CN106101080A - Page access control method and device - Google Patents
Page access control method and device Download PDFInfo
- Publication number
- CN106101080A CN106101080A CN201610378008.0A CN201610378008A CN106101080A CN 106101080 A CN106101080 A CN 106101080A CN 201610378008 A CN201610378008 A CN 201610378008A CN 106101080 A CN106101080 A CN 106101080A
- Authority
- CN
- China
- Prior art keywords
- page
- request
- access
- terminal unit
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to technical field of the computer network, disclose a kind of page access control method and device.In the present invention, when receiving the accessing page request from terminal unit, the page that IP address according to described terminal unit and request access, determine whether the access to the page of request of the described terminal unit, if allowing the access to the page of request of the described terminal unit, then according to the current accessed amount to the page that described request accesses, and the real-time statistics of the correlation database storage of the page of described request access, generate the response policy of described accessing page request.Present invention also offers a kind of page access and control device so that system can filter most brush single file and be, it is ensured that normal client obtains the purchasing opportunities of equality.
Description
Technical field
The present invention relates to computer networking technology, particularly to e-commerce field.
Background technology
Shopping at network greatly facilitates the life of people, and people can buy limit by the various panic buying activities on network
Batch sales or inexpensive or the most specially offered commodity.Panic buying Operations Requirements user clicks on commodity within the specific panic buying time period
Link or panic buying button, place an order payment the most again.One commodity there may be hundreds and thousands of clients and falls over each other in eagerness to buy, and robs purchasing system
The most perfect, be related to that user whether can be fair gets required commodity.
In realizing process of the present invention, inventor finds that in prior art, there are the following problems, has panic buying in shopping at network
During class movable, usually have lawless person and gone on the razzle-dazzle by various means malice.Such as cattle can be by opening multiple account
The methods such as family make a big purchase this commodity in large quantities, cause being available for the commodity amount minimizing that domestic consumer buys;Brush single user can be by forging
The means such as IP, forgery access times, are substantially reduced domestic consumer and rob the probability buying commodity, even allow domestic consumer lose panic buying
Chance.
Summary of the invention
It is an object of the invention to provide a kind of page access control method and device so that system can filter major part
Brush single file be, it is ensured that domestic consumer obtains the panic buying chance of equality, thus robs and buys required commodity.
For solving above-mentioned technical problem, embodiments of the present invention provide a kind of page access control method, comprise with
Lower step:
When receiving the accessing page request from terminal unit, IP address and request according to described terminal unit are visited
The page asked, it may be judged whether allow the access to the page of request of the described terminal unit;
If allowing the access to the page of request of the described terminal unit, then according to working as the page that described request accesses
Front visit capacity, and the real-time statistics of the correlation database storage of the page of described request access, generate the sound of described accessing page request
Should strategy.
Embodiments of the present invention additionally provide a kind of page access and control device, comprise:
Receiver module, for receiving the accessing page request from terminal unit;
First detection module, the page accessed for the IP address according to described terminal unit and request, it may be judged whether permit
Permitted the access to the page of request of the described terminal unit;
Second detection module, for judging the permission described terminal unit page to asking at described first detection module
During access, according to the current accessed amount to the page that described request accesses, and the correlation database storage of the page of described request access
Real-time statistics, generate the response policy of described accessing page request.
Embodiment of the present invention in terms of existing technologies, has carried out examination and mistake to behaviors such as brush list, malicious attacks
Filter.The page accessed by IP address and the request of detection terminal unit, it is judged that whether the user of this terminal unit is that brush is alone
Family, if it is forbids the access to the page of request of this terminal unit, reduces the quantity of brush single user, improves domestic consumer and obtains
The probability of qualification must be rushed to purchase.After the page accessed according to IP address and request carries out ground floor filtration, according further to right
User is ranked arrangements by the current accessed amount of the page that request accesses, it is ensured that the purchasing opportunities of normal client acquisition equality.
Then the correlation database storage of the page that real-time statistics request accesses, by see quantity in stock number judge to rush to purchase and tied
Bundle, and then generate the response policy to accessing page request.
It addition, determine whether, in the terminal unit access to the page of request, to specifically include: detection terminal unit
Whether IP address is to preset the IP address in blacklist, if the IP address stated in blacklist, then forbids that terminal unit is to request
The access of the page;If the IP address of terminal unit for presetting the IP address in blacklist, does not then access further according to request
The page, it may be judged whether allow the terminal unit access to the page of request.Default blacklist contains system current statistic arrive
Brush single user, the IP address of the malicious user such as hacker, filtering out the IP user in blacklist, can to filter out substantial amounts of brush single
User.
It addition, after judging that the IP address of terminal unit is not as the IP address preset in blacklist, also include: detection terminal
The IP address of equipment initiates the number of times of accessing page request in preset duration, if exceed the first default thresholding;If it is super
Cross described first thresholding, then forbid the terminal unit access to the page of request.If the IP address of terminal unit is when default
The number of times initiating page access in long exceedes the first default thresholding, illustrates that this user is likely to have employed some means and increases in a large number
The access times of this IP are added.Thus it is single to forbid that such terminal unit can filter out brush further to the access of the page of request
User.
It addition, the page accessed according to described request, it may be judged whether allow the visit to the page of request of the described terminal unit
In asking, specifically include: detect the described terminal unit access times to the page of described request, if more than second preset
Limit;If greater than described second thresholding, then forbid the access to the page of request of the described terminal unit.If there being brush single user to lead to
Crossing software utilizes the station terminal equipment multiple IP of forgery to carry out brush single operation, the then access to described requests for page of this terminal unit
Number of times will preset greatly the second thresholding, can be filtered out by system.
It addition, after the response policy generating response page access request, also include: currently log according to terminal unit
Account, heavily confirms response policy;Wherein, if logged on account the most successfully rushed to purchase request access the page in finger
Determine commodity, be then changed to be not responding to accessing page request by response policy;If logged on account unsuccessful rushed to purchase request visit
Appointment commodity in the page asked, then confirm that the response policy generated is response page access request.Response policy is carried out weight
Confirmation can screen and filter out and the most successfully rush to purchase the user specifying commodity, allows and not yet robs in the page that the request bought accesses
Specify commodity user obtain more purchasing opportunities.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of page access control method according to first embodiment of the invention;
Fig. 2 is the flow chart of a kind of page access control method according to second embodiment of the invention;
Fig. 3 is that a kind of page access according to third embodiment of the invention controls apparatus structure schematic diagram;
Fig. 4 is that a kind of page access according to four embodiment of the invention controls apparatus structure schematic diagram.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with the accompanying drawing each reality to the present invention
The mode of executing is explained in detail.But, it will be understood by those skilled in the art that in each embodiment of the present invention,
In order to make reader be more fully understood that, the application proposes many ins and outs.But, even if there is no these ins and outs and base
Many variations and amendment in following embodiment, it is also possible to realize the application each claim technical side required for protection
Case.
First embodiment of the present invention relates to a kind of page access control method.Idiographic flow is as shown in Figure 1.
Step 101: receive the accessing page request from terminal unit.After panic buying activity starts, user is by clicking on business
The modes such as product link or click panic buying button, can send accessing page request to server system.System received from end
While the page request of end equipment, the information such as IP address of user can be obtained, control for follow-up page access.
Step 102: server judges whether the IP address of terminal unit is to preset the IP address in blacklist.If it is,
Enter step 109;Otherwise enter step 103.
Preset in blacklist the IP address of the malicious users such as the brush single user, the hacker that contain system current statistic and arrive, as
Really the IP address of user is contained in this default blacklist, then illustrate that the user of this terminal unit is not normal users, may be for brush
The improper users such as single user hacker user.Filter out the IP user in blacklist and can filter out substantial amounts of brush single user.
Step 103: the IP address detecting described terminal unit initiates the number of times of accessing page request in preset duration, and
Judge whether the request number of times that this IP address is initiated exceedes the first default thresholding.If it is, enter step 109;Otherwise enter
Step 104.
Normal users and domestic consumer can only initiate the page request of limited number of time in preset duration, and some brush single user
Various softwares etc. then can be utilized to initiate page request many times, improve the probability that this user is responded, thus reduce the most conventional
The probability that the request at family is responded, and then reduce the probability of normal users acquisition purchase qualification.This step can filter out this type of
Brush single user.
Such as, anti-brush mechanism system server system pre-sets per second an access in IP address and rushes to purchase the secondary of the page
Number, as an identical IP address per second can only allow to access the panic buying page 1 time, the most in this step, anti-brush mechanism system takes
Business device judges the IP address of terminal unit, if initiated the number of times of accessing page request in 1 second, has exceeded 1 time, if it exceeds
1 time, then enter step 109, otherwise enter step 104.
Step 104: the detection terminal unit access times to the page of request, if more than the second thresholding preset.As
Fruit is, enters step 109;Otherwise enter step 105.
Brush single user is also possible to forge multiple IP with same station terminal equipment and sends access request, only limits in preset duration
The access times of same IP can not be adequately filtered out brush single user.Therefore also need to add up unified terminal equipment same to ask
The access times of one page, if access times are more than the second thresholding preset, then illustrate that the user of this terminal is brush single user,
Need to forbid the page of the access request of this terminal.When implementing, can be according to the unification that carry in accessing page request
URLs URL, whether detection terminal unit has initiated repeatedly access request to the same page.
Whether present embodiment initiates the number of times of accessing page request more than first to detect IP address in preset duration
One thresholding, then detect the terminal unit access times to the page of request, if say more than as a example by the second thresholding preset
Bright, but it is not intended to the execution sequence of step 103 and step 104.
Step 105: statistics is asked the current accessed amount of the page accessed, it is judged that this visit capacity has exceeded the most presets frequency
Secondary.If it is, enter step 106;Otherwise, step 109 is entered.
The supply-demand relationship that goes on the razzle-dazzle is nervous, and the supply of goods is much smaller than demand, and same part commodity often have thousands of up to a hundred visitors
Family is rushed to purchase simultaneously.So if be detected that after asking the current accessed amount of the page accessed to be more than the default frequency, it is right to need
User ranks, and allows user wait purchasing opportunities in order.
Step 106: according to this default frequency and the time of this visit request receiving this page, determine this page
The response moment of access request.Determine that user is at queue according to the default frequency and the time receiving this accessing page request
In order, make each normal users obtain the purchasing opportunities of equality.When implementing, be equivalent to be provided with one
" lock ", within the unit interval, only allows a number of user to access this panic buying page, and the user exceeding this quantity needs to queue up
Wait the access to this panic buying page.
Step 107: before arriving the response moment, whether the correlation database storage of detection real-time statistics is more than zero, if greatly
In zero, enter step 108;Otherwise, step 109 is entered.
The correlation database storage of real-time statistics commodity, only before arriving the response moment, when commodity stocks amount is still above zero,
User its is possible to obtain and buys qualification.If commodity stocks amount is equal to zero, then illustrates that all commodity are sold the most, obtain not yet
The user of response can not reentry purchase qualification.Some goes on the razzle-dazzle to provide in batches and buys qualification, real-time statistics correlation database
Storage is also prevented from some brush single user and seizes the purchase qualification of next batch commodity in advance.
Step 108: respond this accessing page request, enters the commodity purchasing page or pays the page.
As can be seen here, in the present embodiment, if IP address is to preset the IP address in blacklist, or user
Whether the request number of times that IP address is initiated in preset duration exceedes the first default thresholding, or subscriber terminal equipment is to request
The number of times of the page more than the second thresholding preset, or the correlation database storage of real-time statistics is equal to zero or user's login account
Buy the page and specified commodity, then enter step 109: be not responding to the access request of the page.Further, if be detected that user is
Brush single user, then be not responding to the request that subscriber terminal equipment sends.If during user queues up, it is intended that commodity have not had storehouse
Depositing, terminate panic buying the most in advance, terminating to queue up no longer responds the request of user and notifies that user's panic buying activity terminates, reduces user
Waiting time.By the control to page access multi-layer, Effective selection in layer, filtering most brush single file is,
Make domestic consumer obtain the panic buying chance of equality, thus rob and buy required commodity.And, accessing according to IP address and request
The page carry out ground floor filtration after, according further to the current accessed amount of the page that request is accessed, user is ranked
Arranging, it is more effectively to make use of system resource that system can be made first to exclude a part of brush single file rapidly.
Second embodiment of the present invention relates to a kind of page access control method, and the second embodiment is the first embodiment party
Make further improvement on the basis of formula, mainly theed improvement is that: embodiment of the present invention with the addition of and heavily confirm response plan
Step slightly.If user the most successfully rushed to purchase the appointment commodity in the page of access request, in order to be able to allow more user
Buying this appointment commodity, response policy can be changed to be not responding to the accessing page request of this subscriber terminal equipment by system, should
User can not obtain purchase qualification.
Idiographic flow is as in figure 2 it is shown, step 201: receive the accessing page request from terminal unit.Panic buying activity starts
After, user is by clicking on goods links or clicking on the modes such as panic buying button, and can send page access to server system please
Ask.System receives from while the page request of terminal unit, can obtain the information such as IP address of user, for follow-up
Page access controls.
Step 202: server judges whether the IP address of terminal unit is to preset the IP address in blacklist.If it is,
Enter step 210;Otherwise enter step 203.
Preset in blacklist the IP address of the malicious users such as the brush single user, the hacker that contain system current statistic and arrive, as
Really the IP address of user is contained in this default blacklist, then illustrate that the user of this terminal unit is not normal users, may be for brush
The improper users such as single user hacker user.Filter out the IP user in blacklist and can filter out substantial amounts of brush single user.
Step 203: the IP address detecting described terminal unit initiates the number of times of accessing page request in preset duration, and
Judge whether the request number of times that this IP address is initiated exceedes the first default thresholding.If it is, enter step 210;Otherwise enter
Step 204.
Normal users and domestic consumer can only initiate the page request of limited number of time in preset duration, and some brush single user
Various softwares etc. then can be utilized to initiate page request many times, improve the probability that this user is responded, thus reduce the most conventional
The probability that the request at family is responded, and then reduce the probability of normal users acquisition purchase qualification.This step can filter out this type of
Brush single user.
Such as, anti-brush mechanism system server system pre-sets per second an access in IP address and rushes to purchase the secondary of the page
Number, as an identical IP address per second can only allow to access the panic buying page 1 time, the most in this step, anti-brush mechanism system takes
Business device judges the IP address of terminal unit, if initiated the number of times of accessing page request in 1 second, has exceeded 1 time, if it exceeds
1 time, then enter step 210, otherwise enter step 204.
Step 204: the detection terminal unit access times to the page of request, if more than the second thresholding preset.As
Fruit is, enters step 210;Otherwise enter step 205.
Brush single user is also possible to forge multiple IP with same station terminal equipment and sends access request, only limits in preset duration
The access times of same IP can not be adequately filtered out brush single user.Therefore also need to add up unified terminal equipment same to ask
The access times of one page, if access times are more than the second thresholding preset, then illustrate that the user of this terminal is brush single user,
Need to forbid the page of the access request of this terminal.When implementing, can be according to the unification that carry in accessing page request
URLs URL, whether detection terminal unit has initiated repeatedly access request to the same page.
Whether present embodiment initiates the number of times of accessing page request more than first to detect IP address in preset duration
One thresholding, then detect the terminal unit access times to the page of request, if say more than as a example by the second thresholding preset
Bright, but it is not intended to the execution sequence of step 203 and step 204.
Step 205: statistics is asked the current accessed amount of the page accessed, it is judged that this visit capacity has exceeded the most presets frequency
Secondary.If it is, enter step 206;Otherwise, step 210 is entered.
The supply-demand relationship that goes on the razzle-dazzle is nervous, and the supply of goods is much smaller than demand, and same part commodity often have thousands of up to a hundred visitors
Family is rushed to purchase simultaneously.So if be detected that after asking the current accessed amount of the page accessed to be more than the default frequency, it is right to need
User ranks, and allows user wait purchasing opportunities in order.
Step 206: according to this default frequency and the time of this visit request receiving this page, determine this page
The response moment of access request.Determine that user is at queue according to the default frequency and the time receiving this accessing page request
In order, make each normal users obtain the purchasing opportunities of equality.When implementing, be equivalent to be provided with one
" lock ", within the unit interval, only allows a number of user to access this panic buying page, and the user exceeding this quantity needs to queue up
Wait the access to this panic buying page.
Step 207: before arriving the response moment, whether the correlation database storage of detection real-time statistics is more than zero, if greatly
In zero, enter step 209;Otherwise, step 210 is entered.
The correlation database storage of real-time statistics commodity, only before arriving the response moment, when commodity stocks amount is still above zero,
User its is possible to obtain and buys qualification.If commodity stocks amount is equal to zero, then illustrates that all commodity are sold the most, obtain not yet
The user of response can not reentry purchase qualification.Some goes on the razzle-dazzle to provide in batches and buys qualification, real-time statistics correlation database
Storage is also prevented from some brush single user and seizes the purchase qualification of next batch commodity in advance.
Step 208: the account information currently logged according to terminal unit, it is judged that institute's login account was the most successfully rushed to purchase
Appointment commodity in the page that current request accesses, if the appointment business the most successfully rushed to purchase in the page that current request accesses
Product, then be considered as this terminal unit and do not have and this time rush to purchase qualification, enters step 210, is not responding to the accessing page request of user;As
Appointment commodity in the page that the unsuccessful request of rushing to purchase of account that fruit logs in accesses, then entrance step 209: the page of response user
Face access request.
It is to say, in the present embodiment, add the step that response policy is heavily confirmed, if logged on account
Number the most successfully rushed to purchase the appointment commodity in the page that current request accesses, be then changed to response policy be not responding to the described page
Access request;If logged on account unsuccessful rushed to purchase current request access the page in appointment commodity, then confirm generate
Response policy be response page access request.
The step of the most various methods divides, and is intended merely to describe clear, it is achieved time can merge into a step or
Some step is split, is decomposed into multiple step, as long as comprising identical logical relation, all at the protection domain of this patent
In;To adding inessential amendment in algorithm or in flow process or introducing inessential design, but do not change its algorithm
With the core design of flow process all in the protection domain of this patent.
Third embodiment of the invention relates to a kind of page access and controls device, as it is shown on figure 3, comprise:
Receiver module 31, for receiving the accessing page request from terminal unit;
First detection module 32, the page accessed for the IP address according to terminal unit and request, it may be judged whether allow
The terminal unit access to the page of request;
Second detection module 33, for the access judging to allow terminal unit to the page of request at first detection module
Time, according to the current accessed amount to the page that request accesses, and the real-time statistics of the correlation database storage of the page of request access, raw
Become the response policy of accessing page request.
In the present embodiment, the page accessed by IP address and the request of detection terminal unit, it is judged that this terminal sets
Whether standby user is brush single user, if it is forbids the access to the page of request of this terminal unit, reduces brush single user
Quantity, improve domestic consumer obtain panic buying qualification probability.Ground floor is carried out at the page accessed according to IP address and request
After filtration, user ranked arrangements according further to the current accessed amount of the page that request is accessed, it is ensured that commonly objective
Family obtains the purchasing opportunities of equality.Then the correlation database storage of the page that real-time statistics request accesses, by seeing that quantity in stock is many
Judge whether panic buying is over less, and then generate the response policy to accessing page request.
It is seen that, present embodiment is the system embodiment corresponding with the first embodiment, and present embodiment can be with
First embodiment is worked in coordination enforcement.The relevant technical details mentioned in first embodiment the most still has
Effect, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment is also applicable in
In first embodiment.
It is noted that each module involved in present embodiment is logic module, in actual applications, one
Individual logical block can be a physical location, it is also possible to be a part for a physical location, it is also possible to multiple physics lists
The combination of unit realizes.Additionally, for the innovative part highlighting the present invention, will be with solution institute of the present invention in present embodiment
The unit that the technical problem relation of proposition is the closest introduces, but this is not intended that in present embodiment the list that there is not other
Unit.
Four embodiment of the invention relates to a kind of page access and controls device, as shown in Figure 4.4th embodiment and
Three embodiments are roughly the same, are in place of the main distinction: present embodiment with the addition of and heavily confirms module.
Specifically, the page access control device of present embodiment comprises:
Receiver module 31, for receiving the accessing page request from terminal unit.
First detection module 32, the page accessed for the IP address according to terminal unit and request, it may be judged whether allow
The terminal unit access to the page of request.
Second detection module 33, for the access judging to allow terminal unit to the page of request at first detection module
Time, according to the current accessed amount to the page that request accesses, and the real-time statistics of the correlation database storage of the page of request access, raw
Become the response policy of accessing page request.
Heavily confirm module 34, during for generating the response policy of response page access request at the second detection module, according to
The account that terminal unit currently logs in, heavily confirms response policy;Wherein, heavily confirm that module is in the account judging described login
During appointment commodity in the page that the request of number the most successfully rushing to purchase accesses, response policy is changed to be not responding to page access please
Ask;Judge log in account unsuccessful rushed to purchase request access the page in appointment commodity time, confirm generate response plan
Slightly response page access request.
In present embodiment, heavily confirm response policy to screen and filter out the most successfully to rush to purchase appointment business
The user of product, allows the user specifying commodity not yet robbing in the page that the request bought accesses obtain more purchasing opportunities.
Owing to the second embodiment is the most corresponding with present embodiment, therefore present embodiment can be mutual with the second embodiment
Match enforcement.The relevant technical details mentioned in second embodiment is the most effective, implements second
The technique effect that can reach in mode is the most too it is achieved that in order to reduce repetition, the most superfluous
State.Correspondingly, the relevant technical details mentioned in present embodiment is also applicable in the second embodiment.
It will be appreciated by those skilled in the art that all or part of step realizing in above-described embodiment method can be by
Program instructs relevant hardware and completes, and this program is stored in a storage medium, including some instructions with so that one
Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform method described in each embodiment of the application
All or part of step.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment of the present invention,
And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.
Claims (10)
1. a page access control method, it is characterised in that including:
When receiving the accessing page request from terminal unit, access according to IP address and the request of described terminal unit
The page, it may be judged whether allow the access to the page of request of the described terminal unit;
If allowing the access to the page of request of the described terminal unit, then according to the current visit to the page that described request accesses
The amount of asking, and the real-time statistics of the correlation database storage of the page of described request access, generate the response plan of described accessing page request
Slightly.
Page access control method the most according to claim 1, it is characterised in that described in determine whether described terminal unit
In access to the page of request, specifically include:
Whether the IP address detecting described terminal unit is to preset the IP address in blacklist, if the IP in described blacklist
Address, then forbid the access to the page of request of the described terminal unit;
If the IP address of described terminal unit is not for presetting the IP address in blacklist, then the page accessed further according to described request
Face, it may be judged whether allow the access to the page of request of the described terminal unit.
Page access control method the most according to claim 2, it is characterised in that on the IP ground judging described terminal unit
After location is not for presetting the IP address in blacklist, also include:
The IP address detecting described terminal unit initiates the number of times of accessing page request in preset duration, if exceed default
First thresholding;
If it exceeds described first thresholding, then forbid the access to the page of request of the described terminal unit.
Page access control method the most according to claim 3, it is characterised in that the page accessed according to described request,
Determine whether, in the access to the page of request of the described terminal unit, to specifically include:
Detect the described terminal unit access times to the page of described request, if more than the second thresholding preset;
If greater than described second thresholding, then forbid the access to the page of request of the described terminal unit.
Page access control method the most according to claim 4, it is characterised in that if be detected that described terminal unit
IP address initiates the number of times of accessing page request in preset duration, not less than described first thresholding, detects described terminal the most again
The equipment access times to the page of described request, if more than the second thresholding preset.
Page access control method the most according to claim 1, it is characterised in that the sound of described generation accessing page request
Answer in strategy, specifically include:
If the current accessed amount of the page that described request accesses, exceed the default frequency, then according to the described default frequency with connect
Receive the time of described accessing page request, determine the response moment of described accessing page request;
Before arriving the response moment of described accessing page request, whether the correlation database storage detecting described real-time statistics is more than
Zero, if it is greater than zero, then generate the response policy responding described accessing page request.
Page access control method the most according to claim 6, it is characterised in that respond the visit of the described page described generation
After asking the response policy of request, also include:
The account currently logged according to described terminal unit, heavily confirms described response policy;
Wherein, if the account of described login the most successfully rushed to purchase the appointment commodity in the page that described request accesses, then by institute
State response policy to be changed to be not responding to described accessing page request;If the account of described login is unsuccessful rushed to purchase described request
Appointment commodity in the page accessed, then confirm that the described response policy generated is for responding described accessing page request.
Page access control method the most according to claim 6, it is characterised in that also include:
If the correlation database storage of described real-time statistics is equal to zero, then generate the response plan being not responding to described accessing page request
Slightly.
9. a page access controls device, it is characterised in that including:
Receiver module, for receiving the accessing page request from terminal unit;
First detection module, the page accessed for the IP address according to described terminal unit and request, it may be judged whether allow institute
State the terminal unit access to the page of request;
Second detection module, for the access judging to allow described terminal unit to the page of request at described first detection module
Time, according to the current accessed amount to the page that described request accesses, and the reality of the correlation database storage of the page of described request access
Shi Tongji, generates the response policy of described accessing page request.
Page access the most according to claim 9 controls device, it is characterised in that also include:
Heavily confirm module, during for generating the response policy of the described accessing page request of response at described second detection module, root
The account currently logged according to described terminal unit, heavily confirms described response policy;
Wherein, described heavy confirmation module was in the account judging described login the most successfully rushed to purchase the page that described request accesses
When specifying commodity, it is changed to be not responding to described accessing page request by described response policy;Judging the account of described login not
When successfully rushing to purchase the appointment commodity in the page that described request accesses, confirm that the described response policy generated is for responding described page
Face access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610378008.0A CN106101080A (en) | 2016-05-31 | 2016-05-31 | Page access control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610378008.0A CN106101080A (en) | 2016-05-31 | 2016-05-31 | Page access control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106101080A true CN106101080A (en) | 2016-11-09 |
Family
ID=57229696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610378008.0A Pending CN106101080A (en) | 2016-05-31 | 2016-05-31 | Page access control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106101080A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106598881A (en) * | 2016-12-20 | 2017-04-26 | 北京小米移动软件有限公司 | Page processing method and device |
CN106878410A (en) * | 2017-02-09 | 2017-06-20 | 北京奇虎科技有限公司 | The detection method and device of a kind of request of data |
CN107784554A (en) * | 2017-09-28 | 2018-03-09 | 深圳乐信软件技术有限公司 | Method, apparatus, storage medium, server and the terminal device of order processing |
CN108112038A (en) * | 2016-11-24 | 2018-06-01 | 苏宁云商集团股份有限公司 | A kind of method and device for controlling flowing of access |
CN108965207A (en) * | 2017-05-19 | 2018-12-07 | 北京京东尚科信息技术有限公司 | Machine Activity recognition method and apparatus |
CN109508519A (en) * | 2017-09-14 | 2019-03-22 | 北京京东尚科信息技术有限公司 | Method and apparatus for handling request |
WO2019080429A1 (en) * | 2017-10-23 | 2019-05-02 | 平安科技(深圳)有限公司 | Electronic apparatus, access request control method, and computer readable storage medium |
CN109981533A (en) * | 2017-12-27 | 2019-07-05 | 中移(杭州)信息技术有限公司 | A kind of ddos attack detection method, device, electronic equipment and storage medium |
CN110348833A (en) * | 2019-06-28 | 2019-10-18 | 北京你财富计算机科技有限公司 | A kind of processing method of payment request, device and electronic equipment |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN112801753A (en) * | 2021-02-09 | 2021-05-14 | 深圳市富途网络科技有限公司 | Page display method, device and medium |
CN112836213A (en) * | 2021-02-18 | 2021-05-25 | 联动优势科技有限公司 | Anti-brushing method and device based on API (application program interface) |
CN113709136A (en) * | 2021-08-25 | 2021-11-26 | 北京京东振世信息技术有限公司 | Access request verification method and device |
CN114900355A (en) * | 2022-05-07 | 2022-08-12 | 广州莱万科技股份有限公司 | Network school IP access monitoring system and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113519A (en) * | 2013-04-16 | 2014-10-22 | 阿里巴巴集团控股有限公司 | Network attack detection method and device thereof |
CN104636957A (en) * | 2015-02-04 | 2015-05-20 | 上海瀚之友信息技术服务有限公司 | System and method for processing high-concurrency data request |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
-
2016
- 2016-05-31 CN CN201610378008.0A patent/CN106101080A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113519A (en) * | 2013-04-16 | 2014-10-22 | 阿里巴巴集团控股有限公司 | Network attack detection method and device thereof |
CN104636957A (en) * | 2015-02-04 | 2015-05-20 | 上海瀚之友信息技术服务有限公司 | System and method for processing high-concurrency data request |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
Non-Patent Citations (1)
Title |
---|
李先森: ""秒杀技术的实现以及相应防作弊策略介绍"", 《HTTPS://BLOG.CSDN.NET/LEE_123456_LEE/ARTICLE/DETAILS/48372589》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108112038A (en) * | 2016-11-24 | 2018-06-01 | 苏宁云商集团股份有限公司 | A kind of method and device for controlling flowing of access |
CN108112038B (en) * | 2016-11-24 | 2021-06-01 | 深圳市云网万店科技有限公司 | Method and device for controlling access flow |
CN106598881A (en) * | 2016-12-20 | 2017-04-26 | 北京小米移动软件有限公司 | Page processing method and device |
CN106878410A (en) * | 2017-02-09 | 2017-06-20 | 北京奇虎科技有限公司 | The detection method and device of a kind of request of data |
CN108965207B (en) * | 2017-05-19 | 2021-02-26 | 北京京东尚科信息技术有限公司 | Machine behavior identification method and device |
CN108965207A (en) * | 2017-05-19 | 2018-12-07 | 北京京东尚科信息技术有限公司 | Machine Activity recognition method and apparatus |
CN109508519A (en) * | 2017-09-14 | 2019-03-22 | 北京京东尚科信息技术有限公司 | Method and apparatus for handling request |
CN107784554A (en) * | 2017-09-28 | 2018-03-09 | 深圳乐信软件技术有限公司 | Method, apparatus, storage medium, server and the terminal device of order processing |
WO2019080429A1 (en) * | 2017-10-23 | 2019-05-02 | 平安科技(深圳)有限公司 | Electronic apparatus, access request control method, and computer readable storage medium |
CN109981533A (en) * | 2017-12-27 | 2019-07-05 | 中移(杭州)信息技术有限公司 | A kind of ddos attack detection method, device, electronic equipment and storage medium |
CN110348833A (en) * | 2019-06-28 | 2019-10-18 | 北京你财富计算机科技有限公司 | A kind of processing method of payment request, device and electronic equipment |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN112801753A (en) * | 2021-02-09 | 2021-05-14 | 深圳市富途网络科技有限公司 | Page display method, device and medium |
CN112801753B (en) * | 2021-02-09 | 2024-04-23 | 深圳市富途网络科技有限公司 | Page display method, device and medium |
CN112836213A (en) * | 2021-02-18 | 2021-05-25 | 联动优势科技有限公司 | Anti-brushing method and device based on API (application program interface) |
CN113709136A (en) * | 2021-08-25 | 2021-11-26 | 北京京东振世信息技术有限公司 | Access request verification method and device |
CN114900355A (en) * | 2022-05-07 | 2022-08-12 | 广州莱万科技股份有限公司 | Network school IP access monitoring system and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106101080A (en) | Page access control method and device | |
US10764374B1 (en) | Internet-of-things (IoT) device reference network | |
CN108234505B (en) | Account login method and system | |
CN107832126A (en) | The method of adjustment and its terminal of a kind of thread | |
US10963935B2 (en) | User recommendation method and device | |
CN104753907A (en) | Data processing method and device based on instant messaging or social applications | |
CN110609937A (en) | Crawler identification method and device | |
AU2008323784A1 (en) | Network rating | |
EP3211578B1 (en) | Verification method and apparatus | |
CN110460587A (en) | A kind of exception account detection method, device and computer storage medium | |
CN109743294A (en) | Interface access control method, device, computer equipment and storage medium | |
CN105847277A (en) | Service account share management method and system used for third party application | |
CN105046562A (en) | Risk control system and risk control data acquisition method | |
CN107666473A (en) | The method and controller of a kind of attack detecting | |
CN110278192A (en) | Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet | |
CN109388702B (en) | Reading interaction method, electronic equipment and computer storage medium | |
CN108965291A (en) | Registration login method, system and the computer equipment of mixed application | |
CN107483381A (en) | The monitoring method and device of interlock account | |
US20160267578A1 (en) | System and method for implementation of sharing economy in a web environment | |
CN106408096A (en) | Data processing method in online ticketing system and online ticketing system | |
CN105119886A (en) | Account ownership determination method and device | |
CN107797859A (en) | A kind of dispatching method of timed task and a kind of dispatch server | |
CN108961034A (en) | System and method, storage medium based on user behavior certification | |
CN110247857B (en) | Current limiting method and device | |
CN106933822A (en) | A kind of content recommendation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161109 |
|
WD01 | Invention patent application deemed withdrawn after publication |