CN106101059B - A kind of web-page requests processing method and processing device - Google Patents
A kind of web-page requests processing method and processing device Download PDFInfo
- Publication number
- CN106101059B CN106101059B CN201610344363.6A CN201610344363A CN106101059B CN 106101059 B CN106101059 B CN 106101059B CN 201610344363 A CN201610344363 A CN 201610344363A CN 106101059 B CN106101059 B CN 106101059B
- Authority
- CN
- China
- Prior art keywords
- lock
- cycle
- request number
- webpage
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Abstract
The embodiment of the present invention provides a kind of web-page requests processing method and processing device, the described method includes: when receiving request of the network user to webpage, the network user is obtained to the request number of times and lock-up cycle of the webpage, if lock-up cycle is not out of date, the network user that will acquire adds 1 to the request number of times of the webpage;If current request number of times is more than or equal to locking upper limit threshold, request of the network user to webpage is intercepted;And the corresponding relationship according to preset request number of times and lock-up cycle, confirm current request number of times and the lock-up cycle that gets not to it is corresponding when reset the corresponding lock-up cycle of current request number of times, wherein increase of the lock-up cycle based on request number of times in the corresponding relationship and extend.Above-mentioned technical proposal, which has the following beneficial effects:, can intercept webpage query-attack, while prevent locking time and locking upper limit number from being detected out.
Description
Technical field
The present invention relates to network technique field more particularly to a kind of web-page requests processing method and processing devices.
Background technique
User web (webpage) request greatly be all based on cookie (certain websites in order to distinguish user identity, carry out
Session is tracked and the data (generally going through encryption) that are stored on user local terminal), session (session control) step on
The permission of record verifying identity judges and responds the request of service, this is the basic principle that web user identity logs in.
The solution of the prior art: according to the UID (User Identification, user identity prove) of request or
IP (Internet Protocol, the agreement interconnected between network) setting request number of times upper limit whithin a period of time.If request
After number of the number more than setting, refusal service is returned, rubbish request is closed down with reaching.
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: in existing solution
In scheme, it can request rubbish there is certain limitation to achieve the effect that reduce rubbish request.It can be to general automatic request
The program effect of closing down, but some advanced requestors can detect locking time and the locking upper limit number of setting, this
It results in closing down failure to what spam page was requested.
Summary of the invention
The embodiment of the present invention provides a kind of web-page requests processing method and processing device to be made simultaneously with intercepting webpage query-attack
Locking time and locking upper limit number cannot be detected out.
On the one hand, the embodiment of the invention provides a kind of web-page requests processing methods, which comprises
When receiving request of the network user to webpage, the network user is obtained to the request number of times and lock of the webpage
Fixed cycle, if lock-up cycle is not out of date, the network user that will acquire adds 1 to the request number of times of the webpage;
If current request number of times is more than or equal to locking upper limit threshold, request of the network user to webpage is intercepted;
And the corresponding relationship according to preset request number of times and lock-up cycle, confirm current request number of times and the locking got week
Phase does not reset the corresponding lock-up cycle of current request number of times to when corresponding to, wherein lock-up cycle in the corresponding relationship
Increase based on request number of times and extend.
On the other hand, the embodiment of the invention provides a kind of web-page requests processing unit, described device includes:
Acquiring unit when for receiving request of the network user to webpage, obtains the network user to the webpage
Request number of times and lock-up cycle;
Determination unit, if not out of date for lock-up cycle, request of the network user that will acquire to the webpage
Number adds 1;
Lock cell intercepts the network user if being more than or equal to locking upper limit threshold for current request number of times
Request to webpage;
Setup unit, for after the lock cell intercepts the network user to the request of webpage, according to default
Request number of times and lock-up cycle corresponding relationship, confirm current request number of times and the lock-up cycle that gets not to it is corresponding when
Reset the corresponding lock-up cycle of current request number of times, wherein lock-up cycle is based on request time in the corresponding relationship
Several increases and extend.
Above-mentioned technical proposal, which has the following beneficial effects:, can intercept webpage query-attack, while make locking time and lock
Determining upper limit number cannot be detected out, and on the basis of being determined as malicious requests, and the number with request constantly extends unlock
Time, prevent its from using automatic requestor send malicious requests.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of web-page requests processing method flow chart of the embodiment of the present invention;
Fig. 2 is a kind of web-page requests processing device structure diagram of the embodiment of the present invention;
Fig. 3 is application example web-page requests processing method flow chart of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, being a kind of web-page requests processing method flow chart of the embodiment of the present invention, which comprises
101, when receiving request of the network user to webpage, obtain the network user to the request number of times of the webpage with
And lock-up cycle, if lock-up cycle is not out of date, the network user that will acquire adds 1 to the request number of times of the webpage;
If 102, current request number of times is more than or equal to locking upper limit threshold, intercepts the network user and webpage is asked
It asks;And the corresponding relationship according to preset request number of times and lock-up cycle, the lock for confirming current request number of times and getting
Fixed cycle does not reset the corresponding lock-up cycle of current request number of times to when corresponding to, wherein locks in the corresponding relationship
Increase of the period based on request number of times and extend.
Preferably, if locking time is expired, the network user is initialized to the request number of times of the webpage, and initial
Change lock-up cycle.
Preferably, if current request number of times is less than the locking upper limit threshold, allow the network user to webpage
Request.
Preferably, in the corresponding relationship, each lock-up cycle is corresponding with a request number of times section, lock-up cycle
Shape extends in gradient for variation based on request number of times section.
Preferably, in the corresponding relationship, the length in request number of times section is fixed value.
Corresponding to above method embodiment, as shown in Fig. 2, being a kind of web-page requests processing unit structure of the embodiment of the present invention
Schematic diagram, described device include:
Acquiring unit 21 when for receiving request of the network user to webpage, obtains the network user to the webpage
Request number of times and lock-up cycle;
Determination unit 22, if not out of date for lock-up cycle, the network user that will acquire asks the webpage
Number is asked to add 1;
Lock cell 23 intercepts the network and uses if being more than or equal to locking upper limit threshold for current request number of times
Request of the family to webpage;
Setup unit 24, for after the lock cell intercepts the network user to the request of webpage, according to pre-
If request number of times and lock-up cycle corresponding relationship, confirm that current request number of times and the lock-up cycle got be not corresponding
When, reset the corresponding lock-up cycle of current request number of times, wherein lock-up cycle is based on request in the corresponding relationship
The increase of number and extend.
Preferably, it can also include: initialization unit 25, if expired for locking time, initialize the network
User initializes lock-up cycle to the request number of times of the webpage.
Preferably, the lock cell 23, if being further used for current request number of times is less than the locking upper limit threshold,
Then allow request of the network user to webpage.
Preferably, in the corresponding relationship, each lock-up cycle is corresponding with a request number of times section, lock-up cycle
Shape extends in gradient for variation based on request number of times section.
Preferably, in the corresponding relationship, the length in request number of times section is fixed value.
As shown in figure 3, being application example web-page requests processing method flow chart of the present invention, which comprises
301, the User ID (UID) or IP for initiating the network user of web-page requests are obtained, and obtains the network user couple
The request number of times Qnum and lock-up cycle expire of the webpage;
302, judge whether lock-up cycle expire is expired, it is whether expired according to lock-up cycle expire, to the webpage
Request number of times Qnum executes different disposal: if lock-up cycle expire is expired, turning 303, otherwise turns 304;
303, Qnum++ after being reset to Qnum, and lock-up cycle expire is initialized, turn 305;
304, the network user that will acquire adds 1, i.e. Qnum++ to the request number of times Qnum of the webpage, turns 305;
305, judge whether current Qnum reaches locking upper limit threshold qw, if so, executing lock operation turns 306,
Otherwise, it returns to normal operating and turns 309;
306, judged whether to need to extend lock-up cycle expire according to current Qnum: if it is, turn 307, otherwise,
Turn 308;
307, extend lock-up cycle expire, i.e., according to the corresponding relationship of preset request number of times and lock-up cycle, again
The corresponding lock-up cycle expire of current Qnum is set, lock-up cycle expire=expire+ correspondence is calculated and changes to area
Between the extension time, turn 308;
308, request of the network user to the webpage is intercepted.
309, normal flow.
For example:
Locking upper limit threshold values qw is 10;
Request number of times section q0 (0~10), corresponding lock-up cycle are 5 minutes;
Request number of times section q1 (10~20), corresponding lock-up cycle extend 5 minutes on current basal;
Request number of times section q2 (20~30), corresponding lock-up cycle extend 10 minutes on current basal.
Initialization lock-up cycle is that 5 minutes i.e. current time+5 minutes count again later;
When request number of times Qnum is q1 by q0 variation, lock-up cycle extends 5 minutes on current basal;
When request number of times Qnum is q2 by q1 variation, lock-up cycle extends 10 minutes on current basal;
If it is determined that lock-up cycle is out of date, count again, lock-up cycle is initialized as 5 minutes.
The above, for the variation shape in gradient of attack user's lock state, the number that user requests in a short time
How corresponding lock-up cycle more be also longer.
The embodiment of the present invention be mainly to provide it is a kind of can according to custom rule can gradient can dynamically lock malicious requests
Solution abandons corresponding disadvantage in conjunction with the advantages of current scheme, and advantage is as follows: 1. intercept malicious requests, reduce Service Source
Waste and occupancy.2. lock threshold values, interval range, extend the time can all be customized, so according to scene can spirit
Strategy is closed down in definition living, makes malicious requests are irregular to follow.3. according to the time punished it bigger for malicious requests frequency
It is longer;4. if, with the variation of time, lock state Spontaneous release avoids locking for a long time do not initiate to request again in penalty period
It is fixed.
It should be understood that the particular order or level of the step of during disclosed are the examples of illustrative methods.Based on setting
Count preference, it should be appreciated that in the process the step of particular order or level can be in the feelings for the protection scope for not departing from the disclosure
It is rearranged under condition.Appended claim to a method is not illustratively sequentially to give the element of various steps, and not
It is to be limited to the particular order or level.
In above-mentioned detailed description, various features are combined together in single embodiment, to simplify the disclosure.No
This published method should be construed to reflect such intention, that is, the embodiment of theme claimed needs to compare
The more features of the feature clearly stated in each claim.On the contrary, as appended claims is reflected
Like that, the present invention is in the state fewer than whole features of disclosed single embodiment.Therefore, appended claims
It is hereby expressly incorporated into detailed description, wherein each claim is used as alone the individual preferred embodiment of the present invention.
For can be realized any technical staff in the art or using the present invention, above to disclosed embodiment into
Description is gone.To those skilled in the art;The various modifications mode of these embodiments will be apparent from, and this
The General Principle of text definition can also be suitable for other embodiments on the basis of not departing from the spirit and scope of the disclosure.
Therefore, the disclosure is not limited to embodiments set forth herein, but most wide with principle disclosed in the present application and novel features
Range is consistent.
Description above includes the citing of one or more embodiments.Certainly, in order to describe above-described embodiment and description portion
The all possible combination of part or method is impossible, but it will be appreciated by one of ordinary skill in the art that each implementation
Example can do further combinations and permutations.Therefore, embodiment described herein is intended to cover fall into the appended claims
Protection scope in all such changes, modifications and variations.In addition, with regard to term used in specification or claims
The mode that covers of "comprising", the word is similar to term " includes ", just as " including " solved in the claims as transitional word
As releasing.In addition, the use of any one of specification in claims term "or" being to indicate " non-exclusionism
Or ".
Those skilled in the art will also be appreciated that the various illustrative components, blocks that the embodiment of the present invention is listed
(illustrative logical block), unit and step can by electronic hardware, computer software, or both knot
Conjunction is realized.For the replaceability (interchangeability) for clearly showing that hardware and software, above-mentioned various explanations
Property component (illustrative components), unit and step universally describe their function.Such function
It can be that the design requirement for depending on specific application and whole system is realized by hardware or software.Those skilled in the art
Can be can be used by various methods and realize the function, but this realization is understood not to for every kind of specific application
Range beyond protection of the embodiment of the present invention.
Various illustrative logical blocks or unit described in the embodiment of the present invention can by general processor,
Digital signal processor, specific integrated circuit (ASIC), field programmable gate array or other programmable logic devices, discrete gate
Or transistor logic, discrete hardware components or above-mentioned any combination of design carry out implementation or operation described function.General place
Managing device can be microprocessor, and optionally, which may be any traditional processor, controller, microcontroller
Device or state machine.Processor can also be realized by the combination of computing device, such as digital signal processor and microprocessor,
Multi-microprocessor, one or more microprocessors combine a digital signal processor core or any other like configuration
To realize.
The step of method described in the embodiment of the present invention or algorithm can be directly embedded into hardware, processor execute it is soft
The combination of part module or the two.Software module can store in RAM memory, flash memory, ROM memory, EPROM storage
Other any form of storaging mediums in device, eeprom memory, register, hard disk, moveable magnetic disc, CD-ROM or this field
In.Illustratively, storaging medium can be connect with processor, so that processor can read information from storaging medium, and
It can be to storaging medium stored and written information.Optionally, storaging medium can also be integrated into the processor.Processor and storaging medium can
To be set in asic, ASIC be can be set in user terminal.Optionally, processor and storaging medium also can be set in
In different components in the terminal of family.
In one or more exemplary designs, above-mentioned function described in the embodiment of the present invention can be in hardware, soft
Part, firmware or any combination of this three are realized.If realized in software, these functions be can store and computer-readable
On medium, or it is transferred on a computer readable medium in the form of one or more instructions or code forms.Computer readable medium includes electricity
Brain storaging medium and convenient for so that computer program is allowed to be transferred to from a place telecommunication media in other places.Storaging medium can be with
It is that any general or special computer can be with the useable medium of access.For example, such computer readable media may include but
It is not limited to RAM, ROM, EEPROM, CD-ROM or other optical disc storages, disk storage or other magnetic storage devices or other
What can be used for carry or store with instruct or data structure and it is other can be by general or special computer or general or specially treated
The medium of the program code of device reading form.In addition, any connection can be properly termed computer readable medium, example
Such as, if software is to pass through a coaxial cable, fiber optic cables, double from a web-site, server or other remote resources
Twisted wire, Digital Subscriber Line (DSL) are defined with being also contained in for the wireless way for transmitting such as example infrared, wireless and microwave
In computer readable medium.The disk (disk) and disk (disc) includes compress disk, radium-shine disk, CD, DVD, floppy disk
And Blu-ray Disc, disk is usually with magnetic replicate data, and disk usually carries out optically replicated data with laser.Combinations of the above
Also it may be embodied in computer readable medium.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (8)
1. a kind of web-page requests processing method, which is characterized in that the described method includes:
When receiving request of the network user to webpage, the network user is obtained to the request number of times of the webpage and locking week
Phase, if lock-up cycle is not out of date, the network user that will acquire adds 1 to the request number of times of the webpage;
If current request number of times is more than or equal to locking upper limit threshold, request of the network user to webpage is intercepted;And
According to the corresponding relationship of preset request number of times and lock-up cycle, current request number of times and the lock-up cycle got are confirmed not
The corresponding lock-up cycle of current request number of times is reset to when corresponding to, wherein lock-up cycle is based in the corresponding relationship
The increase of request number of times and extend;
If lock-up cycle is expired, the network user is initialized to the request number of times of the webpage, and initialize lock-up cycle.
2. web-page requests processing method as described in claim 1, which is characterized in that if current request number of times is less than the locking
Upper limit threshold then allows request of the network user to webpage.
3. web-page requests processing method as claimed in claim 1 or 2, which is characterized in that in the corresponding relationship, each locking
Period is corresponding with a request number of times section, and shape extends in gradient for variation of the lock-up cycle based on request number of times section.
4. web-page requests processing method as claimed in claim 3, which is characterized in that in the corresponding relationship, request number of times section
Length be fixed value.
5. a kind of web-page requests processing unit, which is characterized in that described device includes:
Acquiring unit when for receiving request of the network user to webpage, obtains request of the network user to the webpage
Number and lock-up cycle;
Determination unit, if not out of date for lock-up cycle, request number of times of the network user that will acquire to the webpage
Add 1;
Lock cell intercepts the network user to net if being more than or equal to locking upper limit threshold for current request number of times
The request of page;
Setup unit, for being asked according to preset after the lock cell intercepts the network user to the request of webpage
The corresponding relationship for asking number and lock-up cycle, confirm current request number of times and the lock-up cycle that gets not to it is corresponding when again
Set the corresponding lock-up cycle of current request number of times, wherein lock-up cycle is based on request number of times in the corresponding relationship
Increase and extends;
If initialization unit initializes the network user to the request number of times of the webpage expired for lock-up cycle, and
Initialize lock-up cycle.
6. web-page requests processing unit as claimed in claim 5, which is characterized in that
The lock cell allows the net if being further used for current request number of times less than the locking upper limit threshold
Request of the network user to webpage.
7. the web-page requests processing unit as described in claim 5 or 6, which is characterized in that in the corresponding relationship, each locking
Period is corresponding with a request number of times section, and shape extends in gradient for variation of the lock-up cycle based on request number of times section.
8. web-page requests processing unit as claimed in claim 7, which is characterized in that in the corresponding relationship, request number of times section
Length be fixed value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610344363.6A CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610344363.6A CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106101059A CN106101059A (en) | 2016-11-09 |
CN106101059B true CN106101059B (en) | 2019-05-17 |
Family
ID=57229350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610344363.6A Active CN106101059B (en) | 2016-05-23 | 2016-05-23 | A kind of web-page requests processing method and processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106101059B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487919B (en) * | 2016-11-10 | 2019-07-05 | 新浪网技术(中国)有限公司 | HTTP request processing method based on PaaS platform, apparatus and system |
CN113852663A (en) * | 2021-08-18 | 2021-12-28 | 北京达佳互联信息技术有限公司 | Network request processing method and device and network request processing system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827080A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method for blocking network attacks and device |
CN102769549A (en) * | 2011-05-05 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Network security monitoring method and device |
CN103957195A (en) * | 2014-04-04 | 2014-07-30 | 上海聚流软件科技有限公司 | DNS system and defense method and device for DNS attack |
CN104023024A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | Network defense method and device |
CN104243408A (en) * | 2013-06-14 | 2014-12-24 | 中国移动通信集团公司 | Method, device and system for monitoring messages in domain name resolution service DNS system |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN105491054A (en) * | 2015-12-22 | 2016-04-13 | 网易(杭州)网络有限公司 | Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9356948B2 (en) * | 2013-02-08 | 2016-05-31 | PhishMe, Inc. | Collaborative phishing attack detection |
-
2016
- 2016-05-23 CN CN201610344363.6A patent/CN106101059B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827080A (en) * | 2010-02-04 | 2010-09-08 | 蓝盾信息安全技术股份有限公司 | Method for blocking network attacks and device |
CN102769549A (en) * | 2011-05-05 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Network security monitoring method and device |
CN104243408A (en) * | 2013-06-14 | 2014-12-24 | 中国移动通信集团公司 | Method, device and system for monitoring messages in domain name resolution service DNS system |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN103957195A (en) * | 2014-04-04 | 2014-07-30 | 上海聚流软件科技有限公司 | DNS system and defense method and device for DNS attack |
CN104023024A (en) * | 2014-06-13 | 2014-09-03 | 中国民航信息网络股份有限公司 | Network defense method and device |
CN105491054A (en) * | 2015-12-22 | 2016-04-13 | 网易(杭州)网络有限公司 | Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access |
Also Published As
Publication number | Publication date |
---|---|
CN106101059A (en) | 2016-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102567454B (en) | Realize the method and system of the granularity self contained navigation of data in cloud computing environment | |
CN105306465B (en) | Web portal security accesses implementation method and device | |
CN105100708B (en) | Request processing method and device | |
WO2019114097A1 (en) | Blockchain-based distributed storage method | |
JP2008538641A5 (en) | ||
CN111711635B (en) | Firewall wall opening method and device, computer equipment and storage medium | |
CN106599721A (en) | Cache-based data access method and apparatus | |
CN106341234A (en) | Authorization method and device | |
CN105959179B (en) | A kind of reverse proxy nginx test macro and method | |
CN106101059B (en) | A kind of web-page requests processing method and processing device | |
US20200344235A1 (en) | System and method for controlling a multi-tenant service-oriented architecture | |
CN109743294A (en) | Interface access control method, device, computer equipment and storage medium | |
CN109246140A (en) | Domain right management method, device, computer equipment and storage medium | |
EP2586155A1 (en) | Authorization control | |
WO2020156135A1 (en) | Method and device for processing access control policy and computer-readable storage medium | |
CN110138785A (en) | A kind of processing method of document access authority, device, medium and electronic equipment | |
CN109815684A (en) | A kind of identity identifying method, system and server and storage medium | |
CN110138747A (en) | A kind of method and system for verifying account logging state | |
CN109271600A (en) | A kind of monitoring method of performance data, system and device | |
CN114389882B (en) | Gateway flow control method, device, computer equipment and storage medium | |
CN113221093A (en) | Single sign-on system, method, equipment and product based on block chain | |
CN105491406B (en) | A kind of video sharing device, method, system and portable device | |
CN113965395A (en) | Method, system and device for safely accessing intranet in real time | |
CN112464213B (en) | Operating system access control method, device, equipment and storage medium | |
CN107181757A (en) | Support Memcache Proxy Methods, the apparatus and system of certification and protocol conversion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |