the first time requests to this The data for data-interface A from user " User3 " are received in the time interval of point " 2015-12-19 15:10:00 " The number of access request is 4 times, that is, judges request number of times 4 without departing from intraday maximum access corresponding with data-interface A Number 4, it may be determined that the data access request from user User3 has the access authority to data-interface A;If user asks again Access data-interface A is sought, then user User3 is this time requested access in the relevant information of data-interface A, the identity mark including user Know information " User3 ", the identification information " data-interface A " of the data-interface requested access to, on the day of 2015-12-19 in the time The number requested access to is the 5th, for user User3, judges that this request number of times 5 exceeds corresponding with data-interface A Maximum access times 5 on the day of 2015-12-19 in the time, it may be determined that this time data access request does not have logarithm to user User3 According to the access authority of interface A.
In another example server-side is received at " 2015-11-18 00:05:20 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:05:20 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 6 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user " 0000001 " number is 6 times according to the request number of times of access request in 5 minutes, has been more than maximum access times 5 times, therefore can sentence This data access request of breaking does not have the access authority to data-interface "/index/vote ".
In a preferred embodiment (referring to Fig. 3), this method further includes step S340 (not shown).Step S340: If judging, request number of times is equal to maximum access times, issues the corresponding access verification rule of data-interface.
For example, verify rule according to the preset access of server-side, when judge user User3 " 2015-12-19 15:10: The access request number 4 that 00 " moment requested access to data-interface A is equal to user User3 access data-interface A in 2015-12-19 When maximum access times in 24 hours same day, server issues the corresponding access verification rule of data-interface A to terminal, such as uses The data-interface A's that family User3 is accessed in " 2015-12-19 00:00:00-2015-12-19 24:00:00 " time interval Total degree is no more than 4 times.
The present embodiment may be implemented in server end and accurately judge whether data access request exceeds for the data-interface Access times limitation goal of the invention, if repeatedly data access request in a short time frequent requests data-interface when, taking The front end judgement of business device has reached the limitation of access request number for specific user for specific data interface, then will access school It tests rule and is issued to client, and directly execute request verification and the interception of data access request in client, without again will The front end that data access request is sent to server is verified, and the load of reduction server is achieved the purpose that with this.One (referring to Fig. 3) in preferred embodiment, this method further includes step S350 (not shown).Step S350: if judging, data are visited It asks that request does not have the access authority to data-interface, generate and issues transmission failure prompt information.
For example, if user User3 requests access to data-interface A, user at " 2015-12-19 18:10:00 " User3 is this time requested access in the relevant information of data-interface A, and identification information " User3 " including user requests access to The identification information " data-interface A " of data-interface determine that request data connects for the first time in user " User3 " for user User3 The time at time point " 2015-12-19 00:00:00 " to this time point " 2015-12-19 18:10:00 " requested of mouth A The number that the data access request for data-interface A from user " User3 " is received in section is 6 times, and judgement is this time Request number of times 6, can beyond the maximum access times 4 in the 24 hour time on the day of 2015-12-19 corresponding with data-interface A Determine that this time data access request subsequently generates user's User3 number without the access authority to data-interface A to user User3 According to the prompt information such as " being more than maximum access times " of access request failure, and it will be prompted to information and be issued to client to be used for Prompt user.
In another embodiment of the present invention, a kind of method for handling data access request is proposed, server-side is according to reception The request relevant information of the data-interface access request from the user arrived, the corresponding access verification rule of combined data interface, It can accurately judge whether the data access request has the access authority to data-interface;Wherein, for the visit of data-interface Ask verification rule without being issued to client record and setting, it is only necessary to verify rule, easily accessible school in server-side maintenance access It tests the variation of regular modification and business demand based on data-interface and is updated in time, reduce access verification rule Maintenance cost.Simultaneously, it can be achieved that accurately judging whether data access request exceeds the access times for the data-interface The goal of the invention of limitation, if repeatedly data access request in a short time frequent requests data-interface when, can be before server End intercepts data access request, and no longer forwards data access request to corresponding data interface, is reduced with this to reach To the purpose of data interface requests, the load of data-interface is reduced.
Fig. 4 is the structural schematic diagram of the device of the processing data access request of another embodiment in the present invention.
The present embodiment executes operations described below in terminal to realize the processing to data access request.
Detection module 410 detects the data access request from the user for being used to access data-interface, and extracts data visit Ask the request relevant information of request;Based on request relevant information, rule is verified by access corresponding with data-interface, first sentences Disconnected module 420 judges whether data access request has the access authority to data-interface;If data access request has logarithm According to the access authority of interface, data access request is then sent to data-interface by sending module 430.
In the embodiment of the present invention, a kind of scheme for handling data access request is proposed, according to data from the user The request relevant information of interface access request, the corresponding access verification rule of combined data interface, can accurately judge the data Whether access request has the access authority to data-interface;Access verification rule can be configured by client, user The access to data-interface can be limited according to itself requirements for access, while can also be existed by the access verification rule that server issues Client verifies the access times of data access request, realizes and accurately judges that data access request is in client The no access times beyond for the data-interface limit, if repeatedly frequent requests data connect data access request in a short time When mouth, locally data access request can be intercepted in client, and no longer send data access request to server-side, with this Achieve the purpose that reduce the load requested server-side, and then reduce server end corresponding data interface;Meanwhile improving server Response speed of the client of end data treatment effeciency and terminal device to data access request.
Detection module 410 detects the data access request from the user for being used to access data-interface, and extracts data visit Ask the request relevant information of request.
Wherein, request relevant information includes but is not limited to:
The identification information of data-interface;
The identification information of user;
The request time of data access request.
For example, in terminal device, when detecting that the data from the user for access associated data interface visit every time When asking request, the request relevant information of data access request is extracted, as the identification information of user, the data that request access to connect Identification information, request time of request of data access of mouth etc., and request relevant information is recorded;Such as, the number extracted According in access request, the ID of user is " 0000001 ", the request time of request of data access be " 2015-11-18 00:00: When 00 ", the data-interface which is directed to is "/index/vote ";Then, data in request relevant information are visited It asks the identification information of the request time of request, the identification information of data-interface and user associated record, such as records User ID A data access is executed at " 2015-11-18 00:00:00 " for interface "/index/vote " for the user of " 0000001 " Request.
Based on request relevant information, rule is verified by access corresponding with data-interface, first judgment module 420 judges Whether data access request has the access authority to data-interface.
Wherein, access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
Specifically, the request relevant information based on user verifies rule by access corresponding with data-interface, sentences first Whether the data-interface of disconnected user's access is more than expired time, is subsequently determined whether in expired time corresponding with data-interface most Big access times, finally, the request number of times based on expired time and maximum access times judges whether data access request has To the access authority of data-interface.
First judgment module 420 is specifically used for verifying rule, judgement by pre-stored access corresponding with data-interface Whether data access request has the access authority to data-interface.
For example, in the preset access verification rule of client, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times, and the request relevant information from user's User1 data access request includes: user User1 requests access to data-interface A at " 2015-12-19 13:10:00 " moment;It is corresponding with data-interface A by what is be pre-stored Access verify rule, judge the access authority for whether having to data-interface A from user User1 data access request.
Preferably, which further includes setup module (not shown);Setup module setting is corresponding with data-interface Access verification rule.
For example, the corresponding access verification rule of data-interface A can be locally located by client in user User1, such as set Setting user User1 and accessing the total degree of data-interface A in 24 hours may not exceed 8 times.
In another example the corresponding access verification rule of data-interface A that server issues are as follows: all users visit in 24 hours Ask that the total degree of data-interface A may not exceed 6 times, after client receives the verification rule of the access from server, saving should Access verification rule simultaneously carries out corresponding parameter setting.
Wherein, in locally pre-stored access verification rule corresponding with data-interface, such as in web terminal, it can pass through HTML5's LocalStorage carries out persistent storage, can also be stored by modes such as cookie;Such as in client, then this is stored to In ground database.
In a preferred embodiment, as shown in figure 5, first judgment module further comprises the first determination unit 521, first Judging unit 522, the second determination unit 523 and third determination unit 524.First determination unit 521 is directed to user, determines data Request number of times of the access request in expired time corresponding with data-interface;First judging unit 522 judge request number of times with The size relation of maximum access times in expired time corresponding with data-interface;If the judgement of the second determination unit 523 is asked It asks number without departing from maximum access times, determines that data access request has the access authority to data-interface;Third determines single If member 524 judges that request number of times exceeds maximum access times, determine that data access request does not have the access right to data-interface Limit.
For example, the user User2 that client is extracted requests access to the request relevant information of data-interface A, including user The request time that ID " User2 ", the title " data-interface A " of the data-interface requested access to, request of data access is " 2015- 12-19 13:10:00";Expired time corresponding with data-interface " data-interface A " is one day, corresponding with data-interface Maximum access times in expired time are 5 times;According to User ID " User2 " and the title " data-interface A " of data-interface, The record that User ID " User2 " is directed to " data-interface A " corresponding data access request is inquired in storage region, is inquired from head Secondary User ID " User2 " request " data-interface A ", request time is " 2015-12-19 08:05:00 " for the first time, until this is requested Request time " 2015-12-19 13:10:00 " between data access request number be 5, that is, judge request number of times 5 not Beyond in intraday maximum access times 5 corresponding with data-interface A, it may be determined that user's User2 data access request has To the access authority of data-interface A;If user requests access to data-interface A again, user User2 this time requests access to data In the relevant information of interface A, the identification information of identification information " User2 ", the data-interface requested access to including user " data-interface A ", the number requested access in the time on the day of 2015-12-19 are the 6th time, for user User2, judge this Secondary request number of times 6 is beyond the maximum access times 5 in the time on the day of 2015-12-19 corresponding with data-interface A, it may be determined that This time data access request does not have the access authority to data-interface A to user User2.
In another example client is received at " 2015-11-18 00:04:11 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", determine in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:04:11 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 4 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user The request number of times of " 0000001 " data access request in 5 minutes is 4 times, and is less than maximum access times 5 times, therefore can be sentenced This data access request of breaking has the access authority to data-interface "/index/vote ".
In another example client is received at " 2015-11-18 00:05:20 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:05:20 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 6 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user " 0000001 " number is 6 times according to the request number of times of access request in 5 minutes, has been more than maximum access times 5 times, therefore can sentence This data access request of breaking does not have the access authority to data-interface "/index/vote ".
If data access request has the access authority to data-interface, sending module 430 sends out data access request It send to data-interface.
Specifically, when judgement, which obtains data access request, to be had to the access authority of data-interface, client is by user Data access request be sent to the corresponding data-interface of server-side.
(refer to Fig. 4) in a preferred embodiment, which further includes that blocking module (not shown) and generation are sent Module (not shown).If blocking module data access request does not have the access authority to data-interface, data interception is visited Ask request;It generates sending module and generates transmission failure prompt information, and failure prompt information is provided to user.
For example, when determining that the data access request from user User2 does not have the access authority to data-interface A, User User2 is intercepted to the data access request of data-interface A, and generates transmission failure prompt information, " has been more than such as maximum visit Ask number ", and failure prompt information is provided to user User2.
Fig. 6 is the structural schematic diagram of the device of the processing data access request of another embodiment in the present invention.
Receiving module 610 receives from the user for accessing the data access request of data-interface;Third judgment module 620 extract the request relevant information of data access request, and based on request relevant information, utilize access corresponding with data-interface Verification rule, judges whether data access request has the access authority to data-interface;If forwarding module 630 judges that data are visited Ask that request has the access authority to data-interface, forwarding data access request to corresponding data-interface.
Wherein, access verification rule includes but is not limited to:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
For example, in the preset access verification rule of server-side, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times;Server receives the data for accessing data-interface A from user User3 and visits Ask request, the request relevant information from user's User3 data access request includes: that the ID of user is " User3 ", data access The data-interface that the request time of request is " 2015-12-19 13:10:00 ", the data access request is directed to is " data-interface A";And request relevant information is recorded;Such as, in the data access request extracted, the ID of user is " User3 ", data The request time requested access to is " 2015-12-19 13:10:00 ", and the data-interface which is directed to is " data Interface A ";Then, the request time of data access request in relevant information, the identification information of data-interface and user will be requested The associated record of identification information, such as record User ID be " User3 " user for interface A " 2015-12-19 13:10: 00 " executes a data access request;Then, rule is verified by the access corresponding with data-interface A that server-side is pre-stored, The access authority for whether having to data-interface A from user User3 data access request is judged, if judging user's User3 number There is the access authority to data-interface A, forwarding data access request to data-interface A according to access request.
Third judgment module specifically includes the 4th determination unit (not shown), second judgment unit (not shown) With the 5th determination unit (not shown).4th determination unit be directed to user, determine data access request with data-interface Request number of times in corresponding expired time;Second judgment unit judges request number of times and when corresponding with data-interface expired The size relation of interior maximum access times;If judging request number of times without departing from maximum access times, the 5th determination unit is true Data access request is determined with the access authority to data-interface.
Specifically, the request relevant information based on user verifies rule by access corresponding with data-interface, sentences first Whether the data-interface of disconnected user's access is more than expired time, is subsequently determined whether in expired time corresponding with data-interface most Big access times, finally, the request number of times based on expired time and maximum access times judges whether data access request has To the access authority of data-interface.
For example, in the preset access verification rule of server-side, access verification rule includes that user accessed data in 24 hours The total degree of interface A may not exceed 4 times;Server receives the data for accessing data-interface A from user User3 and visits It asks request, extracts the request relevant information of data access request, the ID including user is " User3 ", data access request The data-interface that request time is " 2015-12-19 15:10:00 ", the data access request is directed to is " data-interface A ", really It is scheduled on the time that the time point " 2015-12-19 00:00:00 " of user " User3 " request data interface A for the first time requests to this The data for data-interface A from user " User3 " are received in the time interval of point " 2015-12-19 15:10:00 " The number of access request is 4 times, that is, judges request number of times 4 without departing from intraday maximum access corresponding with data-interface A Number 4, it may be determined that the data access request from user User3 has the access authority to data-interface A;If user asks again Access data-interface A is sought, then user User3 is this time requested access in the relevant information of data-interface A, the identity mark including user Know information " User3 ", the identification information " data-interface A " of the data-interface requested access to, on the day of 2015-12-19 in the time The number requested access to is the 5th, for user User3, judges that this request number of times 5 exceeds corresponding with data-interface A Maximum access times 5 on the day of 2015-12-19 in the time, it may be determined that this time data access request does not have logarithm to user User3 According to the access authority of interface A.
In another example server-side is received at " 2015-11-18 00:05:20 " is directed to number from user " 0000001 " According to the data access request of interface "/index/vote ", in user " 0000001 " request data interface "/index/ for the first time The time point " 2015-11-18 00:00:00 " of vote " to this time point " 2015-11-18 00:05:20 " requested when Between time of the data access request for data-interface "/index/vote " from user " 0000001 " is received in section Number be 6 times, access verification rule in the predefined expired time for data-interface "/index/vote " be 5 minutes, with Maximum access times in the corresponding expired time of data-interface "/index/vote " are 5 times, can determine whether this from user " 0000001 " number is 6 times according to the request number of times of access request in 5 minutes, has been more than maximum access times 5 times, therefore can sentence This data access request of breaking does not have the access authority to data-interface "/index/vote ".
In a preferred embodiment (referring to Fig. 6), which further includes issuing module (not shown).If issuing module Judge that request number of times is equal to maximum access times, issues the corresponding access verification rule of data-interface.
For example, verify rule according to the preset access of server-side, when judge user User3 " 2015-12-19 15:10: The access request number 4 that 00 " moment requested access to data-interface A is equal to user User3 access data-interface A in 2015-12-19 When maximum access times in 24 hours same day, server issues the corresponding access verification rule of data-interface A to terminal, such as uses The data-interface A's that family User3 is accessed in " 2015-12-19 00:00:00-2015-12-19 24:00:00 " time interval Total degree is no more than 4 times.
The present embodiment may be implemented in server end and accurately judge whether data access request exceeds for the data-interface Access times limitation goal of the invention, if repeatedly data access request in a short time frequent requests data-interface when, taking The front end judgement of business device has reached the limitation of access request number for specific user for specific data interface, then will access school It tests rule and is issued to client, and directly execute request verification and the interception of data access request in client, without again will The front end that data access request is sent to server is verified, and the load of reduction server is achieved the purpose that with this.One (referring to Fig. 6) in preferred embodiment, which further includes generating to issue module (not shown).If judging data access request Without the access authority to data-interface, generation issues module and generates and issue transmission failure prompt information.
For example, if user User3 requests access to data-interface A, user at " 2015-12-19 18:10:00 " User3 is this time requested access in the relevant information of data-interface A, and identification information " User3 " including user requests access to The identification information " data-interface A " of data-interface determine that request data connects for the first time in user " User3 " for user User3 The time at time point " 2015-12-19 00:00:00 " to this time point " 2015-12-19 18:10:00 " requested of mouth A The number that the data access request for data-interface A from user " User3 " is received in section is 6 times, and judgement is this time Request number of times 6, can beyond the maximum access times 4 in the 24 hour time on the day of 2015-12-19 corresponding with data-interface A Determine that this time data access request subsequently generates user's User3 number without the access authority to data-interface A to user User3 According to the prompt information such as " being more than maximum access times " of access request failure, and it will be prompted to information and be issued to client to be used for Prompt user.
In another embodiment of the present invention, a kind of device for handling data access request is proposed, server-side is according to reception The request relevant information of the data-interface access request from the user arrived, the corresponding access verification rule of combined data interface, It can accurately judge whether the data access request has the access authority to data-interface;Wherein, for the visit of data-interface Ask verification rule without being issued to client record and setting, it is only necessary to verify rule, easily accessible school in server-side maintenance access It tests the variation of regular modification and business demand based on data-interface and is updated in time, reduce access verification rule Maintenance cost.Simultaneously, it can be achieved that accurately judging whether data access request exceeds the access times for the data-interface The goal of the invention of limitation, if repeatedly data access request in a short time frequent requests data-interface when, can be before server End intercepts data access request, and no longer forwards data access request to corresponding data interface, is reduced with this to reach To the purpose of data interface requests, the load of data-interface is reduced.
Those skilled in the art of the present technique are appreciated that the present invention includes being related to for executing in operation described herein One or more equipment.These equipment can specially design and manufacture for required purpose, or also may include general Known device in computer.These equipment have the computer program being stored in it, these computer programs are selectively Activation or reconstruct.Such computer program can be stored in equipment (for example, computer) readable medium or be stored in It e-command and is coupled in any kind of medium of bus respectively suitable for storage, the computer-readable medium includes but not Be limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, only Read memory), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), flash memory, magnetic card or light card Piece.It is, readable medium includes by equipment (for example, computer) with any Jie for the form storage or transmission information that can be read Matter.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or The combination of each frame and these structure charts and/or the frame in block diagram and/or flow graph in block diagram and/or flow graph.This technology neck Field technique personnel be appreciated that these computer program instructions can be supplied to general purpose computer, special purpose computer or other The processor of programmable data processing method is realized, to pass through the processing of computer or other programmable data processing methods The scheme specified in frame or multiple frames of the device to execute structure chart and/or block diagram and/or flow graph disclosed by the invention.
Those skilled in the art of the present technique have been appreciated that in the present invention the various operations crossed by discussion, method, in process Steps, measures, and schemes can be replaced, changed, combined or be deleted.Further, each with having been crossed by discussion in the present invention Kind of operation, method, other steps, measures, and schemes in process may also be alternated, changed, rearranged, decomposed, combined or deleted. Further, in the prior art to have and the step in various operations, method disclosed in the present invention, process, measure, scheme It may also be alternated, changed, rearranged, decomposed, combined or deleted.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (16)

1. a kind of method for handling data access request, comprising:
The data access request from the user for being used to access data-interface is detected, and extracts the request of the data access request Relevant information;
Based on the request relevant information, rule is verified by access corresponding with the data-interface, judges that the data are visited Ask whether request has the access authority to the data-interface;By client, access corresponding with the data-interface is set Verification rule;Wherein, access verification rule includes but is not limited to: expired time corresponding with data-interface;With data-interface Maximum access times in corresponding expired time;Request number of times judgment rule based on expired time and maximum access times;
If the data access request has the access authority to the data-interface, the data access request is sent to The data-interface;
If data access request does not have the access authority to data-interface, data interception access request.
2. the method for processing data access request according to claim 1, wherein further include:
Rule is verified by pre-stored access corresponding with the data-interface, judges whether the data access request has To the access authority of the data-interface.
3. the method for -2 described in any item processing data access requests according to claim 1, wherein the request relevant information It includes at least:
The identification information of data-interface;The identification information of user;The request time of data access request.
4. the method for processing data access request according to claim 3, wherein be based on the request relevant information, lead to Access verification rule corresponding with the data-interface is crossed, judges whether the data access request has to the data-interface Access authority, further comprise:
For the user, the data access request request in expired time corresponding with the data-interface time is determined Number;
Judge that the size of the request number of times and the maximum access times in expired time corresponding with the data-interface is closed System;
If judging, the request number of times without departing from the maximum access times, determines that the data access request has to the number According to the access authority of interface;
If judging, the request number of times beyond the maximum access times, determines that the data access request does not have to the number According to the access authority of interface.
5. the method for processing data access request according to claim 4, wherein further include:
If the data access request does not have the access authority to the data-interface, the data access request is intercepted;
It generates and sends failure prompt information, and the failure prompt information is provided to the user.
6. a kind of method for handling data access request, comprising:
It receives from the user for accessing the data access request of data-interface;
Extract the request relevant information of the data access request, and be based on the request relevant information, using with the data The corresponding access verification rule of interface, judges whether the data access request has the access authority to the data-interface; Wherein, for the access verification rule of data-interface without being issued to client record and setting, it is only necessary to safeguard and visit in server-side Ask verification rule;
If judging, the data access request has the access authority to the data-interface, forwards the data access request extremely Corresponding data-interface;
Wherein, it is based on the request relevant information, rule is verified using access corresponding with the data-interface, judges the number Whether there is the access authority to the data-interface according to access request, comprising:
For the user, the data access request request in expired time corresponding with the data-interface time is determined Number;
Judge that the size of the request number of times and the maximum access times in expired time corresponding with the data-interface is closed System;
If judging, the request number of times without departing from the maximum access times, determines that the data access request has to the number According to the access authority of interface;
Wherein, further includes:
If judging, the request number of times is equal to the maximum access times, issues the corresponding access verification rule of the data-interface Then.
7. the method for processing data access request according to claim 6, wherein further include:
If judging, the data access request does not have to the access authority of the data-interface, generates and issues transmission and unsuccessfully mentions Show information.
8. according to the method for the described in any item processing data access requests of claim 6-7, wherein the access verification rule Including at least following information:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
9. a kind of device for handling data access request, comprising:
Detection module, it is from the user for accessing the data access request of data-interface for detecting, and extract the data The request relevant information of access request;
First judgment module is verified by access corresponding with the data-interface and is advised for being based on the request relevant information Then, judge whether the data access request has the access authority to the data-interface;The access verification rule is at least Including following information: expired time corresponding with data-interface;Maximum access in expired time corresponding with data-interface Number;Request number of times judgment rule based on expired time and maximum access times;
Sending module, if there is the access authority to the data-interface for the data access request, by the data Access request is sent to the data-interface;
Blocking module, if not having the access authority to data-interface, data interception access request for data access request;
Wherein, further includes: setup module verifies rule for access corresponding with the data-interface to be arranged by client.
10. the device of processing data access request according to claim 9, wherein further include:
Second judgment module judges the number for verifying rule by pre-stored access corresponding with the data-interface Whether there is the access authority to the data-interface according to access request.
11. according to the device of the described in any item processing data access requests of claim 9-10, wherein the related letter of the request Breath includes at least:
The identification information of data-interface;The identification information of user;The request time of data access request.
12. the device of processing data access request according to claim 11, wherein the first judgment module is further Include:
First determination unit determines the data access request corresponding with the data-interface for being directed to the user Request number of times in expired time;
First judging unit, for judging the request number of times and the maximum in expired time corresponding with the data-interface The size relation of access times;
Second determination unit, if for judging that the request number of times without departing from the maximum access times, determines that the data are visited Ask that request has the access authority to the data-interface;
Third determination unit, if for judging that the request number of times beyond the maximum access times, determines the data access Request does not have the access authority to the data-interface.
13. the device of processing data access request according to claim 12, wherein further include:
Blocking module intercepts the number if not having the access authority to the data-interface for the data access request According to access request;
Sending module is generated, sends failure prompt information for generating, and the failure prompt information is provided to the user.
14. a kind of device for handling data access request, comprising:
Receiving module, it is from the user for accessing the data access request of data-interface for receiving;
Third judgment module, for extracting the request relevant information of the data access request, and based on the related letter of the request Breath verifies rule using access corresponding with the data-interface, judges whether the data access request has to the number According to the access authority of interface;Wherein, for the access verification rule of data-interface without being issued to client record and setting, only Rule need to be verified in server-side maintenance access;
Forwarding module, if for judging that the data access request has to the access authority of the data-interface, described in forwarding Data access request is to corresponding data-interface;
Wherein, the third judgment module includes:
4th determination unit determines the data access request corresponding with the data-interface for being directed to the user Request number of times in expired time;
Second judgment unit, for judging the request number of times and the maximum in expired time corresponding with the data-interface The size relation of access times;
5th determination unit, if for judging that the request number of times without departing from the maximum access times, determines that the data are visited Ask that request has the access authority to the data-interface;
Wherein, further includes:
Module is issued, if it is corresponding to issue the data-interface for judging that the request number of times is equal to the maximum access times Access verify rule.
15. the device of processing data access request according to claim 14, wherein further include:
Generation issues module, if for judging that the data access request does not have the access authority to the data-interface, it is raw At and issue transmission failure prompt information.
16. the device of the described in any item processing data access requests of 4-15 according to claim 1, wherein the access verification Rule includes at least following information:
Expired time corresponding with data-interface;
Maximum access times in expired time corresponding with data-interface;
Request number of times judgment rule based on expired time and maximum access times.
CN201510974879.4A 2015-12-23 2015-12-23 Handle the method and device of data access request Active CN105553996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510974879.4A CN105553996B (en) 2015-12-23 2015-12-23 Handle the method and device of data access request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510974879.4A CN105553996B (en) 2015-12-23 2015-12-23 Handle the method and device of data access request

Publications (2)

Publication Number Publication Date
CN105553996A CN105553996A (en) 2016-05-04
CN105553996B true CN105553996B (en) 2019-07-26

Family

ID=55832931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510974879.4A Active CN105553996B (en) 2015-12-23 2015-12-23 Handle the method and device of data access request

Country Status (1)

Country Link
CN (1) CN105553996B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107783906A (en) * 2017-09-28 2018-03-09 广州酷狗计算机科技有限公司 Method of testing, device and storage medium
CN109033857B (en) * 2018-07-25 2022-04-22 郑州云海信息技术有限公司 Method, device and equipment for accessing data and readable storage medium
CN109495515B (en) * 2019-01-02 2020-12-08 腾讯科技(深圳)有限公司 Sensitive information processing method and computer readable storage medium
CN111274590B (en) * 2020-01-17 2023-02-28 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN114189476B (en) * 2021-01-26 2023-12-08 长威信息科技发展股份有限公司 Multi-element interface shunting calling method and terminal
CN115102755A (en) * 2022-06-20 2022-09-23 中银金融科技有限公司 Resource access control method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701709A (en) * 2013-12-13 2014-04-02 北京京东尚科信息技术有限公司 Flow rate control method and system
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701709A (en) * 2013-12-13 2014-04-02 北京京东尚科信息技术有限公司 Flow rate control method and system
CN105100070A (en) * 2015-06-29 2015-11-25 北京奇虎科技有限公司 Method and device for preventing malicious attacks to interface service

Also Published As

Publication number Publication date
CN105553996A (en) 2016-05-04

Similar Documents

Publication Publication Date Title
CN105553996B (en) Handle the method and device of data access request
US8839369B1 (en) Methods and systems for detecting email phishing attacks
US9325696B1 (en) System and method for authenticating to a participating website using locally stored credentials
CN104519032B (en) A kind of security strategy and system of internet account number
CN102624677B (en) Method and server for monitoring network user behavior
CN106953738B (en) Risk control method and device
WO2008127431A3 (en) Systems and methods for identification and authentication of a user
CN104410674B (en) A kind of WEB session synchronization methods of single-node login system
CN109885037B (en) Vehicle diagnosis method and related equipment
CN104657653B (en) The verification method and checking device of image authentication code
CN106790129A (en) A kind of identity authentication method and device
CN110224992B (en) Method, apparatus, system and computer readable medium for shared resource restriction reuse
CN105430012B (en) A kind of multi-site synchronizes the method and device of login
US20180167379A1 (en) Method and device for processing user operation
CN102891861B (en) Client-based phishing website detection method and device
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
US9965624B2 (en) Log analysis device, unauthorized access auditing system, computer readable medium storing log analysis program, and log analysis method
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN110035087A (en) A kind of method, apparatus, equipment and storage medium from flow reduction account information
CN104601532B (en) A kind of method and device of logon account
CN110113346A (en) A kind of network verification method, user terminal and server
CN109426961B (en) Card binding risk control method and device
US20150081541A1 (en) Method and system for enabling transaction card security
CN106301787B (en) A method of with time authentication code
CN111949952B (en) Method for processing verification code request and computer-readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee after: Beijing Qizhi Business Consulting Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220402

Address after: 100016 1773, 15 / F, 17 / F, building 3, No.10, Jiuxianqiao Road, Chaoyang District, Beijing

Patentee after: Sanliu0 Digital Security Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Beijing Qizhi Business Consulting Co.,Ltd.