CN106357789A - Information access control method and server - Google Patents
Information access control method and server Download PDFInfo
- Publication number
- CN106357789A CN106357789A CN201610877186.8A CN201610877186A CN106357789A CN 106357789 A CN106357789 A CN 106357789A CN 201610877186 A CN201610877186 A CN 201610877186A CN 106357789 A CN106357789 A CN 106357789A
- Authority
- CN
- China
- Prior art keywords
- request
- stage
- access control
- control policy
- characteristic parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
Abstract
The invention discloses an information access control method and a server, wherein the method comprises the following steps of receiving an access control strategy, wherein the access control strategy is a request response priority processing strategy generated through the division according to the request sources; when the condition that the current state is an overload state is detected, extracting feature parameters from at least one received first request, wherein the feature parameters are used for expressing the request sources or correlations to the request sources, and are divided into request located information position and request belonging user information according to the request sources; inquiring whether the feature parameters hit the access control strategy or not; if the feature parameters can be inquired in the access control strategy, selecting the request response priority corresponding to the feature parameters; performing staged abandoning processing on at least one first request according to the request response priority; otherwise, directly performing abandoning processing.
Description
Technical field
The present invention relates to information control technology, more particularly, to a kind of information access control method and server.
Background technology
Information transfer is that order or status information channel are sent to the other end, and the mistake being received by other side by one end
Journey, during information transfer in addition to point-to-point transmission means, most transmission means needs by the Internet
In server carry out transfer or information processing.If the carrying out that server is all made no exception to all of request is processed, can
Bring huge pressure to server itself, even if the present mostly this distributed system architecture of server cluster adopting,
With the substantial increase of user's requirements for access amount, remain on the problem that can not alleviate server load pressure.At present, in order to alleviate
The load pressure of server, can carry out discard processing for some access request, typically find the feelings that server has transshipped
Under condition, newly-increased access request is abandoned, the rigid process strategy that this overload just abandons without exception is very inadvisable, if newly
Increasing access request is the request that must process in time, then the service performance leading to whole information transmission system and steady is comprehended at this place
Qualitative bad, need one kind more flexibly to process strategy and access request is made a distinction and accesses processing controls.However, it is related
In technology, for this problem, there is no effective solution.
Content of the invention
In view of this, embodiments provide a kind of information access control method and server, solve at least existing
Problem with the presence of technology.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of information access control method of the embodiment of the present invention, methods described includes:
Receive access control policy, described access control policy is to be divided generated request according to the source of request
Response priority processing strategy;
Detect when being currently at overload, extract characteristic parameter from least one receiving first request, described
Characteristic parameter is used for characterizing originating or related to the source of described request of described request, and the source according to described request is divided into
Ask the user profile that the information bit being located and request are belonged to;
Inquire about whether described characteristic parameter hits described access control policy;
If described characteristic parameter can be inquired in described access control policy, choose corresponding described characteristic parameter
Request response priority, is carried out at discarding stage by stage at least one first request described according to described request response priority
Reason;Otherwise, directly carry out discard processing.
In such scheme, described access control policy is that to be divided generated request response according to the source of request excellent
First level processes strategy, comprising:
The source of described request is identified by the information bit that the first request is located, the letter that the described first request is located
According to information, breath position shows that the first acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, obtain stage by stage please
Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, the identification information carrying in described first request includes the information bit that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
In such scheme, described access control policy is that to be divided generated request response according to the source of request excellent
First level processes strategy, comprising:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is returned
According to information, the user profile belonging to shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage please
Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, the identification information carrying in described first request includes the user profile that the first request is belonged to;
User profile belonged to for described first request is defined as described characteristic parameter.
In such scheme, if described characteristic parameter can be inquired in described access control policy, choose corresponding institute
State the request response priority of characteristic parameter, according to described request response priority, at least one first request described is carried out point
The discard processing in stage, comprising:
When inquiring the information bit that described first request is located from described access control policy, if described first request
The request response priority of first stage in the corresponding described access control policy of information bit being located, then ask to described first into
Row discard processing, returning result to request initiator is empty feedback;
If the request response in xth stage is excellent in the corresponding described access control policy of information bit that described first request is located
First level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as inspection
Measure the discard processing stage by stage that the request response priority prior to the x stage is executed successively and still can not alleviate overload situations
When, the first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns
Returning result is empty feedback.
A kind of server of the embodiment of the present invention, described server includes:
Receiving unit, for receiving access control policy, described access control policy is to carry out drawing according to the source of request
Divide generated request response priority processing strategy;
Detector unit, is used for detecting when being currently at overload, extracts from least one receiving first request
Characteristic parameter, described characteristic parameter is used for characterizing originating or related to the source of described request, according to described of described request
The source of request is divided into the user profile that the information bit at request place and request are belonged to;
Query unit, for inquiring about whether described characteristic parameter hits described access control policy;
Abandon performance element, if for described characteristic parameter can be inquired in described access control policy, chosen
The request response priority of corresponding described characteristic parameter, according to described request response priority at least one first request described
Carry out discard processing stage by stage;Otherwise, directly carry out discard processing.
In such scheme, described receiving unit, it is further used for receiving access control policy, described access control policy
Create-rule includes:
The source of described request is identified by the information bit that the first request is located, the letter that the described first request is located
According to information, breath position shows that the first acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, obtain stage by stage please
Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, described server also includes: characteristic parameter determining unit, is used for:
Parse the information bit that the identification information carrying in the first request is that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
In such scheme, described receiving unit, it is further used for receiving access control policy, described access control policy
Create-rule includes:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is returned
According to information, the user profile belonging to shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage please
Seek response priority, described access control policy is obtained according to described request response priority stage by stage.
In such scheme, described server also includes: characteristic parameter determining unit, is used for:
Parse the user profile that the identification information carrying in described first request is belonged to by the first request;
User profile belonged to for described first request is defined as described characteristic parameter.
In such scheme, described discarding performance element, it is further used for:
When inquiring the information bit that described first request is located from described access control policy, if described first request
The request response priority of first stage in the corresponding described access control policy of information bit being located, then ask to described first into
Row discard processing, returning result to request initiator is empty feedback;
If the request response in xth stage is excellent in the corresponding described access control policy of information bit that described first request is located
First level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as inspection
Measure the discard processing stage by stage that the request response priority prior to the x stage is executed successively and still can not alleviate overload situations
When, the first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns
Returning result is empty feedback.
The information access control method of the embodiment of the present invention, comprising: receive access control policy, described access control policy
It is that generated request response priority processing strategy is divided according to the source of request;Detect and be currently at overload
When, from least one receiving first request extract characteristic parameter, characteristic parameter be used for characterize described request source or
Related to the source of described request, the source according to described request is divided into the user that the information bit at request place and request are belonged to
Information;Inquire about whether described characteristic parameter hits described access control policy;If can inquire about in described access control policy
To described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, according to described request response priority
At least one first request described is carried out with discard processing stage by stage;Otherwise, directly carry out discard processing.
Using the embodiment of the present invention, according to the access control policy of setting, access request is distinguished, found clothes
In the case that business device has transshipped, extract characteristic parameter from least one receiving first request, characteristic parameter is used for characterizing
Described request source or related to the source of described request, the source according to described request be divided into request place information bit
And the user profile that request is belonged to;Inquire about whether described characteristic parameter hits described access control policy;If in described visit
Ask and described characteristic parameter in control strategy, can be inquired, then choose the request response priority of corresponding described characteristic parameter, according to
Described request response priority carries out discard processing stage by stage at least one first request described;Otherwise, directly lost
Abandon process.It can be seen that, in the case of finding that server transshipped, it is associating according to access request and access control policy, no
It is the rigid process strategy that newly-increased access request is abandoned without exception, but preferential fraction is responded according to the request of access control policy
Stage carries out discard processing, thus improve service performance and the stability of whole information transmission system.
Brief description
Fig. 1 is the schematic diagram of each side's hardware entities carrying out information exchange in the embodiment of the present invention;
Fig. 2 is the method flowchart of the embodiment of the present invention one;
Fig. 3 is the method flowchart of the embodiment of the present invention two;
Fig. 4 is the method flowchart of the embodiment of the present invention three;
Fig. 5 is that the system of the embodiment of the present invention five forms structural representation;
Fig. 6 is the system architecture schematic diagram of the application embodiment of the present invention one scene.
Specific embodiment
Enforcement to technical scheme is described in further detail below in conjunction with the accompanying drawings.
Realize the mobile terminal of each embodiment of the present invention referring now to Description of Drawings.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being conducive to the explanation of the embodiment of the present invention,
Itself does not have specific meaning.Therefore, " module " and " part " can mixedly use.
In the following detailed description, set forth numerous details, thoroughly to understand the present invention.But, for
It is clear that the present invention can be put into practice in the case of there is no these details for those of ordinary skill in the art.In other feelings
Under condition, not known method, process, assembly, circuit and network disclosed in detailed description, to avoid unnecessarily making embodiment
Various aspects are smudgy.
Although in addition, be employed many times herein term " first ", " second " etc. come to describe various elements (or various threshold value or
Various applications or various instructions or various operation) etc., but these elements (or threshold value or application or instruction or operation) should not be subject to
The restriction of these terms.These terms be only intended to distinguish an element (or threshold value or application or instruction or operation) and another
Element (or threshold value or application or instruction or operation).For example, the first operation can be referred to as the second operation, and the second operation can also
It is referred to as the first operation, without deviating from the scope of the present invention, the first operation and the second operation are all operations, and simply the two is not
Identical operates.
Step in the embodiment of the present invention is not necessarily processed according to described sequence of steps, can be according to need
Ask and selectively step is upset rearrangement, or delete the step in embodiment, or increase the step in embodiment, the present invention
Step description in embodiment is optional sequential combination, does not represent all sequence of steps combinations of the embodiment of the present invention,
Sequence of steps in embodiment is not construed as limiting the invention.
Term "and/or" in the embodiment of the present invention refers to including one or more of associated listed items
Any and whole possible combinations.It may also be noticed that: where used in this disclosure, "comprises/comprising" is specified and is stated
The presence of feature, integer, step, operation, element and/or assembly, but it is not excluded for other features one or more, integer, step
Suddenly, the presence of operation, element and/or assembly and/or their group or interpolation.
Intelligent terminal's (as mobile terminal) of the embodiment of the present invention can implement in a variety of manners.For example, the present invention is real
Apply the mobile terminal described in example can include such as mobile phone, smart phone, notebook computer, digit broadcasting receiver,
Personal digital assistant (pda, personal digital assistant), panel computer (pad), portable media player
The mobile terminal of (pmp, portable media player), guider etc. and digital tv, desk computer etc.
Deng fixed terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, use except special
Outside the element of mobile purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the schematic diagram of each side's hardware entities carrying out information exchange in the embodiment of the present invention, and Fig. 1 includes: service
Device 11, terminal unit 21-24, server 31 server 41;Terminal unit passes through cable network or wireless network and service
Device carries out information exchange, and terminal unit includes the types such as mobile phone, desktop computer, pc machine, all-in-one.Using the embodiment of the present invention, whole
End equipment 21-24 sends the first request, such as ad-request, and server 31 divides generation request response in advance according to the source of request
Priority processing strategy, using this request response priority processing strategy as access control policy, send access control policy to
Server 11, so that server 11 makes a distinction to request according to this access control policy, is carried out to request in the case of an overload
Selectively Access Control.Server 41 is the request processing server of background logic layer, carries out selectively in server 11
After Access Control, the pending request of the reception server 11 transparent transmission.Server 11 execution processes logic, wherein, is processing logic
In s1, detect when being currently at overload, from least one receiving first request, extract characteristic parameter, and access control
System strategy compares, and inquires about whether described characteristic parameter hits described access control policy.In processing logic s2, if described
Described characteristic parameter can be inquired in access control policy, then choose the request response priority of corresponding described characteristic parameter, root
Response priority is asked to carry out discard processing stage by stage at least one first request described according to described, as long as rather than finding
It is in overload and then abandon newly-increased request without exception;If failing to inquire described feature ginseng in described access control policy
Number, the extraction characteristic parameter miss access control strategies in illustrate to ask first, this first is asked as inessential timely place
The request of reason, abandons under overload without exception, if server 11 also has memory capacity it is also possible to this request is saved in clothes
In the caching of business device 11, wait that to check be currently non-overloaded situation, then the first request is processed.It need to be noted that
It is, the extraction characteristic parameter hit access control strategy in the first request, but the request being abandoned stage by stage according to priority,
If server 11 also has memory capacity it is also possible to be saved in this request in the caching of server 11, wait to check and be currently
Non-overloaded situation, then the first request is processed.
The example of above-mentioned Fig. 1 simply realizes a system architecture example of the embodiment of the present invention, and the embodiment of the present invention is not
It is limited to the system structure described in above-mentioned Fig. 1, based on the system architecture described in above-mentioned Fig. 1, propose each embodiment of the inventive method.
A kind of information access control method of the embodiment of the present invention, as shown in Fig. 2 methods described includes:
Step 101, server receive access control policy, and described access control policy is to carry out drawing according to the source of request
Divide generated request response priority processing strategy.
Here, for this access control policy that the source of request generates sign request response processing priority, its
One, an example is, when for advertisement position ecpm generation strategy, will advertisement position to be ranked up according to ecpm.Now, first
Ad spot information (being to come for identifying this corresponding advertisement of the first request) is comprised from which advertisement position, due to every in request
Individual advertisement position can bring the value of ecpm, and different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates
The formula of ecpm is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that by
More concerns, that is to say, that first being asked from what the advertisement position that can bring bigger ecpm value sent, correspond to higher preferential
Level, in the case of overload or burst overload, is intended to obtain priority protection, and this first request as needs to be processed in time
Request it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped
Or have to be abandoned by the very first time in the case of burst overload.These process are all the accesses in the application information processing system
Server (server 11 as shown in Figure 1) is judged and discard processing.Be dropped, then can be to before sending the first request
End returns the feedback that implementing result is " empty ", and that is, access server returns empty result to front end;If not abandoned, by first
Request passes through the logical process server (server 41 as shown in Figure 1) on backstage, carries out corresponding process to the first request.
Here, for this access control policy that the source of request generates sign request response processing priority, its
Two, an example is, when based on user profile generation strategy, will advertisement position according to the user position such as province, city, area, county, street
Confidence breath is ranked up.Now, the geographical location information comprising user in the first request is (corresponding for identifying this first request
Advertisement is to come from which province, city, area, county, street), because each request is from the geographical position institute energy of different dimensions
Bring the value of ctr different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can carry
Carry out the first request that the geographical position of bigger ctr value is sent, the higher priority of correspondence, in the situation of overload or burst overload
Under, it is intended to obtain priority protection, this first request as needs to obtain the request of process in time it is impossible to the very first time is done and loses
Abandon process.And then have in the case of overload or burst overload from the first request that the minimum geographical position of ctr value sends
Abandoned by the very first time.These process are all the access server (servers as shown in Figure 1 in the application information processing system
11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty "
Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage
Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Step 102, server detect when being currently at overload, extract from least one receiving first request
Characteristic parameter.
Here, this feature parameter is used for characterizing originating or related to the source of described request, according to institute of described request
The source stating request is divided into the user profile that the information bit at request place and request are belonged to.
Described in step 103, server lookup, whether characteristic parameter hits described access control policy, if it is, execution
Step 104;Otherwise, execution step 106.
Step 104, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng
The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality
In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will
Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide
Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy
Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot
Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high
The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 105, the discarding at least one first request described being carried out stage by stage according to described request response priority
Process.
Step 106, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 102-106, if can inquire described characteristic parameter in described access control policy, it is right to choose
Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into
Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described
Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described
Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus,
Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control
System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will
Request response priority processing strategy is defined as described access control policy.
1) it is based on advertisement position ecpm and generates described access control policy: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled
1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy
For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is,
The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as
20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request
Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm
Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need
Very important person is the control strategy of intervention decision-making higher level.
2) it is based on user profile and generate described access control policy.
Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province
For dimension, ctr is by low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.Take total
Measure as front p1 (as 10%) province as the first flexible stage, take total amount to be front p2 (as 20%) province as the second flexible rank
Section, takes total amount to be front p3 (as 20%) province as the 3rd flexible stage.So as, the subsequently stair like control strategy pair according to this segmentation
First request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user with being somebody's turn to do
The described access control policy that information generates is compared.If abandoning more than 50% request, still at uncontrollable background logic
Reason server cluster pressure, needs the artificial control strategy intervening decision-making higher level.
It is to be herein pointed out above-mentioned based on advertisement position ecpm, and based on user profile generate described access control plan
Slightly, can be applied in combination, it is possible to use one of which.Degree of accuracy sieve request being abandoned due to the strategy based on user profile
Choosing, its impact is than the strategy based on advertisement position greatly that is to say, that generate the side of described access control policy based on user profile
Formula, its priority is less than the mode generating described access control policy based on advertisement position, therefore, when being applied in combination, elder generation and base
Compare in the mode that user profile generates described access control policy, afterwards, described in conjunction with being generated based on user profile
The mode of access control policy.And, if selecting any one, being preferably based on user profile and generating described access control policy
Mode.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses
Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic
Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene
Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system
System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow
Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
A kind of information access control method of the embodiment of the present invention, as shown in figure 3, methods described includes:
Step 201, the source of described request are identified by the information bit that the first request is located, and described first is asked
According to information, the information bit being located shows that the first acquired value of feedback is ranked up, generate ranking results.
Here, the first value of feedback can be ecpm, and ecpm refers to: the advertising income that every 1,000 displayings can obtain, and show
Unit can be webpage, advertising unit, even single advertisement.Under default situations, what ecpm referred to is all thousand web page display
Income.
Step 202, according to information, described ranking results are shown that the first acquired feedback total amount is divided, divided
The request response priority in stage, obtains described access control policy according to described request response priority stage by stage.
Here, when according to information, described ranking results being shown that the first acquired feedback total amount is divided, employing
It is to be divided according to percentage ratio, then obtain percentage ratio parameter.This percentage ratio stochastic parameter selects, and the request being chosen to is not visited
Ask background logic processing server, the implementing result being directly returned as sky is to front end.As so that access control plan is generated based on ecpm
Slightly example, is step type control, takes total amount to be that front p1 (as 10%) asks as the first flexible stage, that is, the first stage will
The data abandoning.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Total amount is taken to be front p3 (as 20%) request
As the 3rd flexible stage.
Here, when for advertisement position ecpm generation strategy, will advertisement position be ranked up according to ecpm.Now, first
Ad spot information (being to come for identifying this corresponding advertisement of the first request) is comprised from which advertisement position, due to every in request
Individual advertisement position can bring the value of ecpm, and different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates
The formula of ecpm is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that by
More concerns, that is to say, that first being asked from what the advertisement position that can bring bigger ecpm value sent, correspond to higher preferential
Level, in the case of overload or burst overload, is intended to obtain priority protection, and this first request as needs to be processed in time
Request it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped
Or have to be abandoned by the very first time in the case of burst overload.These process are all the accesses in the application information processing system
Server (server 11 as shown in Figure 1) is judged and discard processing.Be dropped, then can be to before sending the first request
End returns the feedback that implementing result is " empty ", and that is, access server returns empty result to front end;If not abandoned, by first
Request passes through the logical process server (server 41 as shown in Figure 1) on backstage, carries out corresponding process to the first request.
Step 203, server detect when being currently at overload, receive at least one first request, at least one
The identification information carrying in first request includes the information bit that the first request is located, and the information bit that the described first request is located is true
It is set to described characteristic parameter, extract this feature parameter.
Here, this feature parameter is used for characterizing the source of described request or related to the source of described request, can be by
Source according to described request is divided into the user profile that the information bit at request place and request are belonged to, and is specially institute in the present embodiment
State the information bit that the first request is located.
Described in step 204, server lookup, whether characteristic parameter hits described access control policy, if it is, execution
Step 205;Otherwise, execution step 207.
Step 205, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng
The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality
In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will
Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide
Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy
Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot
Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high
The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 206, the discarding at least one first request described being carried out stage by stage according to described request response priority
Process.
Step 207, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 203-207, if can inquire described characteristic parameter in described access control policy, it is right to choose
Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into
Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described
Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described
Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus,
Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control
System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will
Request response priority processing strategy is defined as described access control policy.Described access control plan is generated based on advertisement position ecpm
Slightly: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled
1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy
For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is,
The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as
20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request
Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm
Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need
Very important person is the control strategy of intervention decision-making higher level.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses
Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic
Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene
Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system
System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow
Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
A kind of information access control method of the embodiment of the present invention, as shown in figure 4, methods described includes:
Step 301, the source of described request are identified, by described first by the belonged to user profile of the first request
Ask belonged to user profile to show that the second acquired value of feedback is ranked up according to information, generate ranking results.
Here, the second value of feedback can be ctr, and ctr refers to ad click rate, carry out in a search engine after input key word
Search, then is arranged out related webpage by the factor such as bid, then user can select oneself interested in order
Website click on, using all for website search number of times out as total degree, user is clicked on and enters website
Number of times accounts for the ratio of total degree clicking rate.The ctr of the embodiment of the present invention be according to customer position information, country, province, city, area,
County, street etc. assessing, pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with
Province is dimension, and ctr presses low to high sequence.
Step 302, according to information, described ranking results are shown that the second acquired feedback total amount is divided, divided
The request response priority in stage, obtains described access control policy according to described request response priority stage by stage.
Here, when according to information, described ranking results being shown that the second acquired feedback total amount is divided, employing
It is to be divided according to percentage ratio, then obtain percentage ratio parameter.This percentage ratio stochastic parameter selects, and the request being chosen to is not visited
Ask background logic processing server, the implementing result being directly returned as sky is to front end.So that described visit is generated based on user profile
As a example asking control strategy, it is the stair like control strategy of segmentation.Total amount is taken to be that front p1 (as 10%) province, as the first flexible stage, takes
Total amount takes total amount to be front p3 (as 20%) province as the 3rd flexible rank for front p2 (as 20%) province as the second flexible stage
Section.
Here, for this access control policy that the source of request generates sign request response processing priority, one
Individual example is, when based on user profile generation strategy, will believe according to customer locations such as province, city, area, county, streets advertisement position
Breath is ranked up.Now, the geographical location information comprising user in the first request is (for identifying this corresponding advertisement of the first request
It is to come from which province, city, area, county, street), because each request can bring from the geographical position of different dimensions
The value of ctr is different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can bring more
The first request that the geographical position of big ctr value is sent, the higher priority of correspondence, in the case of overload or burst overload,
It is intended to obtain priority protection, this first request as needs to obtain the request processing in time it is impossible to be abandoned by the very first time
Process.And from the minimum geographical position of ctr value send first request then overload or burst overload in the case of have to by
The very first time abandons.These process are all the access server (servers as shown in Figure 1 in the application information processing system
11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty "
Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage
Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Step 303, server detect when being currently at overload, receive at least one first request, at least one
The identification information carrying in first request includes the user profile that the first request is belonged to, by user's letter belonged to for the first request
Breath is defined as described characteristic parameter, extracts this feature parameter.
Here, this feature parameter is used for characterizing the source of described request or related to the source of described request, can be by
Source according to described request is divided into the user profile that the information bit at request place and request are belonged to, and is specially institute in the present embodiment
State the user profile that the first request is belonged to, such as user's geographical location information.
Described in step 304, server lookup, whether characteristic parameter hits described access control policy, if it is, execution
Step 305;Otherwise, execution step 307.
Step 305, described characteristic parameter can be inquired in described access control policy, then choose correspondence described feature ginseng
The request response priority of number.
Here, request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One reality
In the application of border, first asks to be the request for advertising message, generates after access control policy by advertisement flexible management system, will
Access control policy is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges wide
Whether the feature accusing request hits control strategy, if hit control strategy, according to the flexible percentage in access control policy
Randomly choosed than parameter, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty knot
Really.By this flexibility access control policy, can ensure that background logic processes clothes in the case that system burst request is too high
The pressure remained steady of business device cluster, the treatment effect of Key advertisement position can be protected.
Step 306, the discarding at least one first request described being carried out stage by stage according to described request response priority
Process.
Step 307, fail to inquire described characteristic parameter in described access control policy, directly carry out discard processing.
By step 303-307, if can inquire described characteristic parameter in described access control policy, it is right to choose
Should described characteristic parameter request response priority, according to described request response priority to described at least one first ask into
Row discard processing stage by stage, as long as rather than find that being in overload then abandons newly-increased request without exception;If described
Fail in access control policy to inquire described characteristic parameter, the extraction characteristic parameter miss access in the first request is described
Control strategy, this first request asking as inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus,
Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control
System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will
Request response priority processing strategy is defined as described access control policy, generates described access control plan based on user profile
Slightly.Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province for dimension
Degree, ctr presses low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.The total amount is taken to be
Front p1 (as 10%) province, as the first flexible stage, takes total amount to be that front p2 (as 20%) province, as the second flexible stage, takes
Total amount is front p3 (as 20%) province as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is to first
Request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user profile with being somebody's turn to do
The described access control policy generating is compared.If abandoning more than 50% request, still uncontrollable background logic processes clothes
Business device cluster pressure, needs the artificial control strategy intervening decision-making higher level.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses
Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic
Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene
Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system
System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow
Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
Based on above-described embodiment, in a kind of information access control method of the embodiment of the present invention, if accessing control described
Described characteristic parameter can be inquired in system strategy, then choose the request response priority of corresponding described characteristic parameter, according to described
Request response priority carries out discard processing stage by stage at least one first request described, comprising: 1) access control from described
When inquiring the information bit that described first request is located in system strategy, if the information bit that described first request is located is corresponding described
In access control policy, the request response priority of first stage, then carry out discard processing to the described first request, send out to request
Playing side and returning result is empty feedback.2) if the information bit that described first request is located corresponds to described access control policy
The request response priority in middle xth stage, described x is the positive integer more than 1, then according to current overload and executed
Discard processing is judged, responds, when the request to prior to the x stage is detected, the discard processing stage by stage that priority executes successively
When still can not alleviate overload situations, the first request responding priority match for the request with the described xth stage is lost
Abandon process, returning result to request initiator is empty feedback.3) if during discard processing stage by stage, do not held
The request of row discard processing passes through the logical process server on backstage, carries out phase by logical process server to the first request
Should, and corresponding service feedback is provided.Such as, current overload, will meet the first stage according to access control policy
After the request " request a1 " of request response priority carries out screening discarding, for other, the not screened request matching is carried out
Biography is processed, and the request " request a2 ... an " not being performed discard processing passes through the logical process server on backstage, by logic
Processing server is carried out accordingly to the first request, and provides corresponding service feedback.
The message reference control system of the embodiment of the present invention, as shown in figure 5, include terminal 51, access server 61, strategy
Generate server 71, logical process server 81;Wherein, access server 61 includes: receiving unit 611, accesses for receiving
Control strategy, described access control policy is to be divided generated request response priority processing plan according to the source of request
Slightly;Detector unit 612, is used for detecting when being currently at overload, extracts special from least one receiving first request
Levy parameter, described characteristic parameter is used for characterizing originating or related to the source of described request of described request, asks according to described
The source asked is divided into the user profile that the information bit at request place and request are belonged to;Query unit 613, for inquiring about described spy
Levy whether parameter hits described access control policy;Abandon performance element 614, if for energy in described access control policy
Inquire described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, excellent according to described request response
First level carries out discard processing stage by stage at least one first request described;Otherwise, directly carry out discard processing.
For this access control policy that the source of request generates sign request response processing priority, first, one
Individual example is, when for advertisement position ecpm generation strategy, will advertisement position to be ranked up according to ecpm.Now, the first request
In comprise ad spot information (for identify this first request corresponding advertisement be from which advertisement position come), because each is wide
Accuse position to bring the value of ecpm different (value of ecpm is relevant with advertisement position income data and request amount, and one calculates ecpm's
Formula is: ecpm=total income/total request * 1000), accordingly, it is capable to bring bigger ecpm value advertisement position may require that more
Paying close attention to the first request that is to say, that being sent from the advertisement position that can bring bigger ecpm value, corresponding to higher priority,
Transship or happen suddenly in the case of overload, be intended to obtain priority protection, this first request as needs to obtain asking of process in time
Ask it is impossible to discard processing is done by the very first time.And the first request sending from the minimum advertisement position of ecpm value is then being transshipped or is being dashed forward
Have to be abandoned by the very first time in the case of sending out overload.These process are all the access services in the application information processing system
Device (server 11 as shown in Figure 1) is judged and discard processing.It is dropped, then can return to the front end sending the first request
Return the feedback that implementing result is " empty ", that is, access server returns empty result to front end;If not abandoned, first is asked
Pass through the logical process server (server 41 as shown in Figure 1) on backstage, corresponding process is carried out to the first request.
Here, for this access control policy that the source of request generates sign request response processing priority, its
Two, an example is, when based on user profile generation strategy, will advertisement position according to the user position such as province, city, area, county, street
Confidence breath is ranked up.Now, the geographical location information comprising user in the first request is (corresponding for identifying this first request
Advertisement is to come from which province, city, area, county, street), because each request is from the geographical position institute energy of different dimensions
Bring the value of ctr different, accordingly, it is capable to bring the request of bigger ctr value to may require that and more paid close attention to that is to say, that from can carry
Carry out the first request that the geographical position of bigger ctr value is sent, the higher priority of correspondence, in the situation of overload or burst overload
Under, it is intended to obtain priority protection, this first request as needs to obtain the request of process in time it is impossible to the very first time is done and loses
Abandon process.And then have in the case of overload or burst overload from the first request that the minimum geographical position of ctr value sends
Abandoned by the very first time.These process are all the access server (servers as shown in Figure 1 in the application information processing system
11) judged and discard processing.It is dropped, then can return implementing result to the front end sending the first request is the anti-of " empty "
Feedback, that is, the empty result of access server return is to front end;If not abandoned, the first request is passed through the logical process on backstage
Server (server 41 as shown in Figure 1), carries out corresponding process to the first request.
Request response priority can carry out treatment by stages mark using flexible percentage ratio parameter.One practical application
In, first asks to be the request for advertising message, is generated after access control policy by advertisement flexible management system, will access control
Strategy processed is pushed to access server cluster.Access server cluster, after receiving the ad-request of front end, judges ad-request
Feature whether hit control strategy, if hit control strategy, according to the flexible percentage ratio parameter in access control policy
Randomly choosed, the ad-request being chosen to, do not accessed the logical process server on backstage, directly returned empty result.Logical
Cross this flexibility access control policy, background logic processing server collection can be ensured in the case that system burst request is too high
The pressure remained steady of group, the treatment effect of Key advertisement position can be protected.
If described characteristic parameter can be inquired in described access control policy, choose corresponding described characteristic parameter
Request response priority, is carried out at discarding stage by stage at least one first request described according to described request response priority
Reason, as long as rather than find that being in overload then abandons newly-increased request without exception;If in described access control policy not
Described characteristic parameter can be inquired, the extraction characteristic parameter miss access control strategy in the first request is described, this first
Ask the request for inessential timely process, abandon under overload without exception.
Above-mentioned discard processing stage by stage, the accuracy that it is processed depends on how to generate access control policy, thus,
Under overload situations, server just can make a distinction to the access request that front end sends according to this access control policy and access control
System.
In a practical application, divided according to the source of request, generated request response priority processing strategy, will
Request response priority processing strategy is defined as described access control policy.
1) it is based on advertisement position ecpm and generates described access control policy: advertisement position is ranked up according to ecpm.
Advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/always ask * can be pulled
1000.Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Described access control policy
For Flexible Control mechanism, it is the stair like control strategy of segmentation.Take total amount be front p1 (as 10%) request as the first flexible stage, that is,
The data that first stage will abandon.Total amount is taken to be that front p2 (as 20%) asks as the second flexible stage.Take total amount be front p3 (such as
20%) request is as the 3rd flexible stage.So that subsequently the stair like control strategy according to this segmentation is carried out at discarding to the first request
Reason, when the characteristic parameter comprising in the first request is advertisement position, by itself and the described access that should be generated based on advertisement position ecpm
Control strategy is compared.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need
Very important person is the control strategy of intervention decision-making higher level.
2) it is based on user profile and generate described access control policy.
Can pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province
For dimension, ctr is by low to high sequence.Described access control policy is Flexible Control mechanism, is the stair like control strategy of segmentation.Take total
Measure as front p1 (as 10%) province as the first flexible stage, take total amount to be front p2 (as 20%) province as the second flexible rank
Section, takes total amount to be front p3 (as 20%) province as the 3rd flexible stage.So as, the subsequently stair like control strategy pair according to this segmentation
First request carries out discard processing, when the characteristic parameter comprising in the first request is user profile, it is based on user with being somebody's turn to do
The described access control policy that information generates is compared.If abandoning more than 50% request, still at uncontrollable background logic
Reason server cluster pressure, needs the artificial control strategy intervening decision-making higher level.
It is to be herein pointed out above-mentioned based on advertisement position ecpm, and based on user profile generate described access control plan
Slightly, can be applied in combination, it is possible to use one of which.Degree of accuracy sieve request being abandoned due to the strategy based on user profile
Choosing, its impact is than the strategy based on advertisement position greatly that is to say, that generate the side of described access control policy based on user profile
Formula, its priority is less than the mode generating described access control policy based on advertisement position, therefore, when being applied in combination, elder generation and base
Compare in the mode that user profile generates described access control policy, afterwards, described in conjunction with being generated based on user profile
The mode of access control policy.And, if selecting any one, being preferably based on user profile and generating described access control policy
Mode.
Using this discard processing stage by stage of the embodiment of the present invention, it is different from prior art, existing computer accesses
Control strategy, is all to abandon on individual server excessive request it is ensured that individual server using various methods on microcosmic
Normal service;Once overload, all can abandon regardless of request without exception.And the embodiment of the present invention, it is to come area for request scene
Point request, and decision-making finally whether request to be abandoned, carry out flexible control from service layer to the access of whole access control system
System, different requests are carried out differentiation process, control different requests to carry out special access, thus carrying out to whole system flow
Flexibility is suppressed, and ensures the processing accuracy of crucial request.In the case of ensureing that system is available, degree of accuracy and treatment effeciency are higher.
In the embodiment of the present invention one embodiment, described receiving unit, it is further used for receiving access control policy, institute
The create-rule stating access control policy includes: the source of described request is identified by the information bit that the first request is located,
According to information, the information bit that described first request is located shows that the first acquired value of feedback is ranked up, generate sequence knot
Really;According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings
Answer priority, described access control policy is obtained according to described request response priority stage by stage.
In the embodiment of the present invention one embodiment, described server also includes: characteristic parameter determining unit, is used for: solution
Separating out the identification information carrying in the first request is the information bit that the first request is located;The information bit that described first request is located
It is defined as described characteristic parameter.
In the embodiment of the present invention one embodiment, described receiving unit, it is further used for receiving access control policy, institute
The create-rule stating access control policy includes: rower is entered by the belonged to user profile of the first request in the source of described request
Know, according to information, user profile belonged to for the described first request is shown that the second acquired value of feedback is ranked up, generate
Ranking results;According to information, described ranking results are shown that the second acquired feedback total amount is divided, obtain stage by stage
Request response priority, obtains described access control policy according to described request response priority stage by stage.
In the embodiment of the present invention one embodiment, described server also includes: characteristic parameter determining unit, is used for: solution
Separate out the user profile that the identification information carrying in described first request is belonged to by the first request;Described first request is returned
The user profile belonging to is defined as described characteristic parameter.
In the embodiment of the present invention one embodiment, described discarding performance element, it is further used for: from described access control
When inquiring the information bit that described first request is located in strategy, if the information bit that described first request is located corresponds to described visit
Ask the request response priority of first stage in control strategy, then discard processing is carried out to the described first request, initiate to request
It is empty feedback that side returns result;If the in the corresponding described access control policy of information bit that described first request is located
The request response priority in x stage, described x is the positive integer more than 1, then according to current overload and executed discarding
Process is judged, responds the discard processing stage by stage that executes successively of priority still when the request to prior to the x stage is detected
When can not alleviate overload situations, the first request responding priority match for the request with the described xth stage is carried out at discarding
Reason, returning result to request initiator is empty feedback.
Wherein, for the processor for data processing, when execution is processed, microprocessor, central authorities can be adopted
Processor (cpu, central processing unit), digital signal processor (dsp, digital singnal
Processor) or programmable logic array (fpga, field-programmable gate array) realize;For storage
For medium, comprise operational order, this operational order can be computer-executable code, realizes by described operational order
Each step in embodiments of the present invention information processing method flow process.
It need to be noted that: above is referred to the description of terminal server item, be similar with said method description,
With the beneficial effect description of method, do not repeat.For the ins and outs not disclosed in terminal server embodiment of the present invention,
Refer to the content described by embodiment of the inventive method flow process description.
Taking a real world applications scene as a example the embodiment of the present invention is described below:
As a example the control scene that conducts interviews for advertising platform, advertising platform serves hundred million grades of users, and daily access is total
Amount reaches 10,000,000,000 ranks, so huge visit capacity, and request, if there is unusual fluctuations, can bring huge to background server
Pressure, revenue losses may be directly resulted in.Advertising platform can process the flow under different advertisement positions in a large number, and different advertisement position
Ecpm be different, if untreated by all overload request abandon it is clear that inadvisable it is therefore desirable to have more intelligent
Access control policy is controlling flowing of access.For this problem, a kind of based on the overload protection scheme of sliding window it is: setting
The sliding window of express time section, the request that the corresponding time period server of described sliding window record receives;Server receives
During new request, the current load condition of request detection server that the server according to sliding window record receives, according to inspection
Survey result to judge whether request is processed.Another kind based on the access control scheme of relief area is: when preservation network data
Buffer area completely when, judge whether to abandon the network data receiving according to default drop policy;If it is judged that for not
Abandon, then the network data of described reception is stored in described buffer area, replace original network data in described buffer area;To delay
Deposit the network data in area to take out and first device transmission downwards.But, both schemes, its access control policy taken,
It is all to abandon on individual server excessive request it is ensured that the normal service of individual server using various methods on microcosmic;
Once overload, all can abandon regardless of request and be suppressed it is impossible to distinguish request for advertising scenarios, it appears granularity is thicker,
And access control policy underaction.
For above-mentioned access control scene, using the embodiment of the present invention, in the case of overload, overall clothes can be ensured
The stability of business and the treatment effect of Key advertisement position, it is to avoid ad-request is abandoned without exception in the case of an overload, the present embodiment
System architecture in, be done on access server a kind of flexibility access control policy, as shown in fig. 6, this flexibility access control
System strategy is generated by advertisement position flexible management system.The embodiment of the present invention carries out soft from service layer to the access of whole system
Property control, by different advertisement positions request carry out differentiation process, control different requests to carry out special access by access server,
Thus flexibility is carried out to whole system flow suppressing, ensure the treatment effect of Key advertisement position.The technical terms being related to includes: 1)
Flexible: the availability of key service can be can guarantee that greatly to the greatest extent;2) ecpm:effective cost per mille, refer to is exactly every
The advertising income that 1000 displayings can obtain;3) ctr:click-through rate, hits are divided by impression.
In the system architecture of Fig. 6, access control policy is generated by advertisement flexible management system, these strategies is pushed to and connects
Enter server cluster.Access server cluster, after receiving front end ad-request, judges whether ad-request feature hits control
Strategy, if hit control strategy, strategically in flexible percentage ratio parameter randomly choosed, be chosen to ask
Ask, do not access background logic processing server and directly return empty result.By this flexibility access control policy, can be in system
Ensure the pressure remained steady of background logic processing server cluster, the process of Key advertisement position in the case that burst request is too high
Effect can be protected.
This access control policy is generated by advertisement position flexible management system.Including:
One, (sort to control the ad-request stream of preferred process according to advertisement position ecpm based on advertisement position generation strategy
Amount).
Pull advertisement position income data and the request amount of nearest n days (as 7 days), ecpm=total income/total request * 1000.
Exclude daily request amount advertisement position in m (as 1,000,000) below, ecpm presses low to high sequence.Flexible Control is step type
Control, take total amount to be front p1 (as 10%) request as the first flexible stage, the data that is, first stage will abandon.The total amount is taken to be
Front p2 (as 20%) is asked as the second flexible stage.Total amount is taken to be that front p3 (as 20%) asks as the 3rd flexible stage.
If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need artificial Jie
Enter the control strategy of decision-making higher level.
Two, (sort to control the ad-request stream of preferred process according to user province ctr based on user profile generation strategy
Amount).
Pull nearest n days (as 7 days) generation the user profile of ad click and overall exposing data, with province for dimension
Degree, ctr presses low to high sequence.Flexible Control is that step type controls, and takes total amount to be front p1 (as 10%) province as first
Flexible stage, take total amount be front p2 (as 20%) province as the second flexible stage, take total amount be front p3 (as 20%) province make
For the 3rd flexible stage.
Strategy based on user profile is bigger than the strategy based on advertisement position on income impact, so priority is less than based on wide
Accuse the strategy of position.If abandoning more than 50% request, still uncontrollable background logic processing server cluster pressure, need artificial
The control strategy of intervention decision-making higher level.
It should be understood that disclosed equipment and method in several embodiments provided herein, can be passed through it
Its mode is realized.Apparatus embodiments described above are only schematically, for example, the division of described unit, it is only
A kind of division of logic function, actual can have other dividing mode, such as when realizing: multiple units or assembly can combine, or
It is desirably integrated into another system, or some features can be ignored, or do not execute.In addition, shown or discussed each composition portion
Coupling point each other or direct-coupling or communication connection can be the INDIRECT COUPLING of equipment or unit by some interfaces
Or communication connection, can be electrical, machinery or other forms.
The above-mentioned unit illustrating as separating component can be or may not be physically separate, show as unit
The part showing can be or may not be physical location, you can with positioned at a place it is also possible to be distributed to multiple network lists
In unit;The purpose to realize this embodiment scheme for the part or all of unit therein can be selected according to the actual needs.
In addition, can be fully integrated in a processing unit in each functional unit in various embodiments of the present invention, also may be used
Be each unit individually as a unit it is also possible to two or more units are integrated in a unit;Above-mentioned
Integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ the form that hardware adds SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can be passed through
Completing, aforesaid program can be stored in a computer read/write memory medium the related hardware of programmed instruction, this program
Upon execution, execute the step including said method embodiment;And aforesaid storage medium includes: movable storage device, read-only
Memorizer (rom, read-only memory), random access memory (ram, random access memory), magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Or, if the above-mentioned integrated unit of the present invention is realized and as independent product using in the form of SFU software functional unit
It is also possible to be stored in a computer read/write memory medium when selling or using.Based on such understanding, the present invention is implemented
What the technical scheme of example substantially contributed to prior art in other words partly can be embodied in the form of software product,
This computer software product is stored in a storage medium, including some instructions with so that a computer equipment is (permissible
Personal computer, server or network equipment etc.) execution each embodiment methods described of the present invention all or part.
And aforesaid storage medium includes: movable storage device, rom, ram, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by described scope of the claims.
Claims (12)
1. a kind of information access control method is it is characterised in that methods described includes:
Receive access control policy, described access control policy is to be divided generated request response according to the source of request
Priority processing strategy;
Detect when being currently at overload, from least one receiving first request, extract characteristic parameter, described feature
Parameter is used for characterizing originating or related to the source of described request of described request, and the source according to described request is divided into request
The information bit being located and the user profile that belonged to of request;
Inquire about whether described characteristic parameter hits described access control policy;
If described characteristic parameter can be inquired in described access control policy, choose the request of corresponding described characteristic parameter
Response priority, asks response priority to carry out discard processing stage by stage at least one first request described according to described;
Otherwise, directly carry out discard processing.
2. method according to claim 1 is it is characterised in that described access control policy is to be carried out according to the source of request
Divide generated request response priority processing strategy, comprising:
The source of described request is identified by the information bit that the first request is located, the information bit that the described first request is located
Show that the first acquired value of feedback is ranked up according to information, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings
Answer priority, described access control policy is obtained according to described request response priority stage by stage.
3. method according to claim 2 is it is characterised in that the identification information carrying in described first request includes first
The information bit that request is located;
The information bit that described first request is located is defined as described characteristic parameter.
4. method according to claim 1 is it is characterised in that described access control policy is to be carried out according to the source of request
Divide generated request response priority processing strategy, comprising:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is belonged to
According to information, user profile shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, the request obtaining stage by stage rings
Answer priority, described access control policy is obtained according to described request response priority stage by stage.
5. method according to claim 4 is it is characterised in that the identification information carrying in described first request includes first
Ask belonged to user profile;
User profile belonged to for described first request is defined as described characteristic parameter.
If the method 6. according to claim 3 or 5 is it is characterised in that can inquire in described access control policy
Described characteristic parameter, then choose the request response priority of corresponding described characteristic parameter, according to described request response priority pair
At least one first request described carries out discard processing stage by stage, comprising:
When inquiring the information bit that described first request is located from described access control policy, if described first request is located
The corresponding described access control policy of information bit in the first stage request response priority, then the described first request is lost
Abandon process, returning result to request initiator is empty feedback;
If the request response in xth stage is preferential in the corresponding described access control policy of information bit that described first request is located
Level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as detection
To when the discard processing stage by stage that executes successively of priority being responded to the request prior to the x stage still can not alleviate overload situations,
The first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns
Result is empty feedback.
7. a kind of server is it is characterised in that described server includes:
Receiving unit, for receiving access control policy, described access control policy is to carry out dividing institute according to the source of request
The request response priority processing strategy generating;
Detector unit, is used for detecting when being currently at overload, extracts feature from least one receiving first request
Parameter, described characteristic parameter is used for characterizing originating or related to the source of described request, according to described request of described request
Source be divided into the information bit that request is located and the user profile that belonged to of request;
Query unit, for inquiring about whether described characteristic parameter hits described access control policy;
Abandon performance element, if for described characteristic parameter can be inquired in described access control policy, choosing and correspond to
The request response priority of described characteristic parameter, is carried out at least one first request described according to described request response priority
Discard processing stage by stage;Otherwise, directly carry out discard processing.
8. server according to claim 7, it is characterised in that described receiving unit, is further used for receiving accessing and controls
System strategy, the create-rule of described access control policy includes:
The source of described request is identified by the information bit that the first request is located, the information bit that the described first request is located
Show that the first acquired value of feedback is ranked up according to information, generate ranking results;
According to information, described ranking results are shown that the first acquired feedback total amount is divided, the request obtaining stage by stage rings
Answer priority, described access control policy is obtained according to described request response priority stage by stage.
9. server according to claim 8 is it is characterised in that described server also includes: characteristic parameter determining unit,
For:
Parse the information bit that the identification information carrying in the first request is that the first request is located;
The information bit that described first request is located is defined as described characteristic parameter.
10. server according to claim 7, it is characterised in that described receiving unit, is further used for receiving accessing and controls
System strategy, the create-rule of described access control policy includes:
The source of described request is identified by the belonged to user profile of the first request, and the described first request is belonged to
According to information, user profile shows that the second acquired value of feedback is ranked up, generate ranking results;
According to information, described ranking results are shown that the second acquired feedback total amount is divided, the request obtaining stage by stage rings
Answer priority, described access control policy is obtained according to described request response priority stage by stage.
11. servers according to claim 10 are it is characterised in that described server also includes: characteristic parameter determines single
Unit, is used for:
Parse the user profile that the identification information carrying in described first request is belonged to by the first request;
User profile belonged to for described first request is defined as described characteristic parameter.
12. servers according to claim 9 or 11, it is characterised in that described discarding performance element, are further used for:
When inquiring the information bit that described first request is located from described access control policy, if described first request is located
The corresponding described access control policy of information bit in the first stage request response priority, then the described first request is lost
Abandon process, returning result to request initiator is empty feedback;
If the request response in xth stage is preferential in the corresponding described access control policy of information bit that described first request is located
Level, described x is the positive integer more than 1, then judged according to current overload and executed discard processing, work as detection
To when the discard processing stage by stage that executes successively of priority being responded to the request prior to the x stage still can not alleviate overload situations,
The first request responding priority match for the request with the described xth stage carries out discard processing, and to request, initiator returns
Result is empty feedback.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610877186.8A CN106357789B (en) | 2016-09-30 | 2016-09-30 | Information access control method, server and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610877186.8A CN106357789B (en) | 2016-09-30 | 2016-09-30 | Information access control method, server and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106357789A true CN106357789A (en) | 2017-01-25 |
CN106357789B CN106357789B (en) | 2020-01-10 |
Family
ID=57866365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610877186.8A Active CN106357789B (en) | 2016-09-30 | 2016-09-30 | Information access control method, server and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106357789B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107590686A (en) * | 2017-08-23 | 2018-01-16 | 北京奇艺世纪科技有限公司 | A kind for the treatment of method and apparatus of ad-request |
CN109391682A (en) * | 2018-09-14 | 2019-02-26 | 联想(北京)有限公司 | A kind of information processing method and server cluster |
CN109918196A (en) * | 2019-01-23 | 2019-06-21 | 深圳壹账通智能科技有限公司 | Method for distributing system resource, device, computer equipment and storage medium |
CN110971561A (en) * | 2018-09-28 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Access request processing method, device and equipment |
CN111835727A (en) * | 2020-06-15 | 2020-10-27 | 中国电子科技集团公司第三十研究所 | Method for realizing network access control based on CPU + FPGA + search engine platform |
CN111966918A (en) * | 2020-07-10 | 2020-11-20 | 口碑(上海)信息技术有限公司 | Current limiting method, device and system for concurrent access requests |
CN113765969A (en) * | 2020-09-28 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Flow control method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080175152A1 (en) * | 2006-12-28 | 2008-07-24 | Nokia Corporation | Service differentiating and overload indication for downlink |
CN101305346A (en) * | 2004-05-21 | 2008-11-12 | Bea系统公司 | System and method for application server with overload protection |
CN101610494A (en) * | 2008-06-16 | 2009-12-23 | 华为技术有限公司 | Realize method, system and the equipment of overload control or differentiated service |
CN104601725A (en) * | 2015-02-03 | 2015-05-06 | 腾讯科技(深圳)有限公司 | Service request response method and device |
-
2016
- 2016-09-30 CN CN201610877186.8A patent/CN106357789B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101305346A (en) * | 2004-05-21 | 2008-11-12 | Bea系统公司 | System and method for application server with overload protection |
US20080175152A1 (en) * | 2006-12-28 | 2008-07-24 | Nokia Corporation | Service differentiating and overload indication for downlink |
CN101610494A (en) * | 2008-06-16 | 2009-12-23 | 华为技术有限公司 | Realize method, system and the equipment of overload control or differentiated service |
CN104601725A (en) * | 2015-02-03 | 2015-05-06 | 腾讯科技(深圳)有限公司 | Service request response method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107590686A (en) * | 2017-08-23 | 2018-01-16 | 北京奇艺世纪科技有限公司 | A kind for the treatment of method and apparatus of ad-request |
CN109391682A (en) * | 2018-09-14 | 2019-02-26 | 联想(北京)有限公司 | A kind of information processing method and server cluster |
CN110971561A (en) * | 2018-09-28 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Access request processing method, device and equipment |
CN110971561B (en) * | 2018-09-28 | 2022-08-23 | 阿里巴巴集团控股有限公司 | Access request processing method, device and equipment |
CN109918196A (en) * | 2019-01-23 | 2019-06-21 | 深圳壹账通智能科技有限公司 | Method for distributing system resource, device, computer equipment and storage medium |
CN111835727A (en) * | 2020-06-15 | 2020-10-27 | 中国电子科技集团公司第三十研究所 | Method for realizing network access control based on CPU + FPGA + search engine platform |
CN111835727B (en) * | 2020-06-15 | 2021-12-17 | 中国电子科技集团公司第三十研究所 | Method for realizing network access control based on CPU + FPGA + search engine platform |
CN111966918A (en) * | 2020-07-10 | 2020-11-20 | 口碑(上海)信息技术有限公司 | Current limiting method, device and system for concurrent access requests |
CN111966918B (en) * | 2020-07-10 | 2023-12-15 | 口碑(上海)信息技术有限公司 | Current limiting method, device and system for concurrent access request |
CN113765969A (en) * | 2020-09-28 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Flow control method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106357789B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106357789A (en) | Information access control method and server | |
US11341510B2 (en) | Determining client system attributes | |
US7974970B2 (en) | Detection of undesirable web pages | |
CN100514330C (en) | System and method for ranking search results based on tracked user preferences | |
US8332775B2 (en) | Adaptive user feedback window | |
US8751470B1 (en) | Context sensitive ranking | |
CN102609474B (en) | A kind of visit information supplying method and system | |
US8214390B2 (en) | Binary interest vector for better audience targeting | |
US8244578B2 (en) | Methods and systems to facilitate keyword bid arbitrage with multiple advertisement placement providers | |
US9015414B2 (en) | Load balancing based upon data usage | |
US20120054440A1 (en) | Systems and methods for providing a hierarchy of cache layers of different types for intext advertising | |
KR20150130282A (en) | Intelligent platform for real-time bidding | |
US8396746B1 (en) | Privacy preserving personalized advertisement delivery system and method | |
US20110137904A1 (en) | Clickstreams and website classification | |
CN105260913A (en) | CTR estimation method and system, and DSP server used for Internet advertisement putting | |
CN103778125A (en) | Webpage throwing content analyzing method and device and automatic throwing method and device for webpage throwing content | |
CN108512768B (en) | Access amount control method and device | |
CN103544150B (en) | For browser of mobile terminal provides the method and system of recommendation information | |
CN112561565A (en) | User demand identification method based on behavior log | |
US10304081B1 (en) | Yielding content recommendations based on serving by probabilistic grade proportions | |
US20240089177A1 (en) | Heterogeneous Graph Clustering Using a Pointwise Mutual Information Criterion | |
CN104202418A (en) | Method and system for recommending commercial content distribution network for content provider | |
CN103179152A (en) | Business information issue method, system and business platform | |
CN111026981B (en) | Visual display method, device and equipment for hot topics | |
CN108255868A (en) | Check the method and apparatus linked in website |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |