CN106357789A - Information access control method and server - Google Patents

Information access control method and server Download PDF

Info

Publication number
CN106357789A
CN106357789A CN201610877186.8A CN201610877186A CN106357789A CN 106357789 A CN106357789 A CN 106357789A CN 201610877186 A CN201610877186 A CN 201610877186A CN 106357789 A CN106357789 A CN 106357789A
Authority
CN
China
Prior art keywords
request
stage
access control
control policy
characteristic parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610877186.8A
Other languages
Chinese (zh)
Other versions
CN106357789B (en
Inventor
凌飞
赵磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Beijing Co Ltd
Original Assignee
Tencent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Beijing Co Ltd filed Critical Tencent Technology Beijing Co Ltd
Priority to CN201610877186.8A priority Critical patent/CN106357789B/en
Publication of CN106357789A publication Critical patent/CN106357789A/en
Application granted granted Critical
Publication of CN106357789B publication Critical patent/CN106357789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms

Abstract

The invention discloses an information access control method and a server, wherein the method comprises the following steps of receiving an access control strategy, wherein the access control strategy is a request response priority processing strategy generated through the division according to the request sources; when the condition that the current state is an overload state is detected, extracting feature parameters from at least one received first request, wherein the feature parameters are used for expressing the request sources or correlations to the request sources, and are divided into request located information position and request belonging user information according to the request sources; inquiring whether the feature parameters hit the access control strategy or not; if the feature parameters can be inquired in the access control strategy, selecting the request response priority corresponding to the feature parameters; performing staged abandoning processing on at least one first request according to the request response priority; otherwise, directly performing abandoning processing.

Description

A kind of information access control method and server
Technical field
The present invention relates to information control technology, more particularly, to a kind of information access control method and server.
Background technology
Information transfer is that order or status information channel are sent to the other end, and the mistake being received by other side by one end Journey, during information transfer in addition to point-to-point transmission means, most transmission means needs by the Internet In server carry out transfer or information processing.If the carrying out that server is all made no exception to all of request is processed, can Bring huge pressure to server itself, even if the present mostly this distributed system architecture of server cluster adopting, With the substantial increase of user's requirements for access amount, remain on the problem that can not alleviate server load pressure.At present, in order to alleviate The load pressure of server, can carry out discard processing for some access request, typically find the feelings that server has transshipped Under condition, newly-increased access request is abandoned, the rigid process strategy that this overload just abandons without exception is very inadvisable, if newly Increasing access request is the request that must process in time, then the service performance leading to whole information transmission system and steady is comprehended at this place Qualitative bad, need one kind more flexibly to process strategy and access request is made a distinction and accesses processing controls.However, it is related In technology, for this problem, there is no effective solution.
Content of the invention
In view of this, embodiments provide a kind of information access control method and server, solve at least existing Problem with the presence of technology.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of information access control method of the embodiment of the present invention, methods described includes:
Receive access control policy, described access control policy is to be divided generated request according to the source of request Response priority processing strategy;
Detect when being currently at overload, extract characteristic parameter from least one receiving first request, described Characteristic parameter is used for characterizing originating or related to the source of described request of described request, and the source according to described request is divided into Ask the user profile that the information bit being located and request are belonged to;
Inquire about whether described characteristic parameter hits described access control policy;
If described characteristic parameter can be inquired in described access control policy, choose corresponding described characteristic parameter Request response priority, is carried out at discarding stage by stage at least one first request described according to described request response priority Reason;Otherwise, directly carry out discard processing.
In such scheme, described access control policy is that to be divided generated request response according to the source of request excellent First level processes strategy, comprising:
The source of described request is identified by the information bit that the first request is located, the letter that the described first request is located According to information, breath position shows that the first acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, obtain stage by stage please Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, the identification information carrying in described first request includes the information bit that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
In such scheme, described access control policy is that to be divided generated request response according to the source of request excellent First level processes strategy, comprising:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is returned According to information, the user profile belonging to shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage please Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, the identification information carrying in described first request includes the user profile that the first request is belonged to;
User profile belonged to for described first request is defined as described characteristic parameter.
In such scheme, if described characteristic parameter can be inquired in described access control policy, choose corresponding institute State the request response priority of characteristic parameter, according to described request response priority, at least one first request described is carried out point The discard processing in stage, comprising:
When inquiring the information bit that described first request is located from described access control policy, if described first request The request response priority of first stage in the corresponding described access control policy of information bit being located, then ask to described first into Row discard processing, returning result to request initiator is empty feedback;
If the request response in xth stage is excellent in the corresponding described access control policy of information bit that described first request is located First level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as inspection Measure the discard processing stage by stage that the request response priority prior to the x stage is executed successively and still can not alleviate overload situations When, the first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns Returning result is empty feedback.
A kind of server of the embodiment of the present invention, described server includes:
Receiving unit, for receiving access control policy, described access control policy is to carry out drawing according to the source of request Divide generated request response priority processing strategy;
Detector unit, is used for detecting when being currently at overload, extracts from least one receiving first request Characteristic parameter, described characteristic parameter is used for characterizing originating or related to the source of described request, according to described of described request The source of request is divided into the user profile that the information bit at request place and request are belonged to;
Query unit, for inquiring about whether described characteristic parameter hits described access control policy;
Abandon performance element, if for described characteristic parameter can be inquired in described access control policy, chosen The request response priority of corresponding described characteristic parameter, according to described request response priority at least one first request described Carry out discard processing stage by stage;Otherwise, directly carry out discard processing.
In such scheme, described receiving unit, it is further used for receiving access control policy, described access control policy Create-rule includes:
The source of described request is identified by the information bit that the first request is located, the letter that the described first request is located According to information, breath position shows that the first acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, obtain stage by stage please Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, described server also includes: characteristic parameter determining unit, is used for:
Parse the information bit that the identification information carrying in the first request is that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
In such scheme, described receiving unit, it is further used for receiving access control policy, described access control policy Create-rule includes:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is returned According to information, the user profile belonging to shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage please Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, described server also includes: characteristic parameter determining unit, is used for:
Parse the user profile that the identification information carrying in described first request is belonged to by the first request;
User profile belonged to for described first request is defined as described characteristic parameter.
In such scheme, described discarding performance element, it is further used for:
When inquiring the information bit that described first request is located from described access control policy, if described first request The request response priority of first stage in the corresponding described access control policy of information bit being located, then ask to described first into Row discard processing, returning result to request initiator is empty feedback;
If the request response in xth stage is excellent in the corresponding described access control policy of information bit that described first request is located First level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as inspection Measure the discard processing stage by stage that the request response priority prior to the x stage is executed successively and still can not alleviate overload situations When, the first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns Returning result is empty feedback.
The information access control method of the embodiment of the present invention, comprising: receive access control policy, described access control policy It is that generated request response priority processing strategy is divided according to the source of request;Detect and be currently at overload When, from least one receiving first request extract characteristic parameter, characteristic parameter be used for characterize described request source or Related to the source of described request, the source according to described request is divided into the user that the information bit at request place and request are belonged to Information;Inquire about whether described characteristic parameter hits described access control policy;If can inquire about in described access control policy To described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, according to described request response priority At least one first request described is carried out with discard processing stage by stage;Otherwise, directly carry out discard processing.
Using the embodiment of the present invention, according to the access control policy of setting, access request is distinguished, found clothes In the case that business device has transshipped, extract characteristic parameter from least one receiving first request, characteristic parameter is used for characterizing Described request source or related to the source of described request, the source according to described request be divided into request place information bit And the user profile that request is belonged to;Inquire about whether described characteristic parameter hits described access control policy;If in described visit Ask and described characteristic parameter in control strategy, can be inquired, then choose the request response priority of corresponding described characteristic parameter, according to Described request response priority carries out discard processing stage by stage at least one first request described;Otherwise, directly lost Abandon process.It can be seen that, in the case of finding that server transshipped, it is associating according to access request and access control policy, no It is the rigid process strategy that newly-increased access request is abandoned without exception, but preferential fraction is responded according to the request of access control policy Stage carries out discard processing, thus improve service performance and the stability of whole information transmission system.
Brief description
Fig. 1 is the schematic diagram of each side's hardware entities carrying out information exchange in the embodiment of the present invention;
Fig. 2 is the method flowchart of the embodiment of the present invention one;
Fig. 3 is the method flowchart of the embodiment of the present invention two;
Fig. 4 is the method flowchart of the embodiment of the present invention three;
Fig. 5 is that the system of the embodiment of the present invention five forms structural representation;
Fig. 6 is the system architecture schematic diagram of the application embodiment of the present invention one scene.
Specific embodiment
Enforcement to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Realize the mobile terminal of each embodiment of the present invention referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being conducive to the explanation of the embodiment of the present invention, Itself does not have specific meaning.Therefore, " module " and " part " can mixedly use.
In the following detailed description, set forth numerous details, thoroughly to understand the present invention.But, for It is clear that the present invention can be put into practice in the case of there is no these details for those of ordinary skill in the art.In other feelings Under condition, not known method, process, assembly, circuit and network disclosed in detailed description, to avoid unnecessarily making embodiment Various aspects are smudgy.
Although in addition, be employed many times herein term " first ", " second " etc. come to describe various elements (or various threshold value or Various applications or various instructions or various operation) etc., but these elements (or threshold value or application or instruction or operation) should not be subject to The restriction of these terms.These terms be only intended to distinguish an element (or threshold value or application or instruction or operation) and another Element (or threshold value or application or instruction or operation).For example, the first operation can be referred to as the second operation, and the second operation can also It is referred to as the first operation, without deviating from the scope of the present invention, the first operation and the second operation are all operations, and simply the two is not Identical operates.
Step in the embodiment of the present invention is not necessarily processed according to described sequence of steps, can be according to need Ask and selectively step is upset rearrangement, or delete the step in embodiment, or increase the step in embodiment, the present invention Step description in embodiment is optional sequential combination, does not represent all sequence of steps combinations of the embodiment of the present invention, Sequence of steps in embodiment is not construed as limiting the invention.
Term "and/or" in the embodiment of the present invention refers to including one or more of associated listed items Any and whole possible combinations.It may also be noticed that: where used in this disclosure, "comprises/comprising" is specified and is stated The presence of feature, integer, step, operation, element and/or assembly, but it is not excluded for other features one or more, integer, step Suddenly, the presence of operation, element and/or assembly and/or their group or interpolation.
Intelligent terminal's (as mobile terminal) of the embodiment of the present invention can implement in a variety of manners.For example, the present invention is real Apply the mobile terminal described in example can include such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, Personal digital assistant (pda, personal digital assistant), panel computer (pad), portable media player The mobile terminal of (pmp, portable media player), guider etc. and digital tv, desk computer etc. Deng fixed terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, use except special Outside the element of mobile purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the schematic diagram of each side's hardware entities carrying out information exchange in the embodiment of the present invention, and Fig. 1 includes: service Device 11, terminal unit 21-24, server 31 server 41;Terminal unit passes through cable network or wireless network and service Device carries out information exchange, and terminal unit includes the types such as mobile phone, desktop computer, pc machine, all-in-one.Using the embodiment of the present invention, whole End equipment 21-24 sends the first request, such as ad-request, and server 31 divides generation request response in advance according to the source of request Priority processing strategy, using this request response priority processing strategy as access control policy, send access control policy to Server 11, so that server 11 makes a distinction to request according to this access control policy, is carried out to request in the case of an overload Selectively Access Control.Server 41 is the request processing server of background logic layer, carries out selectively in server 11 After Access Control, the pending request of the reception server 11 transparent transmission.Server 11 execution processes logic, wherein, is processing logic In s1, detect when being currently at overload, from least one receiving first request, extract characteristic parameter, and access control System strategy compares, and inquires about whether described characteristic parameter hits described access control policy.In processing logic s2, if described Described characteristic parameter can be inquired in access control policy, then choose the request response priority of corresponding described characteristic parameter, root Response priority is asked to carry out discard processing stage by stage at least one first request described according to described, as long as rather than finding It is in overload and then abandon newly-increased request without exception;If failing to inquire described feature ginseng in described access control policy Number, the extraction characteristic parameter miss access control strategies in illustrate to ask first, this first is asked as inessential timely place The request of reason, abandons under overload without exception, if server 11 also has memory capacity it is also possible to this request is saved in clothes In the caching of business device 11, wait that to check be currently non-overloaded situation, then the first request is processed.It need to be noted that It is, the extraction characteristic parameter hit access control strategy in the first request, but the request being abandoned stage by stage according to priority, If server 11 also has memory capacity it is also possible to be saved in this request in the caching of server 11, wait to check and be currently Non-overloaded situation, then the first request is processed.
The example of above-mentioned Fig. 1 simply realizes a system architecture example of the embodiment of the present invention, and the embodiment of the present invention is not It is limited to the system structure described in above-mentioned Fig. 1, based on the system architecture described in above-mentioned Fig. 1, propose each embodiment of the inventive method.
A kind of information access control method of the embodiment of the present invention, as shown in Fig. 2 methods described includes:
Step 101, server receive access control policy, and described access control policy is to carry out drawing according to the source of request Divide generated request response priority processing strategy.
Here, for this access control policy that the source of request generates sign request response processing priority, its One, an example is, when for advertisement position ecpm generation strategy, will advertisement position to be ranked up according to ecpm.Now, first Ad spot information (being to come for identifying this corresponding advertisement of the first request) is comprised from which advertisement position, due to every in request Individual advertisement position can bring the value of ecpm, and different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates The formula of ecpm is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that by More concerns, that is to say, that first being asked from what the advertisement position that can bring bigger ecpm value sent, correspond to higher preferential Level, in the case of overload or burst overload, is intended to obtain priority protection, and this first request as needs to be processed in time Request it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped Or have to be abandoned by the very first time in the case of burst overload.These process are all the accesses in the application information processing system Server (server 11 as shown in Figure 1) is judged and discard processing.Be dropped, then can be to before sending the first request End returns the feedback that implementing result is " empty ", and that is, access server returns empty result to front end;If not abandoned, by first Request passes through the logical process server (server 41 as shown in Figure 1) on backstage, carries out corresponding process to the first request.
Here, for this access control policy that the source of request generates sign request response processing priority, its Two, an example is, when based on user profile generation strategy, will advertisement position according to the user position such as province, city, area, county, street Confidence breath is ranked up.Now, the geographical location information comprising user in the first request is (corresponding for identifying this first request Advertisement is to come from which province, city, area, county, street), because each request is from the geographical position institute energy of different dimensions Bring the value of ctr different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can carry Carry out the first request that the geographical position of bigger ctr value is sent, the higher priority of correspondence, in the situation of overload or burst overload Under, it is intended to obtain priority protection, this first request as needs to obtain the request of process in time it is impossible to the very first time is done and loses Abandon process.And then have in the case of overload or burst overload from the first request that the minimum geographical position of ctr value sends Abandoned by the very first time.These process are all the access server (servers as shown in Figure 1 in the application information processing system 11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty " Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Step 102, server detect when being currently at overload, extract from least one receiving first request Characteristic parameter.
Here, this feature parameter is used for characterizing originating or related to the source of described request, according to institute of described request The source stating request is divided into the user profile that the information bit at request place and request are belonged to.
Described in step 103, server lookup, whether characteristic parameter hits described access control policy, if it is, execution Step 104;Otherwise, execution step 106.
Step 104, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 105, the discarding at least one first request described being carried out stage by stage according to described request response priority Process.
Step 106, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 102-106, if can inquire described characteristic parameter in described access control policy, it is right to choose Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus, Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will Request response priority processing strategy is defined as described access control policy.
1) it is based on advertisement position ecpm and generates described access control policy: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled 1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is, The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as 20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need Very important person is the control strategy of intervention decision-making higher level.
2) it is based on user profile and generate described access control policy.
Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province For dimension, ctr is by low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.Take total Measure as front p1 (as 10%) province as the first flexible stage, take total amount to be front p2 (as 20%) province as the second flexible rank Section, takes total amount to be front p3 (as 20%) province as the 3rd flexible stage.So as, the subsequently stair like control strategy pair according to this segmentation First request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user with being somebody's turn to do The described access control policy that information generates is compared.If abandoning more than 50% request, still at uncontrollable background logic Reason server cluster pressure, needs the artificial control strategy intervening decision-making higher level.
It is to be herein pointed out above-mentioned based on advertisement position ecpm, and based on user profile generate described access control plan Slightly, can be applied in combination, it is possible to use one of which.Degree of accuracy sieve request being abandoned due to the strategy based on user profile Choosing, its impact is than the strategy based on advertisement position greatly that is to say, that generate the side of described access control policy based on user profile Formula, its priority is less than the mode generating described access control policy based on advertisement position, therefore, when being applied in combination, elder generation and base Compare in the mode that user profile generates described access control policy, afterwards, described in conjunction with being generated based on user profile The mode of access control policy.And, if selecting any one, being preferably based on user profile and generating described access control policy Mode.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
A kind of information access control method of the embodiment of the present invention, as shown in figure 3, methods described includes:
Step 201, the source of described request are identified by the information bit that the first request is located, and described first is asked According to information, the information bit being located shows that the first acquired value of feedback is ranked up, generate ranking results.
Here, the first value of feedback can be ecpm, and ecpm refers to: the advertising income that every 1,000 displayings can obtain, and show Unit can be webpage, advertising unit, even single advertisement.Under default situations, what ecpm referred to is all thousand web page display Income.
Step 202, according to information, described ranking results are shown that the first acquired feedback total amount is divided, divided The request response priority in stage, obtains described access control policy according to described request response priority stage by stage.
Here, when according to information, described ranking results being shown that the first acquired feedback total amount is divided, employing It is to be divided according to percentage ratio, then obtain percentage ratio parameter.This percentage ratio stochastic parameter selects, and the request being chosen to is not visited Ask background logic processing server, the implementing result being directly returned as sky is to front end.As so that access control plan is generated based on ecpm Slightly example, is step type control, takes total amount to be that front p1 (as 10%) asks as the first flexible stage, that is, the first stage will The data abandoning.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Total amount is taken to be front p3 (as 20%) request As the 3rd flexible stage.
Here, when for advertisement position ecpm generation strategy, will advertisement position be ranked up according to ecpm.Now, first Ad spot information (being to come for identifying this corresponding advertisement of the first request) is comprised from which advertisement position, due to every in request Individual advertisement position can bring the value of ecpm, and different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates The formula of ecpm is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that by More concerns, that is to say, that first being asked from what the advertisement position that can bring bigger ecpm value sent, correspond to higher preferential Level, in the case of overload or burst overload, is intended to obtain priority protection, and this first request as needs to be processed in time Request it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped Or have to be abandoned by the very first time in the case of burst overload.These process are all the accesses in the application information processing system Server (server 11 as shown in Figure 1) is judged and discard processing.Be dropped, then can be to before sending the first request End returns the feedback that implementing result is " empty ", and that is, access server returns empty result to front end;If not abandoned, by first Request passes through the logical process server (server 41 as shown in Figure 1) on backstage, carries out corresponding process to the first request.
Step 203, server detect when being currently at overload, receive at least one first request, at least one The identification information carrying in first request includes the information bit that the first request is located, and the information bit that the described first request is located is true It is set to described characteristic parameter, extract this feature parameter.
Here, this feature parameter is used for characterizing the source of described request or related to the source of described request, can be by Source according to described request is divided into the user profile that the information bit at request place and request are belonged to, and is specially institute in the present embodiment State the information bit that the first request is located.
Described in step 204, server lookup, whether characteristic parameter hits described access control policy, if it is, execution Step 205;Otherwise, execution step 207.
Step 205, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 206, the discarding at least one first request described being carried out stage by stage according to described request response priority Process.
Step 207, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 203-207, if can inquire described characteristic parameter in described access control policy, it is right to choose Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus, Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will Request response priority processing strategy is defined as described access control policy.Described access control plan is generated based on advertisement position ecpm Slightly: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled 1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is, The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as 20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need Very important person is the control strategy of intervention decision-making higher level.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
A kind of information access control method of the embodiment of the present invention, as shown in figure 4, methods described includes:
Step 301, the source of described request are identified, by described first by the belonged to user profile of the first request Ask belonged to user profile to show that the second acquired value of feedback is ranked up according to information, generate ranking results.
Here, the second value of feedback can be ctr, and ctr refers to ad click rate, carry out in a search engine after input key word Search, then is arranged out related webpage by the factor such as bid, then user can select oneself interested in order Website click on, using all for website search number of times out as total degree, user is clicked on and enters website Number of times accounts for the ratio of total degree clicking rate.The ctr of the embodiment of the present invention be according to customer position information, country, province, city, area, County, street etc. assessing, pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with Province is dimension, and ctr presses low to high sequence.
Step 302, according to information, described ranking results are shown that the second acquired feedback total amount is divided, divided The request response priority in stage, obtains described access control policy according to described request response priority stage by stage.
Here, when according to information, described ranking results being shown that the second acquired feedback total amount is divided, employing It is to be divided according to percentage ratio, then obtain percentage ratio parameter.This percentage ratio stochastic parameter selects, and the request being chosen to is not visited Ask background logic processing server, the implementing result being directly returned as sky is to front end.So that described visit is generated based on user profile As a example asking control strategy, it is the stair like control strategy of segmentation.Total amount is taken to be that front p1 (as 10%) province, as the first flexible stage, takes Total amount takes total amount to be front p3 (as 20%) province as the 3rd flexible rank for front p2 (as 20%) province as the second flexible stage Section.
Here, for this access control policy that the source of request generates sign request response processing priority, one Individual example is, when based on user profile generation strategy, will believe according to customer locations such as province, city, area, county, streets advertisement position Breath is ranked up.Now, the geographical location information comprising user in the first request is (for identifying this corresponding advertisement of the first request It is to come from which province, city, area, county, street), because each request can bring from the geographical position of different dimensions The value of ctr is different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can bring more The first request that the geographical position of big ctr value is sent, the higher priority of correspondence, in the case of overload or burst overload, It is intended to obtain priority protection, this first request as needs to obtain the request processing in time it is impossible to be abandoned by the very first time Process.And from the minimum geographical position of ctr value send first request then overload or burst overload in the case of have to by The very first time abandons.These process are all the access server (servers as shown in Figure 1 in the application information processing system 11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty " Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Step 303, server detect when being currently at overload, receive at least one first request, at least one The identification information carrying in first request includes the user profile that the first request is belonged to, by user's letter belonged to for the first request Breath is defined as described characteristic parameter, extracts this feature parameter.
Here, this feature parameter is used for characterizing the source of described request or related to the source of described request, can be by Source according to described request is divided into the user profile that the information bit at request place and request are belonged to, and is specially institute in the present embodiment State the user profile that the first request is belonged to, such as user's geographical location information.
Described in step 304, server lookup, whether characteristic parameter hits described access control policy, if it is, execution Step 305;Otherwise, execution step 307.
Step 305, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 306, the discarding at least one first request described being carried out stage by stage according to described request response priority Process.
Step 307, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 303-307, if can inquire described characteristic parameter in described access control policy, it is right to choose Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus, Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will Request response priority processing strategy is defined as described access control policy, generates described access control plan based on user profile Slightly.Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province for dimension Degree, ctr presses low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.The total amount is taken to be Front p1 (as 10%) province, as the first flexible stage, takes total amount to be that front p2 (as 20%) province, as the second flexible stage, takes Total amount is front p3 (as 20%) province as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is to first Request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user profile with being somebody's turn to do The described access control policy generating is compared.If abandoning more than 50% request, still uncontrollable background logic processes clothes Business device cluster pressure, needs the artificial control strategy intervening decision-making higher level.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
Based on above-described embodiment, in a kind of information access control method of the embodiment of the present invention, if accessing control described Described characteristic parameter can be inquired in system strategy, then choose the request response priority of corresponding described characteristic parameter, according to described Request response priority carries out discard processing stage by stage at least one first request described, comprising: 1) access control from described When inquiring the information bit that described first request is located in system strategy, if the information bit that described first request is located is corresponding described In access control policy, the request response priority of first stage, then carry out discard processing to the described first request, send out to request Playing side and returning result is empty feedback.2) if the information bit that described first request is located corresponds to described access control policy The request response priority in middle xth stage, described x is the positive integer more than 1, then according to current overload and executed Discard processing is judged, responds, when the request to prior to the x stage is detected, the discard processing stage by stage that priority executes successively When still can not alleviate overload situations, the first request responding priority match for the request with the described xth stage is lost Abandon process, returning result to request initiator is empty feedback.3) if during discard processing stage by stage, do not held The request of row discard processing passes through the logical process server on backstage, carries out phase by logical process server to the first request Should, and corresponding service feedback is provided.Such as, current overload, will meet the first stage according to access control policy After the request " request a1 " of request response priority carries out screening discarding, for other, the not screened request matching is carried out Biography is processed, and the request " request a2 ... an " not being performed discard processing passes through the logical process server on backstage, by logic Processing server is carried out accordingly to the first request, and provides corresponding service feedback.
The message reference control system of the embodiment of the present invention, as shown in figure 5, include terminal 51, access server 61, strategy Generate server 71, logical process server 81;Wherein, access server 61 includes: receiving unit 611, accesses for receiving Control strategy, described access control policy is to be divided generated request response priority processing plan according to the source of request Slightly;Detector unit 612, is used for detecting when being currently at overload, extracts special from least one receiving first request Levy parameter, described characteristic parameter is used for characterizing originating or related to the source of described request of described request, asks according to described The source asked is divided into the user profile that the information bit at request place and request are belonged to;Query unit 613, for inquiring about described spy Levy whether parameter hits described access control policy;Abandon performance element 614, if for energy in described access control policy Inquire described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, excellent according to described request response First level carries out discard processing stage by stage at least one first request described;Otherwise, directly carry out discard processing.
For this access control policy that the source of request generates sign request response processing priority, first, one Individual example is, when for advertisement position ecpm generation strategy, will advertisement position to be ranked up according to ecpm.Now, the first request In comprise ad spot information (for identify this first request corresponding advertisement be from which advertisement position come), because each is wide Accuse position to bring the value of ecpm different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates ecpm's Formula is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that more Paying close attention to the first request that is to say, that being sent from the advertisement position that can bring bigger ecpm value, corresponding to higher priority, Transship or happen suddenly in the case of overload, be intended to obtain priority protection, this first request as needs to obtain asking of process in time Ask it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped or is being dashed forward Have to be abandoned by the very first time in the case of sending out overload.These process are all the access services in the application information processing system Device (server 11 as shown in Figure 1) is judged and discard processing.It is dropped, then can return to the front end sending the first request Return the feedback that implementing result is " empty ", that is, access server returns empty result to front end;If not abandoned, first is asked Pass through the logical process server (server 41 as shown in Figure 1) on backstage, corresponding process is carried out to the first request.
Here, for this access control policy that the source of request generates sign request response processing priority, its Two, an example is, when based on user profile generation strategy, will advertisement position according to the user position such as province, city, area, county, street Confidence breath is ranked up.Now, the geographical location information comprising user in the first request is (corresponding for identifying this first request Advertisement is to come from which province, city, area, county, street), because each request is from the geographical position institute energy of different dimensions Bring the value of ctr different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can carry Carry out the first request that the geographical position of bigger ctr value is sent, the higher priority of correspondence, in the situation of overload or burst overload Under, it is intended to obtain priority protection, this first request as needs to obtain the request of process in time it is impossible to the very first time is done and loses Abandon process.And then have in the case of overload or burst overload from the first request that the minimum geographical position of ctr value sends Abandoned by the very first time.These process are all the access server (servers as shown in Figure 1 in the application information processing system 11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty " Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One practical application In, first asks to be the request for advertising message, is generated after access control policy by advertisement flexible management system, will access control Strategy processed is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges ad-request Feature whether hit control strategy, if hit control strategy, according to the flexible percentage ratio parameter in access control policy Randomly choosed, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty result.Logical Cross this flexibility access control policy, background logic processing server collection can be ensured in the case that system burst request is too high The pressure remained steady of group, the treatment effect of Key advertisement position can be protected.
If described characteristic parameter can be inquired in described access control policy, choose corresponding described characteristic parameter Request response priority, is carried out at discarding stage by stage at least one first request described according to described request response priority Reason, as long as rather than find that being in overload then abandons newly-increased request without exception;If in described access control policy not Described characteristic parameter can be inquired, the extraction characteristic parameter miss access control strategy in the first request is described, this first Ask the request for inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus, Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will Request response priority processing strategy is defined as described access control policy.
1) it is based on advertisement position ecpm and generates described access control policy: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled 1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is, The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as 20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need Very important person is the control strategy of intervention decision-making higher level.
2) it is based on user profile and generate described access control policy.
Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province For dimension, ctr is by low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.Take total Measure as front p1 (as 10%) province as the first flexible stage, take total amount to be front p2 (as 20%) province as the second flexible rank Section, takes total amount to be front p3 (as 20%) province as the 3rd flexible stage.So as, the subsequently stair like control strategy pair according to this segmentation First request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user with being somebody's turn to do The described access control policy that information generates is compared.If abandoning more than 50% request, still at uncontrollable background logic Reason server cluster pressure, needs the artificial control strategy intervening decision-making higher level.
It is to be herein pointed out above-mentioned based on advertisement position ecpm, and based on user profile generate described access control plan Slightly, can be applied in combination, it is possible to use one of which.Degree of accuracy sieve request being abandoned due to the strategy based on user profile Choosing, its impact is than the strategy based on advertisement position greatly that is to say, that generate the side of described access control policy based on user profile Formula, its priority is less than the mode generating described access control policy based on advertisement position, therefore, when being applied in combination, elder generation and base Compare in the mode that user profile generates described access control policy, afterwards, described in conjunction with being generated based on user profile The mode of access control policy.And, if selecting any one, being preferably based on user profile and generating described access control policy Mode.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
In the embodiment of the present invention one embodiment, described receiving unit, it is further used for receiving access control policy, institute The create-rule stating access control policy includes: the source of described request is identified by the information bit that the first request is located, According to information, the information bit that described first request is located shows that the first acquired value of feedback is ranked up, generate sequence knot Really;According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings Answer priority, described access control policy is obtained according to described request response priority stage by stage.
In the embodiment of the present invention one embodiment, described server also includes: characteristic parameter determining unit, is used for: solution Separating out the identification information carrying in the first request is the information bit that the first request is located;The information bit that described first request is located It is defined as described characteristic parameter.
In the embodiment of the present invention one embodiment, described receiving unit, it is further used for receiving access control policy, institute The create-rule stating access control policy includes: rower is entered by the belonged to user profile of the first request in the source of described request Know, according to information, user profile belonged to for the described first request is shown that the second acquired value of feedback is ranked up, generate Ranking results;According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage Request response priority, obtains described access control policy according to described request response priority stage by stage.
In the embodiment of the present invention one embodiment, described server also includes: characteristic parameter determining unit, is used for: solution Separate out the user profile that the identification information carrying in described first request is belonged to by the first request;Described first request is returned The user profile belonging to is defined as described characteristic parameter.
In the embodiment of the present invention one embodiment, described discarding performance element, it is further used for: from described access control When inquiring the information bit that described first request is located in strategy, if the information bit that described first request is located corresponds to described visit Ask the request response priority of first stage in control strategy, then discard processing is carried out to the described first request, initiate to request It is empty feedback that side returns result;If the in the corresponding described access control policy of information bit that described first request is located The request response priority in x stage, described x is the positive integer more than 1, then according to current overload and executed discarding Process is judged, responds the discard processing stage by stage that executes successively of priority still when the request to prior to the x stage is detected When can not alleviate overload situations, the first request responding priority match for the request with the described xth stage is carried out at discarding Reason, returning result to request initiator is empty feedback.
Wherein, for the processor for data processing, when execution is processed, microprocessor, central authorities can be adopted Processor (cpu, central processing unit), digital signal processor (dsp, digital singnal Processor) or programmable logic array (fpga, field-programmable gate array) realize;For storage For medium, comprise operational order, this operational order can be computer-executable code, realizes by described operational order Each step in embodiments of the present invention information processing method flow process.
It need to be noted that: above is referred to the description of terminal server item, be similar with said method description, With the beneficial effect description of method, do not repeat.For the ins and outs not disclosed in terminal server embodiment of the present invention, Refer to the content described by embodiment of the inventive method flow process description.
Taking a real world applications scene as a example the embodiment of the present invention is described below:
As a example the control scene that conducts interviews for advertising platform, advertising platform serves hundred million grades of users, and daily access is total Amount reaches 10,000,000,000 ranks, so huge visit capacity, and request, if there is unusual fluctuations, can bring huge to background server Pressure, revenue losses may be directly resulted in.Advertising platform can process the flow under different advertisement positions in a large number, and different advertisement position Ecpm be different, if untreated by all overload request abandon it is clear that inadvisable it is therefore desirable to have more intelligent Access control policy is controlling flowing of access.For this problem, a kind of based on the overload protection scheme of sliding window it is: setting The sliding window of express time section, the request that the corresponding time period server of described sliding window record receives;Server receives During new request, the current load condition of request detection server that the server according to sliding window record receives, according to inspection Survey result to judge whether request is processed.Another kind based on the access control scheme of relief area is: when preservation network data Buffer area completely when, judge whether to abandon the network data receiving according to default drop policy;If it is judged that for not Abandon, then the network data of described reception is stored in described buffer area, replace original network data in described buffer area;To delay Deposit the network data in area to take out and first device transmission downwards.But, both schemes, its access control policy taken, It is all to abandon on individual server excessive request it is ensured that the normal service of individual server using various methods on microcosmic; Once overload, all can abandon regardless of request and be suppressed it is impossible to distinguish request for advertising scenarios, it appears granularity is thicker, And access control policy underaction.
For above-mentioned access control scene, using the embodiment of the present invention, in the case of overload, overall clothes can be ensured The stability of business and the treatment effect of Key advertisement position, it is to avoid ad-request is abandoned without exception in the case of an overload, the present embodiment System architecture in, be done on access server a kind of flexibility access control policy, as shown in fig. 6, this flexibility access control System strategy is generated by advertisement position flexible management system.The embodiment of the present invention carries out soft from service layer to the access of whole system Property control, by different advertisement positions request carry out differentiation process, control different requests to carry out special access by access server, Thus flexibility is carried out to whole system flow suppressing, ensure the treatment effect of Key advertisement position.The technical terms being related to includes: 1) Flexible: the availability of key service can be can guarantee that greatly to the greatest extent;2) ecpm:effective cost per mille, refer to is exactly every The advertising income that 1000 displayings can obtain;3) ctr:click-through rate, hits are divided by impression.
In the system architecture of Fig. 6, access control policy is generated by advertisement flexible management system, these strategies is pushed to and connects Enter server cluster.Access server cluster, after receiving front end ad-request, judges whether ad-request feature hits control Strategy, if hit control strategy, strategically in flexible percentage ratio parameter randomly choosed, be chosen to ask Ask, do not access background logic processing server and directly return empty result.By this flexibility access control policy, can be in system Ensure the pressure remained steady of background logic processing server cluster, the process of Key advertisement position in the case that burst request is too high Effect can be protected.
This access control policy is generated by advertisement position flexible management system.Including:
One, (sort to control the ad-request stream of preferred process according to advertisement position ecpm based on advertisement position generation strategy Amount).
Pull advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/total request * 1000. Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Flexible Control is step type Control, take total amount to be front p1 (as 10%) request as the first flexible stage, the data that is, first stage will abandon.The total amount is taken to be Front p2 (as 20%) is asked as the second flexible stage.Total amount is taken to be that front p3 (as 20%) asks as the 3rd flexible stage.
If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need artificial Jie Enter the control strategy of decision-making higher level.
Two, (sort to control the ad-request stream of preferred process according to user province ctr based on user profile generation strategy Amount).
Pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province for dimension Degree, ctr presses low to high sequence.Flexible Control is that step type controls, and takes total amount to be front p1 (as 10%) province as first Flexible stage, take total amount be front p2 (as 20%) province as the second flexible stage, take total amount be front p3 (as 20%) province make For the 3rd flexible stage.
Strategy based on user profile is bigger than the strategy based on advertisement position on income impact, so priority is less than based on wide Accuse the strategy of position.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need artificial The control strategy of intervention decision-making higher level.
It should be understood that disclosed equipment and method in several embodiments provided herein, can be passed through it Its mode is realized.Apparatus embodiments described above are only schematically, for example, the division of described unit, it is only A kind of division of logic function, actual can have other dividing mode, such as when realizing: multiple units or assembly can combine, or It is desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed each composition portion Coupling point each other or direct-coupling or communication connection can be the INDIRECT COUPLING of equipment or unit by some interfaces Or communication connection, can be electrical, machinery or other forms.
The above-mentioned unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place it is also possible to be distributed to multiple network lists In unit;The purpose to realize this embodiment scheme for the part or all of unit therein can be selected according to the actual needs.
In addition, can be fully integrated in a processing unit in each functional unit in various embodiments of the present invention, also may be used Be each unit individually as a unit it is also possible to two or more units are integrated in a unit;Above-mentioned Integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ the form that hardware adds SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can be passed through Completing, aforesaid program can be stored in a computer read/write memory medium the related hardware of programmed instruction, this program Upon execution, execute the step including said method embodiment;And aforesaid storage medium includes: movable storage device, read-only Memorizer (rom, read-only memory), random access memory (ram, random access memory), magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Or, if the above-mentioned integrated unit of the present invention is realized and as independent product using in the form of SFU software functional unit It is also possible to be stored in a computer read/write memory medium when selling or using.Based on such understanding, the present invention is implemented What the technical scheme of example substantially contributed to prior art in other words partly can be embodied in the form of software product, This computer software product is stored in a storage medium, including some instructions with so that a computer equipment is (permissible Personal computer, server or network equipment etc.) execution each embodiment methods described of the present invention all or part. And aforesaid storage medium includes: movable storage device, rom, ram, magnetic disc or CD etc. are various can be with store program codes Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.

Claims (12)

1. a kind of information access control method is it is characterised in that methods described includes:
Receive access control policy, described access control policy is to be divided generated request response according to the source of request Priority processing strategy;
Detect when being currently at overload, from least one receiving first request, extract characteristic parameter, described feature Parameter is used for characterizing originating or related to the source of described request of described request, and the source according to described request is divided into request The information bit being located and the user profile that belonged to of request;
Inquire about whether described characteristic parameter hits described access control policy;
If described characteristic parameter can be inquired in described access control policy, choose the request of corresponding described characteristic parameter Response priority, asks response priority to carry out discard processing stage by stage at least one first request described according to described; Otherwise, directly carry out discard processing.
2. method according to claim 1 is it is characterised in that described access control policy is to be carried out according to the source of request Divide generated request response priority processing strategy, comprising:
The source of described request is identified by the information bit that the first request is located, the information bit that the described first request is located Show that the first acquired value of feedback is ranked up according to information, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings Answer priority, described access control policy is obtained according to described request response priority stage by stage.
3. method according to claim 2 is it is characterised in that the identification information carrying in described first request includes first The information bit that request is located;
The information bit that described first request is located is defined as described characteristic parameter.
4. method according to claim 1 is it is characterised in that described access control policy is to be carried out according to the source of request Divide generated request response priority processing strategy, comprising:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is belonged to According to information, user profile shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, the request obtaining stage by stage rings Answer priority, described access control policy is obtained according to described request response priority stage by stage.
5. method according to claim 4 is it is characterised in that the identification information carrying in described first request includes first Ask belonged to user profile;
User profile belonged to for described first request is defined as described characteristic parameter.
If the method 6. according to claim 3 or 5 is it is characterised in that can inquire in described access control policy Described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, according to described request response priority pair At least one first request described carries out discard processing stage by stage, comprising:
When inquiring the information bit that described first request is located from described access control policy, if described first request is located The corresponding described access control policy of information bit in the first stage request response priority, then the described first request is lost Abandon process, returning result to request initiator is empty feedback;
If the request response in xth stage is preferential in the corresponding described access control policy of information bit that described first request is located Level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as detection To when the discard processing stage by stage that executes successively of priority being responded to the request prior to the x stage still can not alleviate overload situations, The first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns Result is empty feedback.
7. a kind of server is it is characterised in that described server includes:
Receiving unit, for receiving access control policy, described access control policy is to carry out dividing institute according to the source of request The request response priority processing strategy generating;
Detector unit, is used for detecting when being currently at overload, extracts feature from least one receiving first request Parameter, described characteristic parameter is used for characterizing originating or related to the source of described request, according to described request of described request Source be divided into the information bit that request is located and the user profile that belonged to of request;
Query unit, for inquiring about whether described characteristic parameter hits described access control policy;
Abandon performance element, if for described characteristic parameter can be inquired in described access control policy, choosing and correspond to The request response priority of described characteristic parameter, is carried out at least one first request described according to described request response priority Discard processing stage by stage;Otherwise, directly carry out discard processing.
8. server according to claim 7, it is characterised in that described receiving unit, is further used for receiving accessing and controls System strategy, the create-rule of described access control policy includes:
The source of described request is identified by the information bit that the first request is located, the information bit that the described first request is located Show that the first acquired value of feedback is ranked up according to information, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings Answer priority, described access control policy is obtained according to described request response priority stage by stage.
9. server according to claim 8 is it is characterised in that described server also includes: characteristic parameter determining unit, For:
Parse the information bit that the identification information carrying in the first request is that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
10. server according to claim 7, it is characterised in that described receiving unit, is further used for receiving accessing and controls System strategy, the create-rule of described access control policy includes:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is belonged to According to information, user profile shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, the request obtaining stage by stage rings Answer priority, described access control policy is obtained according to described request response priority stage by stage.
11. servers according to claim 10 are it is characterised in that described server also includes: characteristic parameter determines single Unit, is used for:
Parse the user profile that the identification information carrying in described first request is belonged to by the first request;
User profile belonged to for described first request is defined as described characteristic parameter.
12. servers according to claim 9 or 11, it is characterised in that described discarding performance element, are further used for:
When inquiring the information bit that described first request is located from described access control policy, if described first request is located The corresponding described access control policy of information bit in the first stage request response priority, then the described first request is lost Abandon process, returning result to request initiator is empty feedback;
If the request response in xth stage is preferential in the corresponding described access control policy of information bit that described first request is located Level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as detection To when the discard processing stage by stage that executes successively of priority being responded to the request prior to the x stage still can not alleviate overload situations, The first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns Result is empty feedback.
CN201610877186.8A 2016-09-30 2016-09-30 Information access control method, server and computer readable storage medium Active CN106357789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610877186.8A CN106357789B (en) 2016-09-30 2016-09-30 Information access control method, server and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610877186.8A CN106357789B (en) 2016-09-30 2016-09-30 Information access control method, server and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN106357789A true CN106357789A (en) 2017-01-25
CN106357789B CN106357789B (en) 2020-01-10

Family

ID=57866365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610877186.8A Active CN106357789B (en) 2016-09-30 2016-09-30 Information access control method, server and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN106357789B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590686A (en) * 2017-08-23 2018-01-16 北京奇艺世纪科技有限公司 A kind for the treatment of method and apparatus of ad-request
CN109391682A (en) * 2018-09-14 2019-02-26 联想(北京)有限公司 A kind of information processing method and server cluster
CN109918196A (en) * 2019-01-23 2019-06-21 深圳壹账通智能科技有限公司 Method for distributing system resource, device, computer equipment and storage medium
CN110971561A (en) * 2018-09-28 2020-04-07 阿里巴巴集团控股有限公司 Access request processing method, device and equipment
CN111835727A (en) * 2020-06-15 2020-10-27 中国电子科技集团公司第三十研究所 Method for realizing network access control based on CPU + FPGA + search engine platform
CN111966918A (en) * 2020-07-10 2020-11-20 口碑(上海)信息技术有限公司 Current limiting method, device and system for concurrent access requests
CN113765969A (en) * 2020-09-28 2021-12-07 北京沃东天骏信息技术有限公司 Flow control method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175152A1 (en) * 2006-12-28 2008-07-24 Nokia Corporation Service differentiating and overload indication for downlink
CN101305346A (en) * 2004-05-21 2008-11-12 Bea系统公司 System and method for application server with overload protection
CN101610494A (en) * 2008-06-16 2009-12-23 华为技术有限公司 Realize method, system and the equipment of overload control or differentiated service
CN104601725A (en) * 2015-02-03 2015-05-06 腾讯科技(深圳)有限公司 Service request response method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101305346A (en) * 2004-05-21 2008-11-12 Bea系统公司 System and method for application server with overload protection
US20080175152A1 (en) * 2006-12-28 2008-07-24 Nokia Corporation Service differentiating and overload indication for downlink
CN101610494A (en) * 2008-06-16 2009-12-23 华为技术有限公司 Realize method, system and the equipment of overload control or differentiated service
CN104601725A (en) * 2015-02-03 2015-05-06 腾讯科技(深圳)有限公司 Service request response method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107590686A (en) * 2017-08-23 2018-01-16 北京奇艺世纪科技有限公司 A kind for the treatment of method and apparatus of ad-request
CN109391682A (en) * 2018-09-14 2019-02-26 联想(北京)有限公司 A kind of information processing method and server cluster
CN110971561A (en) * 2018-09-28 2020-04-07 阿里巴巴集团控股有限公司 Access request processing method, device and equipment
CN110971561B (en) * 2018-09-28 2022-08-23 阿里巴巴集团控股有限公司 Access request processing method, device and equipment
CN109918196A (en) * 2019-01-23 2019-06-21 深圳壹账通智能科技有限公司 Method for distributing system resource, device, computer equipment and storage medium
CN111835727A (en) * 2020-06-15 2020-10-27 中国电子科技集团公司第三十研究所 Method for realizing network access control based on CPU + FPGA + search engine platform
CN111835727B (en) * 2020-06-15 2021-12-17 中国电子科技集团公司第三十研究所 Method for realizing network access control based on CPU + FPGA + search engine platform
CN111966918A (en) * 2020-07-10 2020-11-20 口碑(上海)信息技术有限公司 Current limiting method, device and system for concurrent access requests
CN111966918B (en) * 2020-07-10 2023-12-15 口碑(上海)信息技术有限公司 Current limiting method, device and system for concurrent access request
CN113765969A (en) * 2020-09-28 2021-12-07 北京沃东天骏信息技术有限公司 Flow control method and device

Also Published As

Publication number Publication date
CN106357789B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN106357789A (en) Information access control method and server
US11341510B2 (en) Determining client system attributes
US7974970B2 (en) Detection of undesirable web pages
CN100514330C (en) System and method for ranking search results based on tracked user preferences
US8332775B2 (en) Adaptive user feedback window
US8751470B1 (en) Context sensitive ranking
CN102609474B (en) A kind of visit information supplying method and system
US8214390B2 (en) Binary interest vector for better audience targeting
US8244578B2 (en) Methods and systems to facilitate keyword bid arbitrage with multiple advertisement placement providers
US9015414B2 (en) Load balancing based upon data usage
US20120054440A1 (en) Systems and methods for providing a hierarchy of cache layers of different types for intext advertising
KR20150130282A (en) Intelligent platform for real-time bidding
US8396746B1 (en) Privacy preserving personalized advertisement delivery system and method
US20110137904A1 (en) Clickstreams and website classification
CN105260913A (en) CTR estimation method and system, and DSP server used for Internet advertisement putting
CN103778125A (en) Webpage throwing content analyzing method and device and automatic throwing method and device for webpage throwing content
CN108512768B (en) Access amount control method and device
CN103544150B (en) For browser of mobile terminal provides the method and system of recommendation information
CN112561565A (en) User demand identification method based on behavior log
US10304081B1 (en) Yielding content recommendations based on serving by probabilistic grade proportions
US20240089177A1 (en) Heterogeneous Graph Clustering Using a Pointwise Mutual Information Criterion
CN104202418A (en) Method and system for recommending commercial content distribution network for content provider
CN103179152A (en) Business information issue method, system and business platform
CN111026981B (en) Visual display method, device and equipment for hot topics
CN108255868A (en) Check the method and apparatus linked in website

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant