CN108259363A - A kind of method and device of staged service traffics control - Google Patents
A kind of method and device of staged service traffics control Download PDFInfo
- Publication number
- CN108259363A CN108259363A CN201611249992.7A CN201611249992A CN108259363A CN 108259363 A CN108259363 A CN 108259363A CN 201611249992 A CN201611249992 A CN 201611249992A CN 108259363 A CN108259363 A CN 108259363A
- Authority
- CN
- China
- Prior art keywords
- flow
- channel
- data
- operator
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/29—Flow control; Congestion control using a combination of thresholds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides method and the making of a kind of service traffics control.The method includes S100, receive the traffic requests of business channel, and the implementation strategy of the traffic requests is obtained based on staged flow control policy;S101 returns to the implementation strategy to the business channel, is accessed based on the implementation strategy to the traffic requests control.The flow indicator data of each business channel of automatic collection of the present invention, and the staged flow threshold that customer service experience situation sets each channel operations person is combined, realize automatic, the accurate setting to the flow access thresholds of different business channel;Pass through the staged flow threshold of different channels benched spillway face relationship corresponding with its, when each channel reaches the ladder section that flow accesses, the different control strategy of intelligent Matching, so as to fulfill flow access control.
Description
Technical field
The present invention relates to field of communication technology, more particularly, to the method and dress of a kind of control of staged service traffics
It puts.
Background technology
At present, as network technology is more and more flourishing, the flow of system is increasing;When flow greatly to a certain extent when,
It is likely to result in system congestion and reduces network performance.It is existing to solve this problem and in order to carry out certain control to accessing
It is usually usings the method for " pre-set threshold value " to limit the number that system is accessed to have technology, i.e. one maximum value of setting, when being
When the accessed number of system reaches the maximum value of setting, then system no longer allows to be accessed.
In communication service system, to flow control, general embodiment is the prior art:When needing for certain system or
In person's system certain interface either service access number (flow) limitation when then be the interface or it is described service setting stream
Threshold values is measured, and counter Key is generated according to matched flow rule.Counter Key is by the way of database counting, on basis
According to one districts and cities, business configuration record in library.When external system accesses the communication service system interface, to the number of the record
Amount field is updated operation, and quantity adds 1, when quantity is added to max-thresholds, then external to access the interface or clothes again
Business.
Communication service system passes through the unified access control that interface threshold value is set to realize flow in the prior art;However each industry
The requirements for access and flow of business are different, and unified setting threshold values cannot embody the difference of business demand and threshold value is caused to set
It puts inaccurate, influences customer experience.Because threshold values be a presetting fixed value, can not automatic identification difference channel flow threshold
Value causes flow access control effect inaccurate, leads to not limiting for the limitation, what should not be limited limits.Such as:Client
Number selecting business is carried out by social channel system, when client repeatedly selects number, frequently prompt the operation of client's current business by
Limit or repeatedly input additional information etc..
On the other hand, the flow access control of the prior art, which exists, controls the problem of not tight, and various control means are not
It can be combined, easily be cracked.Because the threshold value and corresponding control strategy pattern of prior art setting are simple, rule is unclear
Clear, the control strategy for the corresponding different channels that can not classify easily is cracked, there are malicious access behaviors.Such as:12306 free fire
Ticket needs user to input picture validation code after having selected ticket, and ox can be cracked by Internet technology.Therefore it needs
Some stepped tightened up control methods control service traffics.
Invention content
The present invention provides a kind of staged service traffics for overcoming the above problem or solving the above problems at least partly
The method and device of control.
According to an aspect of the present invention, a kind of method of service traffics control is provided, including:
S100 receives the traffic requests of business channel, and the traffic requests are obtained based on staged flow control policy
Implementation strategy;
S101 returns to the implementation strategy to the business channel, based on the implementation strategy to the traffic requests into
Row access control.
A kind of method of service traffics control further includes:
S200, the flow indicator data of capturing service channel obtain flow access thresholds data, channel weighted data and canal
Road risk data;
S201, based on the flow access thresholds data, the channel weight model data and the channel risk model
Data obtain the staged flow control policy.
Further, the S100 further comprises:
S100.1 obtains the present flow rate cumulant of the operator of the business channel;
S100.2, if the operator does not have individual traffic requests threshold data, according to the staged flow
The present flow rate cumulant of control strategy and the operator are calculated, and obtain the implementation strategy.
Further, the S100 further comprises:
S100.3, please according to the individual flow if the operator has individual traffic requests threshold data
Threshold data is asked to access control.
Specifically, the implementation strategy includes:Access, short-message verification, graphic verification, the verification of 4A national treasuries are not limited and are forbidden
It accesses.
Specifically, flow access thresholds data described in the S200 include flow average threshold, maximum flow threshold value and
Flow generic threshold value;
The flow average threshold is:The average value of the daily Operational Visit amount of operator in one period;
The maximum flow threshold value is:The maximum value of the daily Operational Visit amount of operator in one period;
Operator's flow access thresholds that the flow generic threshold value is not collected for setting, the flow generic threshold value
Maximum value is chosen from the max-thresholds of each channel, and is configured by the multiple of the maximum value;
The channel weighted data includes portfolio weight accounting, and the portfolio weight accounting is:Time period
The total business volume of whole channels in the total business volume divided by time period of interior each channel.
Specifically, channel risk data described in the S200 include channel risk grade, the channel risk grade is:
Empirical data that flow based on the business channel accesses and be each business channel setting different risk class.
Specifically, staged flow control policy described in the S201 includes:
If the daily integrated flow of operator is less than flow average threshold, allow to access;
If the daily integrated flow of operator is more than flow average threshold, and less than maximum flow threshold value, then carries out short message and test
Card is accessed with controlling;
If the daily integrated flow of operator is more than maximum flow threshold value, and is accounted for less than maximum flow threshold value with portfolio weight
Product than+1 then carries out graphic verification and is accessed with controlling;
The daily integrated flow of operator is more than the product of maximum flow threshold value and portfolio weight accounting+1, and less than it most
Big threshold value and portfolio weight accounting+1 and the product of channel risk grade, then carry out the verification of 4A national treasuries and accessed with controlling;And
The daily integrated flow of operator is more than maximum flow threshold value and portfolio weight accounting+1 and channel risk grade
Product then forbids accessing;
Wherein, the flow average threshold be described in operator flow average threshold, the maximum flow threshold value is
Refer to the maximum flow threshold value of the operator, the portfolio weight accounting refers to that the portfolio weight of the business channel accounts for
Than the channel risk grade refers to the channel risk grade of the business channel.
Further, all operators under a business channel have identical staged flow control policy.
According to another aspect of the present invention, a kind of device of service traffics control is also provided, including:
For receiving the traffic requests of business channel, institute is obtained based on staged flow control policy for tactful acquisition module
State the implementation strategy of traffic requests;
Policy enforcement module, for returning to the implementation strategy to the business channel, based on the implementation strategy to institute
Traffic requests are stated to access control;
Data acquisition module for the flow indicator data of capturing service channel, obtains flow access thresholds data, channel
Weight model data and channel risk model data;And
Control strategy module, for being based on the flow access thresholds data, channel weight model data and described
Channel risk model data obtains the staged flow control policy.
The application proposes a kind of method and device of service traffics control, and the flow for being capable of each business channel of automatic collection refers to
Data are marked, with reference to customer service experience situation, the staged flow threshold of each channel operations person is set automatically, so as to different canals
The operator in road has the stair like control strategy formula strategy that a set of flow accesses, and prevents the flow access control of business channel from being lost
Leakage, realizes automatic, the accurate setting to the flow access thresholds of different business channel;Pass through the staged flow of different channels
Threshold value benched spillway face relationship corresponding with its, when each channel reaches the ladder section that flow accesses, intelligent Matching
Different control strategy, so as to fulfill flow access control.Flow is carried out relative to setting interface threshold value is unified in the prior art
Access control, the staged flow control policy of the application was not only intelligent but also rigorous.
Description of the drawings
Fig. 1 is a kind of method flow schematic diagram of service traffics control of the present invention;
Fig. 2 is a kind of schematic device of service traffics control of third embodiment of the invention.
Specific embodiment
With reference to the accompanying drawings and examples, the specific embodiment of the present invention is described in further detail.Implement below
Example is used to illustrate the present invention, but be not limited to the scope of the present invention.
Business of the present invention refers to the communication service or network service handled by URL access requests, the Business Stream
Amount refers to flow caused by progress URL access requests during transacting business, and the service traffics control refers to transacting business
URL request is controlled;But not limited to this, flow control is in this hair caused by URL access requests through various channels
In the range of bright specific implementation.
As described in Figure 1, a kind of method of service traffics control, including:
S100 receives the traffic requests of business channel, and the traffic requests are obtained based on staged flow control policy
Implementation strategy;
S101 returns to the implementation strategy to the business channel, based on the implementation strategy to the traffic requests into
Row access control.
A kind of method of service traffics control further includes:
S200, the flow indicator data of capturing service channel obtain flow access thresholds data, channel weighted data and canal
Road risk data;
S201, based on the flow access thresholds data, the channel weight model data and the channel risk model
Data obtain the staged flow control policy.
Business channel described in the present embodiment includes social channel, business foreground, the short Room and net Room etc., and each business channel has
Respective staged flow control policy.
Step S100 and S101 belong to real time operation step, including the acquisition to implementation strategy and according to implementation strategy
Access control;Step S200 and S201 are the flow indicator data acquisitions of progress synchronous with real time operation, according to being acquired
Flow indicator data generation staged flow control policy, the staged flow control policy be used for S100's and S101
Real time operation accesses control.
The data of flow access thresholds described in S200 include flow average threshold, maximum flow threshold value and the general threshold of flow
Value;The channel weighted data includes portfolio weight accounting;The channel risk data include channel risk grade.
Flow indicator data of the present invention are introduced by first embodiment first.
In the first embodiment of the invention, in No. 1 of in November, 2016 to this period November 10 period p, own
The total business volume of channel is c0;The operator (10001) of wherein social channel's system is respectively handled daily by social channel's system
C1, c2, c3, c4, c5, c6, c7, c8, c9, c10 portfolios, operator (10001) portfolio maximum is in this period
C5, then the various flow indicator data of staged flow control policy of the present invention are as follows:
Flow average threshold C:It the total business volume of each operator divided by time cycle in time period, obtains each
The average threshold of operator, calculation formula are:
C=(c1+c2+c3+c4+c5+c6+c7+c8+c9+c10)/p.
Maximum flow threshold value D:Maximum value in time period in each daily portfolio of operator, obtains each behaviour
The max-thresholds of work person, calculation formula are:
D=MAX (c1, c2, c3, c4, c5, c6, c7, c8, c9, c10).
Flow generic threshold value T:For setting not collected operator's flow access thresholds, the value is from each business channel
Max-thresholds in be maximized, including universal flow average threshold and universal flow max-thresholds, i.e.,:
Universal flow average threshold C=c5, universal flow max-thresholds D=c5*n, wherein n are natural number, support to make by oneself
Adopted multiplying power allotment;Preferred n=3.
Portfolio weight accounting E:It is complete in the total business volume of each channel divided by time period in time period
The total business volume of channel, calculation formula are:
E=(c1+c2+c3+c4+c5+c6+c7+c8+c9+c10)/c0.
Channel risk grade F:Empirical data that flow based on the business channel accesses and be each business channel setting
Different risk class, 1 grade of highest, 5 grades are minimum.
Each flow indicator data in the first embodiment and its specific value are described with specific data below.
The specific data include business channel A, operator B, flow average threshold C, maximum flow threshold value D, portfolio weight accounting E
With channel risk grade F, specific example is as follows:
Table 1:Each channel operations person's flow threshold data instance
Table 2:Flow access service amount weight example
Table 3:Each canal capacity accesses risk example
A | F |
Business channel | Channel risk grade |
Social channel | 2:High risk |
Business foreground | 5:Compared with low-risk |
The short Room | 4:Low-risk |
Net the Room | 3:Risk |
Third party | 1:High risk |
…… | …… |
Table 1, table 2 and table 3 list social channel, business foreground, the short Room and the partial data for netting the Room respectively.
Staged flow control policy described in S201 of the present invention is introduced below by second embodiment.
Based on every flow indicator data in the first embodiment, staged flow threshold is set, passes through operator
The portfolio weight accounting of affiliated business channel is added with channel risk equivalent coefficient, matches the corresponding rank of the business channel
Ladder type control strategy, for the flow access control of all operators under the business channel.
Such as table 4:Staged Hedging Point Control example
The benched spillway face of social channel and business foreground is listed in table 4, the staged control of other business channels
System strategy is identical, numerous to list herein.
Each character meaning and staged calculation formula meaning are as follows in table 4:
A:Business channel belonging to each operator, all operator's control strategies are identical under a business channel.
X:Each operator of business channel currently adds up visit capacity daily.
Y:Staged flow accesses calculation formula table, including following five kinds:
X<C:Operator adds up visit capacity and is less than its flow average threshold daily.
C<X<D:Operator adds up visit capacity and is more than its flow average threshold, and less than its maximum flow threshold value daily.
D<X<D*(1+E):Operator adds up visit capacity and is more than its maximum flow threshold value, and less than its maximum flow threshold daily
The product of value and its channel portfolio weight accounting+1.
D*(1+E)<X<D*(1+E)*F:Operator adds up visit capacity and is more than its maximum flow threshold value and its channel industry daily
The product of business amount weight accounting+1, and less than its maximum flow threshold value and its affiliated channel portfolio weight accounting+1 and channel wind
The product of dangerous grade.
X>D*(1+E)*F:Operator adds up visit capacity and is more than its maximum flow threshold value and its affiliated channel portfolio daily
The product of weight accounting+1 and channel risk grade.
Z:Various control strategies change with X values and are changed, including:
It does not limit:Directly allow the access of operator.
Short-message verification:The short message random code issued by system is verified.
Graphic verification:It is verified by system prompt graphical verification code.
4A national treasuries are verified:By the high-level 4A accounts of system prompt, input 4A account number ciphers are verified.
Forbid accessing:The access of quiescing person.
Flow access thresholds data, channel weighted data and channel risk data in the first embodiment, with
And the staged calculation formula in the second embodiment, the traffic requests of current each operator are verified, are calculated
The control strategy performed is needed, is verified for the flow access request X to each channel operations person.
The control strategy of current flow visit capacity X is obtained out by staged calculation formula Y, the control strategy is anti-
Feed the operator of flow visit capacity X, and the operator is accordingly unlocked according to the control strategy of prompting, so as to follow-up normal
The Operational Visit of business.
Wherein it is possible to benched spillway face is divided into three classes:
0:It represents to allow directly to access.
1:Expression does not allow directly to access, and needs to unlock corresponding control strategy.
2:Expression is forbidden accessing.
Specific implementation includes the following steps:
S100.1 obtains the present flow rate cumulant of the operator of the business channel;
S100.2, if the operator does not have individual traffic requests threshold data, according to the staged flow
The present flow rate cumulant of control strategy and the operator are calculated, and obtain the implementation strategy.
S100.3, please according to the individual flow if the operator has individual traffic requests threshold data
Threshold data is asked to access control.
The present invention also provides a kind of service traffics control device, including:
For receiving the traffic requests of business channel, institute is obtained based on staged flow control policy for tactful acquisition module
State the implementation strategy of traffic requests;
Policy enforcement module, for returning to the implementation strategy to the business channel, based on the implementation strategy to institute
Traffic requests are stated to access control;
Data acquisition module for the flow indicator data of capturing service channel, obtains flow access thresholds data, channel
Weight model data and channel risk model data;And
Control strategy module, for being based on the flow access thresholds data, channel weight model data and described
Channel risk model data obtains the staged flow control policy.
As shown in Fig. 2, for a kind of schematic device of service traffics control of third embodiment of the invention.The data acquisition
The flow indicator data of each business channel of the daily timing acquiring of module, and obtain four kinds of data:Flow access thresholds data (including
Flow average threshold C and flow average threshold D), channel weighted data (i.e. portfolio weight accounting E), channel risk data (i.e.
Channel risk grade F), access control policy data (accessing calculation formula Y and control strategy Z including staged flow).
In the 3rd embodiment, when operator carries out number selecting business by a certain business canalization, the business
Canalization can send the traffic requests of the operator to tactful acquisition module;The strategy acquisition module receives the business
After the traffic requests of the operator of channel, logical process is carried out according to current request information, judges whether to take the business channel
Generic threshold value.If the operator there are individual flow threshold data, the flow threshold data of oneself are used;If not yet
There is the generic threshold value for then using the business channel.
This embodiment assumes that the operator uses the logical of the business channel without oneself individual flow threshold data
It is accessed control with threshold value.
Tactful acquisition module described in the present embodiment gets operator's flow average threshold C and maximum flow threshold value
After D, the portfolio weight accounting E being collected and channel risk grade are obtained according to the affiliated business channel information of operator respectively
F。
Calculation formula Y is accessed by staged flow, to operator's traffic requests X values of the business channel and threshold value C,
D, E, F carry out calculating matching, and corresponding control strategy is matched by formula, including following several stair like control strategy modes:
If the 1st, present flow rate X<Flow average threshold C, i.e. operator add up visit capacity today and are averaged threshold less than its flow
Value C then allows to continue to access;Verification result is returned to the business channel:0 and control strategy:Access is not limited;The business
Canalization receives return the result after, by judging that verification result continues normal Operational Visit.
If the 2nd, flow average threshold C<Present flow rate X<Maximum flow threshold value D, i.e. operator add up visit capacity big today
In its flow average threshold C, and less than its maximum flow threshold value D, then perform short-message verification strategy;It is returned to the business channel
Verification result:1 and control strategy:Short-message verification;The business canalization receives return the result after, operator needs to input
Short message verification code is verified, continues normal Operational Visit after being verified.
If the 3rd, maximum flow threshold value D<Present flow rate X<Maximum flow threshold value D* (portfolio weight accounting E+1):Grasp
Work person adds up visit capacity today more than its maximum flow threshold value D, and less than its maximum flow threshold value D and its channel portfolio weight
The product of accounting E+1 then performs graphic verification strategy;Verification result is returned to the business channel:1 and control strategy:Figure
Verification;The business canalization receives return the result after, operator needs tablet pattern identifying code to be verified, verification is logical
Later continue normal Operational Visit.
If the 4th, maximum flow threshold value D* (portfolio weight accounting E+1)<Present flow rate X<Its maximum flow threshold value D* (industry
Business amount weight accounting E+1) * channel risk grade F, i.e., operator add up today visit capacity more than its maximum flow threshold value D and its
The product of channel portfolio weight accounting E+1, and less than its maximum flow threshold value D and its affiliated channel portfolio weight accounting E+
1 and the product of channel risk grade F, then it needs to perform 4A national treasury authentication policies;Verification result is returned to the business channel:1
And control strategy:4A national treasuries are verified;The business canalization receives return the result after, operator need according to system suggestion
High-level 4A accounts, input 4A passwords verified, continue normal Operational Visit after being verified, otherwise do not run continuation
It accesses.
If the 5th, present flow rate X>Its maximum flow threshold value D* (portfolio weight accounting E+1) * channel risk grade F, i.e.,
Operator adds up visit capacity today more than its maximum flow threshold value D and its affiliated channel portfolio weight accounting E+1 and channel wind
The product of dangerous F grades does not allow then to continue to access, and verification result is returned to the business channel:2 and control strategy:Forbid visiting
It asks;The business canalization receives return the result after, by judging that verification result forbids the Operational Visit of current operator
Request.
Relative to the prior art, the present invention has the advantages that:
1st, threshold value is obtained by flow collection automatically.It can be by user's business experience situation, automatically to each business canal
The threshold value of road operator is configured, and is realized that the different each operators of channel have a set of flow access thresholds to set, has been prevented
The flow for omitting channel accesses;The flow access thresholds obtained in this way were not only automatic but also accurate.
2nd, different business channel intelligent set ladder threshold value and corresponding control strategy.Rank based on different business channel
Terraced threshold value benched spillway face relationship corresponding with its, when each business channel reaches the ladder section that flow accesses, intelligence
Different control strategies can be matched;Such flow access control policy was not only intelligent but also rigorous.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in the protection of the present invention
Within the scope of.
Claims (10)
- A kind of 1. method of service traffics control, which is characterized in that including:S100 receives the traffic requests of business channel, and the execution of the traffic requests is obtained based on staged flow control policy Strategy;S101 is returned to the implementation strategy to the business channel, the traffic requests is visited based on the implementation strategy Ask control.
- 2. the method as described in claim 1, which is characterized in that further include:S200, the flow indicator data of capturing service channel obtain flow access thresholds data, channel weighted data and channel wind Dangerous data;S201, based on the flow access thresholds data, the channel weight model data and the channel risk model data, Obtain the staged flow control policy.
- 3. the method as described in claim 1, which is characterized in that the S100 further comprises:S100.1 obtains the present flow rate cumulant of the operator of the business channel;S100.2, if the operator does not have individual traffic requests threshold data, according to the staged flow control The present flow rate cumulant of tactful and described operator is calculated, and obtains the implementation strategy.
- 4. the method as described in claim 1, which is characterized in that the S100 further comprises:S100.3, if the operator has individual traffic requests threshold data, according to the individual traffic requests threshold Value Data accesses control.
- 5. the method as described in claim 1, which is characterized in that the implementation strategy includes:Do not limit access, short-message verification, Graphic verification, 4A national treasuries are verified and forbid accessing.
- 6. method as claimed in claim 2, which is characterized in that flow access thresholds data described in the S200 include flow Average threshold, maximum flow threshold value and flow generic threshold value;The flow average threshold is:The average value of the daily Operational Visit amount of operator in one period;The maximum flow threshold value is:The maximum value of the daily Operational Visit amount of operator in one period;The flow generic threshold value is for setting not collected operator's flow access thresholds, and the flow generic threshold value is from each Maximum value is chosen in the max-thresholds of a channel, and is configured by the multiple of the maximum value;The channel weighted data includes portfolio weight accounting, and the portfolio weight accounting is:It is each in time period The total business volume of whole channels in the total business volume divided by time period of a channel.
- 7. method as claimed in claim 2, which is characterized in that channel risk data described in the S200 include channel risk Grade, the channel risk grade are:Empirical data that flow based on the business channel accesses and be that each business channel is set The different risk class put.
- 8. method as claimed in claim 6, which is characterized in that staged flow control policy described in the S201 includes:If the daily integrated flow of operator is less than flow average threshold, allow to access;If the daily integrated flow of operator is more than flow average threshold, and less than maximum flow threshold value, then carry out short-message verification with Control accesses;If the daily integrated flow of operator is more than maximum flow threshold value, and less than maximum flow threshold value and portfolio weight accounting+1 Product, then carry out graphic verification with control access;The daily integrated flow of operator is more than the product of maximum flow threshold value and portfolio weight accounting+1, and less than its maximum threshold Value and portfolio weight accounting+1 and the product of channel risk grade, then carry out the verification of 4A national treasuries and accessed with controlling;AndThe daily integrated flow of operator is more than maximum flow threshold value and portfolio weight accounting+1 and the product of channel risk grade, Then forbid accessing;Wherein, the flow average threshold be described in operator flow average threshold, the maximum flow threshold value refers to institute The maximum flow threshold value of operator is stated, the portfolio weight accounting refers to the portfolio weight accounting of the business channel, institute State the channel risk grade that channel risk grade refers to the business channel.
- 9. method as claimed in claim 8, which is characterized in that all operators under a business channel have identical rank Ladder type flow control policy.
- 10. a kind of device of service traffics control, which is characterized in that including:For receiving the traffic requests of business channel, the stream is obtained based on staged flow control policy for tactful acquisition module Measure the implementation strategy of request;Policy enforcement module, for returning to the implementation strategy to the business channel, based on the implementation strategy to the stream Amount asks the control that accesses;Data acquisition module for the flow indicator data of capturing service channel, obtains flow access thresholds data, channel weight Model data and channel risk model data;AndControl strategy module, for being based on the flow access thresholds data, the channel weight model data and the channel Risk model data obtain the staged flow control policy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611249992.7A CN108259363B (en) | 2016-12-29 | 2016-12-29 | Method and device for controlling stepped service flow |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611249992.7A CN108259363B (en) | 2016-12-29 | 2016-12-29 | Method and device for controlling stepped service flow |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108259363A true CN108259363A (en) | 2018-07-06 |
CN108259363B CN108259363B (en) | 2021-08-27 |
Family
ID=62720936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611249992.7A Active CN108259363B (en) | 2016-12-29 | 2016-12-29 | Method and device for controlling stepped service flow |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259363B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490737A (en) * | 2019-07-29 | 2019-11-22 | 阿里巴巴集团控股有限公司 | Transaction channel control method, device and electronic equipment |
CN111212019A (en) * | 2018-11-22 | 2020-05-29 | 阿里巴巴集团控股有限公司 | User account access control method, device and equipment |
CN111770150A (en) * | 2020-06-24 | 2020-10-13 | 中国工商银行股份有限公司 | Access flow control method and device and electronic equipment |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1265407A2 (en) * | 2001-06-08 | 2002-12-11 | Fujitsu Limited | Transmitting apparatus and method of controlling flow thereof |
CN101022358A (en) * | 2006-10-17 | 2007-08-22 | 信息产业部电信研究院 | Method for realizing resource cluster and management control in IP telecommunication network system |
CN101127713A (en) * | 2007-09-05 | 2008-02-20 | 华为技术有限公司 | General traffic control device and traffic control method |
CN101977367A (en) * | 2010-10-20 | 2011-02-16 | 中兴通讯股份有限公司 | Method for establishing access control strategy of mobile value-added service and related device and system |
CN102763384A (en) * | 2010-02-12 | 2012-10-31 | 思科技术公司 | Automatic adjusting of reputation thresholds |
CN102811157A (en) * | 2011-06-01 | 2012-12-05 | 阿尔卡特朗讯公司 | Method and device for flow control |
CN102868989A (en) * | 2012-09-28 | 2013-01-09 | 大唐移动通信设备有限公司 | Method, system and equipment for call ticket generation in long-term evolution fusion type core network |
CN103078897A (en) * | 2012-11-29 | 2013-05-01 | 中山大学 | System for implementing fine grit classification and management of Web services |
CN103298035A (en) * | 2013-06-07 | 2013-09-11 | 华为技术有限公司 | Congestion control method and device |
CN103338194A (en) * | 2013-03-06 | 2013-10-02 | 中国电力科学研究院 | Credibility based cross- security domain access control system and method |
CN104518981A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Flow control method and device |
CN105847183A (en) * | 2016-03-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Bandwidth distribution method of content distribution network and bandwidth distribution system of content distribution network |
CN105915510A (en) * | 2016-04-12 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for controlling service traffic |
CN106155646A (en) * | 2015-03-31 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of external application that limits calls the method and device of service |
-
2016
- 2016-12-29 CN CN201611249992.7A patent/CN108259363B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1265407A2 (en) * | 2001-06-08 | 2002-12-11 | Fujitsu Limited | Transmitting apparatus and method of controlling flow thereof |
CN101022358A (en) * | 2006-10-17 | 2007-08-22 | 信息产业部电信研究院 | Method for realizing resource cluster and management control in IP telecommunication network system |
CN101127713A (en) * | 2007-09-05 | 2008-02-20 | 华为技术有限公司 | General traffic control device and traffic control method |
CN102763384A (en) * | 2010-02-12 | 2012-10-31 | 思科技术公司 | Automatic adjusting of reputation thresholds |
CN101977367A (en) * | 2010-10-20 | 2011-02-16 | 中兴通讯股份有限公司 | Method for establishing access control strategy of mobile value-added service and related device and system |
CN102811157A (en) * | 2011-06-01 | 2012-12-05 | 阿尔卡特朗讯公司 | Method and device for flow control |
CN102868989A (en) * | 2012-09-28 | 2013-01-09 | 大唐移动通信设备有限公司 | Method, system and equipment for call ticket generation in long-term evolution fusion type core network |
CN103078897A (en) * | 2012-11-29 | 2013-05-01 | 中山大学 | System for implementing fine grit classification and management of Web services |
CN103338194A (en) * | 2013-03-06 | 2013-10-02 | 中国电力科学研究院 | Credibility based cross- security domain access control system and method |
CN103298035A (en) * | 2013-06-07 | 2013-09-11 | 华为技术有限公司 | Congestion control method and device |
CN104518981A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Flow control method and device |
CN106155646A (en) * | 2015-03-31 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of external application that limits calls the method and device of service |
CN105847183A (en) * | 2016-03-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Bandwidth distribution method of content distribution network and bandwidth distribution system of content distribution network |
CN105915510A (en) * | 2016-04-12 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for controlling service traffic |
Non-Patent Citations (1)
Title |
---|
田明: "云计算环境下的访问控制技术研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111212019A (en) * | 2018-11-22 | 2020-05-29 | 阿里巴巴集团控股有限公司 | User account access control method, device and equipment |
CN111212019B (en) * | 2018-11-22 | 2022-09-02 | 阿里巴巴集团控股有限公司 | User account access control method, device and equipment |
CN110490737A (en) * | 2019-07-29 | 2019-11-22 | 阿里巴巴集团控股有限公司 | Transaction channel control method, device and electronic equipment |
CN110490737B (en) * | 2019-07-29 | 2024-03-19 | 创新先进技术有限公司 | Transaction channel control method and device and electronic equipment |
CN111770150A (en) * | 2020-06-24 | 2020-10-13 | 中国工商银行股份有限公司 | Access flow control method and device and electronic equipment |
CN111770150B (en) * | 2020-06-24 | 2022-10-18 | 中国工商银行股份有限公司 | Access flow control method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108259363B (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108229963A (en) | The Risk Identification Method and device of user's operation behavior | |
CN107784424A (en) | Task management method, device, computer equipment and storage medium | |
CN109479005A (en) | Method and system for realizing block chain | |
CN109146662A (en) | A kind of risk control method and device | |
CN110866820A (en) | Real-time monitoring system, method, equipment and storage medium for banking business | |
CN107924456A (en) | Virtual parking area | |
CN106778109A (en) | A kind of certification authority evaluation method and device based on intelligent contract | |
CN105427168A (en) | Loan assessment method and system | |
Heyes | Environmental regulation by private contest | |
CN106067088A (en) | E-bank accesses detection method and the device of behavior | |
CN108256993A (en) | A kind of credit score appraisal procedure and credit score Evaluation Platform | |
CN103796183B (en) | A kind of refuse messages recognition methods and device | |
CN108269087A (en) | The processing method and processing device of location information | |
CN108259363A (en) | A kind of method and device of staged service traffics control | |
CN107679046A (en) | A kind of detection method and device of fraudulent user | |
CN108512775A (en) | A kind of method and device of sequence transaction queue | |
CN107862425A (en) | Air control collecting method, equipment, system and readable storage medium storing program for executing | |
CN109670933A (en) | Identify method, user equipment, storage medium and the device of user role | |
CN105868878A (en) | Method and device for MAC (Media Access Control) address risk identification | |
CN110705988A (en) | Interactive blocking method and system for invasive behaviors | |
CN104616110A (en) | Information processing method and device | |
CN105991574A (en) | Risk behavior monitoring method and apparatus thereof | |
CN115689752A (en) | Method, device and equipment for adjusting wind control rule and storage medium | |
CN108197795A (en) | The account recognition methods of malice group, device, terminal and storage medium | |
CN108737138A (en) | Service providing method and service platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |