CN106101059A - A kind of web-page requests processing method and processing device - Google Patents
A kind of web-page requests processing method and processing device Download PDFInfo
- Publication number
- CN106101059A CN106101059A CN201610344363.6A CN201610344363A CN106101059A CN 106101059 A CN106101059 A CN 106101059A CN 201610344363 A CN201610344363 A CN 201610344363A CN 106101059 A CN106101059 A CN 106101059A
- Authority
- CN
- China
- Prior art keywords
- lock
- cycle
- request number
- request
- webpage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Abstract
The embodiment of the present invention provides a kind of web-page requests processing method and processing device, described method includes: when receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and lock-up cycle, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user;And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the lock-up cycle getting not to when corresponding resetting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle extends based on the increase of request number of times.Technique scheme has the advantages that and can intercept web page attacks request, makes locking time and locking upper limit number of times not to be detected out simultaneously.
Description
Technical field
The present invention relates to networking technology area, particularly relate to a kind of web-page requests processing method and processing device.
Background technology
User web (webpage) request is all based on greatly cookie, and (some website is in order to distinguish user identity, carry out
Session follows the tracks of and the data (generally going through encryption) that are stored on user local terminal), the stepping on of session (session control)
The authority of record checking identity judges and responds the request of service, and this is the general principle that web user identity logs in.
The solution of prior art: according to request UID (User Identification, user identity proves) or
IP (Internet Protocol, the agreement of interconnection between network) is arranged on the request number of times upper limit in a period of time.If request
After number of times exceedes the number of times of setting, return refusal service, to reach to close down rubbish request.
In realizing process of the present invention, inventor finds that in prior art, at least there are the following problems: in existing solution
In scheme, certain restriction can be had to reduce the effect of rubbish request rubbish request.Can be to general automatic request
Program closes down effect, but some senior requestors can detect locking time and the locking upper limit number of times of setting, this
Result in and close down inefficacy to what spam page was asked.
Content of the invention
The embodiment of the present invention provides a kind of web-page requests processing method and processing device, to intercept web page attacks request, makes simultaneously
Locking time and locking upper limit number of times can not be detected out.
On the one hand, embodiments providing a kind of web-page requests processing method, described method includes:
When receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and lock
The request number of times to this webpage for the described network user getting, if lock-up cycle is not out of date, is added 1 by fixed cycle;
If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user;
And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the locking week getting
The corresponding lock-up cycle of current request number of times, wherein, lock-up cycle in described corresponding relation is reset when phase is not to correspondence
Extend based on the increase of request number of times
On the other hand, embodiments providing a kind of web-page requests processing means, described device includes:
Acquiring unit, during for receiving the network user to the request of webpage, obtains the described network user to this webpage
Request number of times and lock-up cycle;
Determining unit, if not out of date for lock-up cycle, by the described network user that the gets request to this webpage
Number of times adds 1;
Lock cell, if for current request number of times more than or equal to locking upper limit threshold, then intercepting the described network user
Request to webpage;
Setup unit, after intercepting the described network user request to webpage at described lock cell, according to presetting
The corresponding relation of request number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not to when corresponding
Resetting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request time
Number increase and extend.
Technique scheme has the advantages that and can intercept web page attacks request, makes locking time and lock simultaneously
Determine upper limit number of times can not be detected out, and on the basis of being defined as malicious requests, constantly extend unblock with the number of times of request
Time so that it is can not utilize automatic requestor send malicious requests.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the accompanying drawing of required use is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, all right
Obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of web-page requests process flow figure of the embodiment of the present invention;
Fig. 2 is a kind of web-page requests processing means structural representation of the embodiment of the present invention;
Fig. 3 is application example web-page requests process flow figure of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work
Embodiment, broadly falls into the scope of protection of the invention.
As it is shown in figure 1, be a kind of web-page requests process flow figure of the embodiment of the present invention, described method includes:
When the 101st, receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage with
And lock-up cycle, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;
If 102 current request number of times are more than or equal to locking upper limit threshold, then intercept the described network user and webpage is asked
Ask;And the corresponding relation according to default request number of times and lock-up cycle, confirm current request number of times and the lock getting
Reset current request number of times corresponding lock-up cycle when fixed cycle is not to correspondence, wherein, described corresponding relation locks
Cycle extends based on the increase of request number of times.
Preferably, if locking time is expired, then the request number of times to this webpage for the described network user is initialized, and initially
Change lock-up cycle.
Preferably, if current request number of times is less than described locking upper limit threshold, then allow the described network user to webpage
Request.
Preferably, in described corresponding relation, each lock-up cycle and a request number of times interval are corresponding, lock-up cycle
Extend based on the interval change shape in gradient of request number of times.
Preferably, in described corresponding relation, request number of times length of an interval degree is fixed value.
Corresponding to said method embodiment, as in figure 2 it is shown, be a kind of web-page requests processing means structure of the embodiment of the present invention
Schematic diagram, described device includes:
Acquiring unit 21, during for receiving the network user to the request of webpage, obtains the described network user to this webpage
Request number of times and lock-up cycle;
If this webpage, not out of date for lock-up cycle, is asked by determining unit 22 by the described network user getting
Number of times is asked to add 1;
Lock cell 23, if for current request number of times more than or equal to locking upper limit threshold, then intercepts described network and uses
The request to webpage for the family;
Setup unit 24, after intercepting the request to webpage for the described network user at described lock cell, according in advance
If the corresponding relation of request number of times and lock-up cycle, it is not corresponding with the lock-up cycle getting to confirm current request number of times
When, reset the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request
The increase of number of times and extend.
Preferably, can also include: initialization unit 25, if expired for locking time, then initialize described network
The request number of times to this webpage for the user, and initialize lock-up cycle.
Preferably, described lock cell 23, if being further used for current request number of times to lock upper limit threshold less than described,
Then allow the request to webpage for the described network user.
Preferably, in described corresponding relation, each lock-up cycle and a request number of times interval are corresponding, lock-up cycle
Extend based on the interval change shape in gradient of request number of times.
Preferably, in described corresponding relation, request number of times length of an interval degree is fixed value.
As it is shown on figure 3, be application example web-page requests process flow figure of the present invention, described method includes:
301st, obtain ID (UID) or the IP of the network user initiating web-page requests, and obtain the described network user couple
Request number of times Qnum of this webpage and lock-up cycle expire;
302nd, judge that whether lock-up cycle expire is expired, whether expired according to lock-up cycle expire, to this webpage
Request number of times Qnum performs different disposal: if lock-up cycle expire is expired, then turns 303, otherwise turns 304;
303rd, Qnum++ after Qnum being reset, and initialize lock-up cycle expire, turn 305;
304th, request number of times Qnum to this webpage for the network user getting is added 1, i.e. Qnum++, turn 305;
305th, judge whether current Qnum reaches to lock upper limit threshold qw, if it is, perform lock operation i.e. turn 306,
Otherwise, return normal operating and i.e. turn 309;
306th, judge whether to need to extend lock-up cycle expire according to current Qnum: if it is, turn 307, otherwise,
Turn 308;
307th, lock-up cycle expire is extended, i.e. the corresponding relation according to the request number of times preset and lock-up cycle, again
Set the corresponding lock-up cycle expire of current Qnum, calculate lock-up cycle expire=expire+ correspondence and change to district
Between the prolongation time, turn 308;
308th, the request to this webpage for this network user is intercepted.
309th, normal flow.
Illustrate:
Locking upper limit threshold values qw is 10;
The interval q0 (0~10) of request number of times, corresponding lock-up cycle is 5 minutes;
The interval q1 (10~20) of request number of times, corresponding lock-up cycle extends 5 minutes on current basal;
The interval q2 (20~30) of request number of times, corresponding lock-up cycle extends 10 minutes on current basal.
Initializing lock-up cycle is that 5 minutes i.e. current time counts after+5 minutes again;
When request number of times Qnum is changed to q1 by q0, lock-up cycle extends 5 minutes on current basal;
When request number of times Qnum is changed to q2 by q1, lock-up cycle extends 10 minutes on current basal;
If it is determined that lock-up cycle is out of date, counting, lock-up cycle are initialized as 5 minutes again.
The above, for the change shape in gradient attacking user's lock-out state, the number of times that user asks at short notice
How corresponding more lock-up cycle be also longer.
The embodiment of the present invention mainly provides and a kind of gradient can can dynamically lock malicious requests according to custom rule
Solution, in conjunction with the advantage of current scheme, abandons corresponding shortcoming, and advantage is as follows: 1. intercept malicious requests, reduce Service Source
Waste with take.2. locking threshold values, interval range, prolongation time are can be self-defining, so can spirit according to scene
Strategy is closed down in definition of living, and makes that malicious requests is irregular to be followed.3. according to the bigger time that it is punished for malicious requests frequency
Longer;4., if not initiating request again at penalty period, change over time, lock-out state Spontaneous release is avoided locking for a long time
Fixed.
The particular order of the step during disclosed in should be understood that or level are the examples of illustrative methods.Based on setting
Meter preference, it should be appreciated that during the particular order of step or level can be in the feelings of the protection domain without departing from the disclosure
Rearranged under condition.Appended claim to a method gives the key element of various step with exemplary order, and not
It is intended to be limited to described particular order or level.
In above-mentioned detailed description, various features combine together in single embodiment, to simplify the disclosure.No
This open method should be construed to reflect such intention, i.e. the embodiment of theme required for protection needs ratio
The more feature of feature clearly stated in each claim.On the contrary, as appending claims reflects
Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appending claims
Being hereby expressly incorporated in detailed description, wherein each claim is alone as the single preferred embodiment of the present invention.
For making any technical staff in this area be capable of or use the present invention, above disclosed embodiment is entered
Go description.To those skilled in the art;The various modification modes of these embodiments will be apparent from, and this
The General Principle of literary composition definition also can be applicable to other embodiments on the basis of without departing from the spirit and scope of the disclosure.
Therefore, the disclosure is not limited to embodiments set forth herein, but the widest with principle disclosed in the present application and novel features
Scope is consistent.
Described above includes the citing of one or more embodiment.Certainly, in order to above-described embodiment is described and description portion
The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each is implemented
Example can do further combinations and permutations.Therefore, embodiment described herein is intended to fall into appended claims
Protection domain in all such changes, modifications and variations.Additionally, with regard to the term using in specification or claims
"comprising", the mode that covers of this word is similar to term and " includes ", is used as link word just as " including, " in the claims and is solved
As releasing.Additionally, use any one the term "or" in the specification of claims to be intended to represent " non-exclusionism
Or ".
Those skilled in the art are it will also be appreciated that the various illustrative components, blocks listed of the embodiment of the present invention
(illustrative logical block), unit, and step can pass through electronic hardware, computer software, or both knot
Conjunction realizes.For clearly showing that the replaceability (interchangeability) of hardware and software, above-mentioned various explanations
Property parts (illustrative components), unit and step have universally described their function.Such work(
Can be to realize depending on specifically applying the design with whole system to require by hardware or software.Those skilled in the art
Can be for every kind of specific application, it is possible to use various methods realize described function, but this realization is understood not to
Scope beyond embodiment of the present invention protection.
Various illustrative logical block described in the embodiment of the present invention, or unit can pass through general processor,
Digital signal processor, special IC (ASIC), field programmable gate array or other programmable logic devices, discrete gate
Or transistor logic, discrete hardware components, or the design of any of the above described combination realize or operate described function.General place
Reason device can be microprocessor, and alternatively, this general processor also can be any traditional processor, controller, microcontroller
Device or state machine.Processor also can be realized by the combination of computing device, such as digital signal processor and microprocessor,
Multi-microprocessor, one or more microprocessors combine a Digital Signal Processor Core, or any other like configuration
Realize.
The step of the method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor perform soft
Part module or the combination of both.Software module can be stored in RAM memory, flash memory, ROM memory, EPROM storage
Other any form of storage media in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this area
In.Exemplarily, store medium to be connected with processor, so that processor can read information from storage medium, and
Write information can be deposited to storage medium.Alternatively, store medium can also be integrated in processor.Processor and storage medium can
To be arranged in ASIC, ASIC can be arranged in user terminal.Alternatively, processor and storage medium also can be arranged at use
In different parts in the terminal of family.
In one or more exemplary designs, the above-mentioned functions described by the embodiment of the present invention can be at hardware, soft
Any combination of part, firmware or this three realizes.If realized in software, these functions can store and computer-readable
It on medium, or is transmitted on the medium of computer-readable with one or more instructions or code form.Computer readable medium includes electricity
Brain storage medium and being easy to so that allow computer program transfer to the telecommunication media in other places from place.Storage medium is permissible
It is that any general or special computer can be with the useable medium of access.For example, such computer readable media can include but
It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage devices, or other
What may be used for carrying or storage with instruct or data structure and other can be by general or special computer or general or specially treated
Device reads the medium of the program code of form.Additionally, any connection can be properly termed computer readable medium, example
As if software is by a coaxial cable, fiber optic cables, double from web-site, server or other remote resources
Twisted wire, Digital Subscriber Line (DSL) or with the wireless way for transmittings such as example infrared, wireless and microwave be also contained in defined
In computer readable medium.Described video disc (disk) and disk (disc) include Zip disk, radium-shine dish, CD, DVD, floppy disk
And Blu-ray Disc, disk is generally with magnetic duplication data, and video disc generally carries out optical reproduction data with laser.Combinations of the above
Also may be embodied in computer readable medium.
Above-described detailed description of the invention, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further
Describe in detail, be it should be understood that the detailed description of the invention that the foregoing is only the present invention, be not intended to limit the present invention
Protection domain, all within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. done, all should comprise
Within protection scope of the present invention.
Claims (10)
1. a web-page requests processing method, it is characterised in that described method includes:
When receiving the network user to the request of webpage, obtain the described network user to the request number of times of this webpage and locking week
Phase, if lock-up cycle is not out of date, the request number of times to this webpage for the described network user getting is added 1;
If current request number of times is more than or equal to locking upper limit threshold, then intercept the request to webpage for the described network user;And
According to the corresponding relation of default request number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not
Reset current request number of times corresponding lock-up cycle during to correspondence, wherein, in described corresponding relation lock-up cycle based on
The increase of request number of times and extend.
2. web-page requests processing method as claimed in claim 1, it is characterised in that if locking time is expired, then initialize institute
State the request number of times to this webpage for the network user, and initialize lock-up cycle.
3. web-page requests processing method as claimed in claim 2, it is characterised in that if current request number of times is less than described locking
Upper limit threshold, then allow the request to webpage for the described network user.
4. web-page requests processing method as described in claim the 1st, 2 or 3, it is characterised in that in described corresponding relation, each lock
Fixed cycle and a request number of times interval are corresponding, and lock-up cycle extends based on the interval change shape in gradient of request number of times.
5. web-page requests processing method as claimed in claim 4, it is characterised in that in described corresponding relation, request number of times is interval
A length of fixed value.
6. a web-page requests processing means, it is characterised in that described device includes:
Acquiring unit, during for receiving the network user to the request of webpage, obtains the request to this webpage for the described network user
Number of times and lock-up cycle;
Determining unit, if not out of date for lock-up cycle, by the described network user that the gets request number of times to this webpage
Add 1;
Lock cell, if for current request number of times more than or equal to locking upper limit threshold, then intercepting the described network user to net
The request of page;
Setup unit, after intercepting the request to webpage for the described network user at described lock cell, please according to default
Seek the corresponding relation of number of times and lock-up cycle, confirm current request number of times with the lock-up cycle getting not to when corresponding again
Setting the corresponding lock-up cycle of current request number of times, wherein, in described corresponding relation, lock-up cycle is based on request number of times
Increase and extend.
7. web-page requests processing means as claimed in claim 6, it is characterised in that also include:
Initialization unit, if expired for locking time, then initializes the request number of times to this webpage for the described network user, and
Initialize lock-up cycle.
8. web-page requests processing means as claimed in claim 7, it is characterised in that
Described lock cell, if being further used for current request number of times to lock upper limit threshold less than described, then allows described net
The request to webpage for the network user.
9. web-page requests processing means as described in claim the 6th, 7 or 8, it is characterised in that in described corresponding relation, each lock
Fixed cycle and a request number of times interval are corresponding, and lock-up cycle extends based on the interval change shape in gradient of request number of times.
10. web-page requests processing means as claimed in claim 9, it is characterised in that in described corresponding relation, request number of times is interval
A length of fixed value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610344363.6A CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610344363.6A CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106101059A true CN106101059A (en) | 2016-11-09 |
CN106101059B CN106101059B (en) | 2019-05-17 |
Family
ID=57229350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610344363.6A Active CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106101059B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487919A (en) * | 2016-11-10 | 2017-03-08 | 新浪网技术(中国)有限公司 | HTTP request processing method based on PaaS platform, apparatus and system |
CN113852663A (en) * | 2021-08-18 | 2021-12-28 | 北京达佳互联信息技术有限公司 | Network request processing method and device and network request processing system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827080A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method for blocking network attacks and device |
CN102769549A (en) * | 2011-05-05 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Network security monitoring method and device |
CN103957195A (en) * | 2014-04-04 | 2014-07-30 | 上海聚流软件科技有限公司 | DNS system and defense method and device for DNS attack |
US20140230061A1 (en) * | 2013-02-08 | 2014-08-14 | PhishMe, Inc. | Collaborative phishing attack detection |
CN104023024A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | Network defense method and device |
CN104243408A (en) * | 2013-06-14 | 2014-12-24 | 中国移动通信集团公司 | Method, device and system for monitoring messages in domain name resolution service DNS system |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN105491054A (en) * | 2015-12-22 | 2016-04-13 | 网易(杭州)网络有限公司 | Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access |
-
2016
- 2016-05-23 CN CN201610344363.6A patent/CN106101059B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827080A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method for blocking network attacks and device |
CN102769549A (en) * | 2011-05-05 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Network security monitoring method and device |
US20140230061A1 (en) * | 2013-02-08 | 2014-08-14 | PhishMe, Inc. | Collaborative phishing attack detection |
CN104243408A (en) * | 2013-06-14 | 2014-12-24 | 中国移动通信集团公司 | Method, device and system for monitoring messages in domain name resolution service DNS system |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN103957195A (en) * | 2014-04-04 | 2014-07-30 | 上海聚流软件科技有限公司 | DNS system and defense method and device for DNS attack |
CN104023024A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | Network defense method and device |
CN105491054A (en) * | 2015-12-22 | 2016-04-13 | 网易(杭州)网络有限公司 | Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487919A (en) * | 2016-11-10 | 2017-03-08 | 新浪网技术(中国)有限公司 | HTTP request processing method based on PaaS platform, apparatus and system |
CN106487919B (en) * | 2016-11-10 | 2019-07-05 | 新浪网技术(中国)有限公司 | HTTP request processing method based on PaaS platform, apparatus and system |
CN113852663A (en) * | 2021-08-18 | 2021-12-28 | 北京达佳互联信息技术有限公司 | Network request processing method and device and network request processing system |
Also Published As
Publication number | Publication date |
---|---|
CN106101059B (en) | 2019-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103679884B (en) | The Internet gate inhibition casual user's authorization device and method | |
US10325428B1 (en) | Access control using device location tracking and blockchains | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN106599721A (en) | Cache-based data access method and apparatus | |
US20150381613A1 (en) | Smartcard based multifactor banking authentication | |
US9165136B1 (en) | Supervising execution of untrusted code | |
CN107743118B (en) | Hierarchical network security protection method and device | |
CN103139058A (en) | Internet of things security access gateway | |
CN106027520B (en) | A kind of detection processing steals the method and device of website account number | |
WO2020156135A1 (en) | Method and device for processing access control policy and computer-readable storage medium | |
JP2017513274A (en) | System and method for providing secure access to local network devices | |
CN110009776B (en) | Identity authentication method and device | |
CN102158492B (en) | Web authentication method, device and network equipment | |
CN107295017A (en) | CC means of defences based on user authentication | |
CN113114632B (en) | Can peg graft formula intelligence financial auditing platform | |
CN104735062B (en) | A kind of network user register method and server | |
CN104601602B (en) | A kind of terminal device network security enhancing access and authentication method | |
CN109743294A (en) | Interface access control method, device, computer equipment and storage medium | |
CN102739638A (en) | Establishing privileges through claims of valuable assets | |
CN106101059A (en) | A kind of web-page requests processing method and processing device | |
WO2009118994A1 (en) | Information processing limitation system and information processing limitation device | |
CN110138747A (en) | A kind of method and system for verifying account logging state | |
CN110324319A (en) | A kind of network data security management-control method based on one-way transmission | |
US20240089263A1 (en) | Access control using task manager | |
CN113965395A (en) | Method, system and device for safely accessing intranet in real time |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |