CN106372992A - Access control method and access control device - Google Patents

Access control method and access control device Download PDF

Info

Publication number
CN106372992A
CN106372992A CN201610792114.3A CN201610792114A CN106372992A CN 106372992 A CN106372992 A CN 106372992A CN 201610792114 A CN201610792114 A CN 201610792114A CN 106372992 A CN106372992 A CN 106372992A
Authority
CN
China
Prior art keywords
user
access
identifying code
access control
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610792114.3A
Other languages
Chinese (zh)
Inventor
姜峰
夏智卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV eCommerce Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV eCommerce Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV eCommerce Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610792114.3A priority Critical patent/CN106372992A/en
Publication of CN106372992A publication Critical patent/CN106372992A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Abstract

The invention belongs to the network technology field and discloses an access control method and an access control device. The method comprises steps that access operation of a user is responded, the access times of the user within a preset period is acquired, when the access times within the preset period is detected to arrive the preset access times, access operation of the user surpassing the preset access times is limited. Through the method, the access times of the user within the preset period is detected, access operation of the user is limited to control an access volume of the user, so a problem of increase of the access volume within the preset period is solved.

Description

Access control method and access control apparatus
Technical field
The invention belongs to networking technology area, more particularly, to a kind of access control method and access control apparatus.
Background technology
Competition with electric business industry is increasing, and various network marketing means also emerge in an endless stream, and a lot of businessmans are in order to declare Pass the commodity of oneself, through attracting client frequently with some low price panic buying activities, such as: the unitary second kills, a folding limitation is rushed to purchase etc. Deng.
Because the commodity price in panic buying activity is well below market price, so in low price panic buying activity, being frequently encountered by Panic buying user constantly clicks on panic buying button and more rushes to purchase chances to obtain, or cattle party uses software to increase access times, Thus obtain going on the razzle-dazzle, user constantly clicks on panic buying operation or cattle party and is easily caused clothes using software increase access times The loading of business device increases.
Effective method is there is no to prevent user from increasing visit capacity using software and obtaining and go on the razzle-dazzle at present.
Content of the invention
The invention provides a kind of access control method and access control apparatus are visited it is intended to solving user and using software to increase The amount of asking thus increase website loading problem.
Embodiments provide a kind of access control method, comprising:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit and exceed The operation that the described user of described preset access times accesses.
The embodiment of the present invention additionally provides a kind of access control apparatus, comprising:
Number of times acquiring unit, for the operation accessing in response to user, obtains access times in during cycle for the user;
Operation limiting unit, reaches preset access for access times in during cycle for the described user is detected After number of times, then limit and exceed the operation that the described user of described preset access times accesses.
Knowable to the embodiments of the present invention, the present invention passes through to detect access times in during cycle for the user, and right User access operation limited to control the visit capacity of user, with this reach control during cycle in visit capacity increase ask Topic.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this Some embodiments of invention, for those skilled in the art, without having to pay creative labor, can also root Obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is a kind of structured flowchart of mobile terminal.
A kind of flow chart of access control method that Fig. 2 provides for the embodiment of the present invention one.
A kind of flow chart of access control method that Fig. 3 provides for the embodiment of the present invention two.
A kind of flow chart of access control method that Fig. 4 provides for the embodiment of the present invention three.
A kind of flow chart of access control method that Fig. 5 provides for the embodiment of the present invention four.
A kind of flow chart of access control method that Fig. 6 provides for the embodiment of the present invention five.
A kind of structural representation of access control apparatus that Fig. 7 provides for the embodiment of the present invention six.
A kind of structural representation of access control apparatus that Fig. 8 provides for the embodiment of the present invention seven.
A kind of structural representation of access control apparatus that Fig. 9 provides for the embodiment of the present invention eight.
A kind of structural representation of access control apparatus that Figure 10 provides for the embodiment of the present invention nine.
A kind of structural representation of access control apparatus that Figure 11 provides for the embodiment of the present invention ten.
Specific embodiment
For enabling the goal of the invention of the present invention, feature, advantage more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, is clearly and completely described the reality it is clear that described to the technical scheme in the embodiment of the present invention Applying example is only a part of embodiment of the present invention, and not all embodiments.Based on the embodiment in the present invention, people in the art The every other embodiment that member is obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
Fig. 1 shows a kind of structured flowchart of mobile terminal.Access control method provided in an embodiment of the present invention can be applied In mobile terminal 10 as shown in Figure 1, mobile terminal 10 can be, but not limited to including: need to rely on battery maintain normal run and The smart mobile phone of support network and download function, notebook, panel computer etc..
As shown in figure 1, mobile terminal 10 includes memorizer 101, storage control 102, one or more (in figure only illustrates One) processor 103, Peripheral Interface 104, radio-frequency module 105, key-press module 106, audio-frequency module 107 and Touch Screen 108.These assemblies are mutually communicated by one or more communication bus/holding wire 109.
It is appreciated that the structure shown in Fig. 1 is only illustrating, it does not cause to the structure of mobile terminal to limit.Mobile whole End 10 may also include the assembly more or more less than shown in Fig. 1, or has the configurations different from shown in Fig. 1.Shown in Fig. 1 Each assembly can be realized using hardware, software or a combination thereof.
Memorizer 101 can be used for storing software program and module, the such as method of the access control in the embodiment of the present invention And the corresponding programmed instruction/module of device, processor 103 is by running software program and the mould being stored in memorizer 101 Block, thus executing various function application and data processing, that is, realizes the method that above-mentioned mobile terminal 10 nullifies application program.
Memorizer 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memorizer 101 can further include The memorizer remotely located with respect to processor 103, these remote memories can be by network connection to mobile terminal 10.On The example stating network includes but is not limited to the Internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 103 And other possible assemblies can be carried out to the access of memorizer 101 under the control of storage control 102.
Various input/output devices are coupled to cpu and memorizer 101 by Peripheral Interface 104.Processor 103 runs and deposits Various softwares in reservoir 101, instruction are to execute the various functions of mobile terminal 10 and to carry out data processing.
In certain embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used for receiving and sends electromagnetic wave, realizes the mutual conversion of electromagnetic wave and the signal of telecommunication, thus with Communication network or other equipment are communicated.Radio-frequency module 105 may include the various existing electricity for executing these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (sim) card, Memorizer etc..Radio-frequency module 105 can with various networks for example the Internet, intranet, preset type wireless network carry out Communication or the wireless network by preset type are communicated with other equipment.The wireless network of above-mentioned preset type can wrap Include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can use various communications Standard, agreement and technology, including but not limited to global system for mobile communications (global system for mobile Communication, gsm), enhancement mode mobile communication technology (enhanced data gsm environment, edge), wide Band CDMA (wideband code division multiple access, w-cdma), CDMA (code division access, cdma), tdma (time division multiple access, tdma), Bluetooth, adopting wireless fidelity technology (wireless-fidelity, wifi) is (as IEEE-USA's standard ieee 802.11a, ieee 802.11b, ieee802.11g and/or ieee 802.11n), the networking telephone (voice over Internet protocal, voip), worldwide interoperability for microwave accesses (worldwide interoperability for Microwave access, wi-max), other are used for the agreement of mail, instant messaging and short message, and any other is suitable Communications protocol.
Key-press module 106 provides the interface that inputted to mobile terminal of user, user can by press different by Key is so that mobile terminal 10 executes different functions.
Audio-frequency module 107 provides a user with audio interface, and it may include one or more mikes, one or more raises Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 104, and voice data is converted to electrical information, Electrical information is transmitted to speaker.Electrical information is converted to the sound wave that human ear can be heard by speaker.Voicefrequency circuit is also from mike Place receive electrical information, convert electrical signals to voice data, and by data transmission in network telephony to Peripheral Interface 104 to enter traveling one The process of step.Voice data can be obtained at memorizer 101 or by radio-frequency module 105.Additionally, voice data can also Store to memorizer 101 or be transmitted by radio-frequency module 105.In some instances, audio-frequency module 107 may also include Hole broadcast by one earphone, for providing audio interface to earphone or other equipment.
Touch Screen 108 provides an output and inputting interface between mobile terminal and user simultaneously.Specifically, touch-control Screen 108 displays to the user that video frequency output, and the content of these video frequency output may include word, figure, video and its any group Close.Some output results correspond to some user interface object.The input of Touch Screen 108 also receive user, such as user Click, the gesture operation such as slip so that user interface object responds to the input of these users.Detection user input Technology can be based on resistance-type, condenser type or other arbitrarily possible touch control detection technology.Touch Screen 108 display unit Instantiation include but is not limited to liquid crystal display or light emitting polymer displays.
Fig. 2 shows a kind of access control method that first embodiment of the invention provides, comprising:
S101, the operation accessing in response to user, obtain access times in during cycle for the user.
User can access the website providing the second to kill commodity using mobile terminal or using computer end.When user is in commodity Also do not start before the second kills or rush to purchase, when this website is conducted interviews, access control apparatus are by the access of real-time detection user Operation, obtains access times in during cycle for the user.The operation that user accesses includes entering buyer's guide page browsing commodity Introduce content, click on and check commodity parameter or refresh panic buying page etc..In a particular application, the operation that user accesses can also be After commodity start panic buying, user uses click to rush to purchase button in computer end, or in mobile terminal finger touch Click on panic buying button etc., be all considered as the operation accessing.Being simultaneous for user uses externally hung software to increase the behavior of click volume, works as inspection When measuring the interface access panic buying interface of externally hung software and triggering panic buying operation, will be regarded as this user and there is access operation.Preset Cycle can be configured according to practical situation, can with 1 second as a cycle, or be such as within one minute a cycle.
S102, after access times in during cycle for the described user is detected and reach preset access times, then limits System exceedes the operation that the described user of described preset access times accesses.
After obtaining access times in during cycle for the user, access control apparatus are detecting user in during cycle After interior access times reach preset access times, it will limited according to preset control model and exceed preset access times The operation that user afterwards accesses.Specifically, if during cycle is 1 second, preset access times are three times, in 1 second before Access all accessed control device of operation for three times to allow and enter follow-up process, such as panic buying process or other processes.Work as visit Ask that control device detects user when internal trigger in 1 second accesses operation 5 times, can be by the operation of the 4th and the 5th according to preset Control model is limited.Preset control model be directly refusal the 4th and the 5th access operation, do not allow the 4th and The access of the 5th is operated into subsequent processes or is delayed, by delay mode, the operation that the 4th and the 5th access To next cycle, can also be other control models.It is not limited herein.
In the present embodiment, after access times in during cycle for the user is detected and exceed preset access times, The operation exceeding the access of the user after preset access times will be limited.The present embodiment is reached by the access times limiting user To the problem mitigating server load amount, pass through to limit the access times of user simultaneously, to reach control cattle party and to use software To increase the problem of visit capacity, can make commonly to rush to purchase user and cattle party possesses same panic buying chance.It is to be understood that In the present embodiment, limit a during cycle in user exceed preset access times access operation, do not affect user under Access operation in a cycle, but after as user, the access times in next cycle exceed preset access times, will The access operation of user equally can be limited.
Present invention also offers second embodiment as shown in Figure 3, a kind of access control method includes:
S201, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset Access times in cycle.
In this step, specifically can be limited for different situations, such as when user in same terminal logs in not When same account carries out brush ticket or is rushed to purchase, can be according to Internet protocol address (ip, the internet of the terminal of user Protocol address), obtain access times in during cycle for this Internet protocol address, when user is using different During the same account of terminal landing, access times in during cycle for the account can be obtained.
S202, after access times in during cycle for the described user is detected and reach preset access times, then limits System exceedes the operation that the described user of described preset access times accesses.
S203, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to Limit in list.
In this step, when user is detected after the access times in during cycle exceed preset access times, This user is classified as restriction object, and the Internet protocol address of the terminal that the account of this user or this user are used preserves To restriction list.In a particular application, the account by this user or this user of nginx+lua development technique can be adopted The Internet protocol address of the terminal using is synchronized in existing restriction list, in the present embodiment, limits list and is equivalent to Digital dictionary, lua can be write by standard c language and form, and code is succinct, can be in no operating system and operating platform It is compiled, run.
The present embodiment passes through to obtain the account or Internet protocol address of the user access times in during cycle, comes Determine whether to list this user in restriction object, if access times in during cycle for this user exceed preset access times Afterwards, access control apparatus will be classified as this user as restriction object, and the account of user or Internet protocol address are preserved To limiting in list, so that follow-up restriction operation.
Because in actual applications, when user's using terminal, being rushed to purchase including mobile terminal or computer end or snapped When, normal users all obtain access qualification using the manual mode clicked on, and therefore can in the light of actual conditions arrange a visit Ask frequency, restriction object is determined with this access frequency.As when user is gone on the razzle-dazzle, 3 typically can be realized in 1 second Secondary visit capacity, therefore can set the access frequency of user as 3 times/second, when detect the model essay frequency of user more than 3 times/ During the second, then by user setup for limiting object, and the account of user or Internet protocol address are preserved to restriction list.
Present invention also offers the 3rd embodiment shown in Fig. 4, a kind of access control method, comprising:
S301, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset Access times in cycle.
S302, after access times in during cycle for the described user is detected and reach preset access times, then limits System exceedes the operation that the described user of described preset access times accesses.
S303, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to Limit in list.
S304, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
When commodity start to snap or rush to purchase, access control apparatus snap operation by real-time detection user's, and obtain The accounts information of user or Internet protocol address.When commodity start to rush to purchase or snap, because user's snaps operation, clothes The visit capacity of business device will increase moment, in order to mitigate the loading of server, can first the access operation to user judge, Access control apparatus will carry out subsequent operation according to judged result.
S305, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search Location.
Limit list and can add index in the account or Internet protocol address of user during preserving, work as access Control device according to the account of user or Internet protocol address limit make a look up in list when, can be come by index Determine and limit account or the Internet protocol address with the presence or absence of this user in list.
S306, if existing, snaps operation according to what preset control model limited described user, if not existing, will The operation of snapping of described user is set to effectively.
In this step, after judging to limit account or the Internet protocol address that there is this user in list, press Snap operation according to what preset control model limited this user, although that is, user triggers and snaps operation, this snaps operation Will be unable to immediately enter follow-up process of snapping, access control apparatus will limit snapping of this user according to preset control model Operation.
In the present embodiment, access control apparatus are provided with lock (key), when access control apparatus are searched in limiting list To after the account or Internet protocol of user, the operation of snapping of this user will be locked it is necessary to pass through preset unlocking manner Follow-up carrying out could be entered after being unlocked.Just can be allowed to after operation unlocks execute subsequent processes in snapping of user, that is, When user is after snapping the accessed control device of operation and be set to effectively, this user snap operation just can be allowed to enter snap into Journey.And when user is after snapping operation and be asserted, this user snaps operation and will be endowed an identification information, this mark Information by allow user snap operation can only be performed predetermined times within the valid period.Operation of snapping as user is set to After effectively, in preset effective time, user can enter follow-up queuing process or payment process, effective when exceeding this After time, user snap operation will be set to be set to invalid.By the present embodiment, when user is snapped, access control Device processed can judge to the account of user or Internet protocol address, when this user is to limit object, will be according to Preset control model limits the panic buying of this user or snaps behavior, to ensure the panic buying chance of common snapper-up, simultaneously Server can be prevented and lead to loading to increase because of the unexpected increase of visit capacity.
Present invention also offers fourth embodiment as shown in Figure 5, a kind of access control method, comprising:
S401, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset Access times in cycle.
S402, after access times in during cycle for the described user is detected and reach preset access times, then limits System exceedes the operation that the described user of described preset access times accesses.
S403, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to Limit in list.
S404, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
S405, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search Location.
S406, if existing, ejects identifying code input frame, described identifying code input frame is in order to point out user input identifying code.
Determine that finding user in limiting list participates in the account snapped or the internet protocol using the terminal snapped Behind view address, access control apparatus will snap being predisposed to ejecting identifying code input frame, the input of described identifying code of interface Frame will be prompted to user according to showing in identifying code input frame that identifying code inserts corresponding content.In the present embodiment, identifying code can With using pure digi-tal identifying code, it would however also be possible to employ alphabetical identifying code or numeral and alphabetical combination.
S407, obtains the identifying code of user input, by the identifying code of described user input and described identifying code input frame The checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, output prompting Message, described prompting message re-enters identifying code in order to point out user.
In this step, the identifying code of user input is judged, after the identifying code judging user input is correct, will use The operation of snapping at family is set to effectively, makes user can enter follow-up process of snapping, such as ranks, places an order, pays the bill, if using The identifying code of family input is incorrect, will point out user input identifying code again.
S408, if not existing, the operation of snapping of described user is set to effectively.
In the present embodiment, to limit user in the form of identifying code and enter and follow-up to snap process, by limiting user Enter follow-up process of snapping and reduce the server problem that loading increases because moment visit capacity increases to reach.Need to note Meaning, in the present embodiment, access control apparatus use identifying code input frame to show identifying code, make user defeated according to identifying code Enter the mode of the identifying code input content in frame and snap operation to limit user, but in a particular application, but note is tested Card, transmission verbal messages make user complete the checking such as picture mosaic according to the information input checking content in speech message, dragging pattern Mode, is not limited herein.
Present invention also offers the 5th embodiment as shown in Figure 6, a kind of access control method, comprising:
S501, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset Access times in cycle.
S502, after access times in during cycle for the described user is detected and reach preset access times, then limits System exceedes the operation that the described user of described preset access times accesses.
S503, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to Limit in list.
S504, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
S505, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search Location;
S506, if exist, by described user snap operation be set to invalid, if not existing, by robbing of described user Clap operation to be set to effectively.
In the present embodiment, when the internet protocol of the account finding user in restricted list or the terminal of user's use Behind view address, the operation of snapping of this user direct is set to invalid, the operation of snapping refusing this user is subsequently carried out.This reality Applying example can effectively prevent such as cattle party, or increases the robbing of user that visit capacity reaches panic buying chance using software Purchase behavior, it also avoid server simultaneously and asks because moment visit capacity leads to loading to increase machine of delaying causing etc. in increase Topic.
In above-described embodiment provided in an embodiment of the present invention, by detecting the access times of user come restricting user access Operation, when user access operation limited after, will be unable to enter subsequent processes, or postpone enter subsequent processes. It should be noted that in the above-described embodiments, it is invalid that the operation of user is set to, and refers to access control apparatus and use is being detected During the operation at family, first accessing of detection user operates the condition whether meeting entrance subsequent processes, and the standard of judgement is user Whether access times reach the account of preset access times or this user or the Internet protocol address of the terminal of use It is in limiting list, when the operation of user does not meet the condition entering subsequent processes, the operation of this user will be rejected, Server will be unable to receive the operation of user.And work as access control apparatus and the operation of user is set to after effectively, server can To receive the operation of user, and process is snapped according to the operation execution of snapping of user.
It should be noted that in the above-described embodiments, only illustrate is when the operation that user participates in panic buying is detected, can So that controlling the access operation of user in aforementioned manners, but should only not be understood as above-mentioned access control method and only be suitable for In the panic buying operation of user, the operation that server access amount increases is caused in such as user's malicious access website, is likewise supplied with limiting effect Really.
Present invention also offers sixth embodiment as shown in Figure 7, a kind of access control apparatus, comprising:
Number of times acquiring unit 601, for the operation accessing in response to user, obtains access in during cycle for the user time Number.
User can access the website providing the second to kill commodity using mobile terminal or using computer end.When user is in commodity Also do not start before the second kills or rush to purchase, when this website is conducted interviews, number of times acquiring unit 601 is by the visit of real-time detection user Ask operation, obtain access times in during cycle for the user.The operation that user accesses includes entering buyer's guide page browsing business Product are introduced content, are clicked on and check commodity parameter or refresh panic buying page etc..In a particular application, the operation that user accesses is acceptable It is after commodity start panic buying, user uses click to rush to purchase button in computer end, or in mobile terminal finger touch Click panic buying button etc., be all considered as the operation accessing.Being simultaneous for user uses externally hung software to increase the behavior of click volume, when When the interface access panic buying interface of externally hung software is detected and triggering panic buying operation, will be regarded as this user and there is access operation.In advance The cycle of putting can be configured according to practical situation, can with 1 second as a cycle, or be such as within one minute a cycle.
Operation limiting unit 602, user when detect access times in during cycle for the described user reach preset After access times, then limit and exceed the operation that the described user of described preset access times accesses.
After obtaining access times in during cycle for the user, operation limiting unit 602 is detecting user preset After access times in cycle reach preset access times, it will limited according to preset control model and exceed preset access The operation that user after number of times accesses.Specifically, if during cycle is 1 second, preset access times are three times, in 1 second First three time access operation and all allowed and enter follow-up process by operation limiting unit 602, such as panic buying process or other enter Journey.When accessing operation 5 times when operating limiting unit 602 user is detected in internal trigger in 1 second, can be by the operation of the 4th and the 5th Limited according to preset control model.Preset control model is the access operation of directly refusal the 4th and the 5th, no The 4th and the access of the 5th is allowed to be operated into subsequent processes or access the 4th and the 5th by delay mode Operation delay to next cycle, can also be other control models.It is not limited herein.
In the present embodiment, operation limiting unit 602 detect access times in during cycle for the user exceed preset Access times after, by limit exceed the user after preset access times access operation.The present embodiment passes through to limit user Access times come to reach mitigate server load amount problem, simultaneously pass through limit user access times, to reach control Cattle party increases the problem of visit capacity using software, can make commonly to rush to purchase user and cattle party possesses same panic buying machine Meeting.It is to be understood that in the present embodiment, limiting the access behaviour that user in a during cycle exceedes preset access times Make, do not affect user in a cycle access operation, but when access times in next cycle for the user exceed preset Access times after, equally can be limited user access operation.
Present invention also offers the 7th embodiment as shown in Figure 8, a kind of access control apparatus, comprising:
Number of times acquiring unit 701: for detect user's access operation when, obtain the accounts information of user or the Internet Access times in during cycle for the protocol address.
Specifically can be limited for different situations, such as when user is carried out in the different account of same terminal logs in Brush ticket or when being rushed to purchase, number of times acquiring unit 701 can according to the Internet protocol address of the terminal of user (ip, Internet protocol address), obtain access times in during cycle for this Internet protocol address, work as user During using the different same account of terminal landing, number of times acquiring unit 701 can obtain access in during cycle for the account Number of times.
Operation limiting unit 702, for when detect access times in during cycle for the described user reach preset After access times, then limit and exceed the operation that the described user of described preset access times accesses.
Information holding unit 703, for using nginx+lua development technique by the accounts information of described user or the Internet Protocol address preserves to restriction list.
When user is detected after the access times in during cycle exceed preset access times, information holding unit This user is classified as restriction object, and the Internet protocol address of the terminal that the account of this user or this user are used by 703 Preserve to restriction list.In a particular application, information holding unit 703 can adopt the account by this user of nginx+lua The Internet protocol address of the terminal of family or this user use is synchronized in existing restriction list, in the present embodiment, limit List processed is equivalent to digital dictionary, and lua can be write by standard c language and form, and code is succinct, can be in no operating system Be compiled on operating platform, run.
The present embodiment passes through to obtain the account or Internet protocol address of the user access times in during cycle, comes Determine whether to list this user in restriction object, if access times in during cycle for this user exceed preset access times Afterwards, information holding unit 703 will be classified as this user as restriction object, and the account of user or Internet protocol address are protected Deposit to limiting in list, so that follow-up restriction operation.
Because in actual applications, when user's using terminal, being rushed to purchase including mobile terminal or computer end or snapped When, normal users all obtain access qualification using the manual mode clicked on, and therefore can in the light of actual conditions arrange a visit Ask frequency, restriction object is determined with this access frequency.As when user is gone on the razzle-dazzle, 3 typically can be realized in 1 second Secondary visit capacity, therefore can set the access frequency of user as 3 times/second, when detect the model essay frequency of user more than 3 times/ During the second, user setup is to limit object by information holding unit 703, and the account of user or Internet protocol address are preserved To restriction list.
Present invention also offers the 8th embodiment as shown in Figure 9, a kind of access control apparatus, comprising:
Number of times acquiring unit 801, for detect user's access operation when, obtain the accounts information of user or the Internet Access times in during cycle for the protocol address;
Operation limiting unit 802, for when detect access times in during cycle for the described user reach preset After access times, then limit and exceed the operation that the described user of described preset access times accesses.
Information holding unit 803, for using nginx+lua development technique by the accounts information of described user or the Internet Protocol address preserves to restriction list.
Information acquisition unit 804, for when when snapping operation of user is detected, obtaining accounts information or the interconnection of user FidonetFido address.
When commodity start to snap or rush to purchase, information acquisition unit 804 snaps operation by real-time detection user's, and obtains Take accounts information or the Internet protocol address at family.When commodity start to rush to purchase or snap, because user's snaps operation, The visit capacity of server will increase moment, in order to mitigate the loading of server, can first the access operation to user sentence Disconnected, information acquisition unit 804 will carry out subsequent operation according to judged result.
Information searching module 805, for limiting the accounts information with the presence or absence of described user in list by index search Or Internet protocol address.
Limit list and can add index in the account or Internet protocol address of user during preserving, work as information Searching modul 805 according to the account of user or Internet protocol address limit make a look up in list when, rope can be passed through Attract and determine account or the Internet protocol address with the presence or absence of this user in restriction list.
Operation setting unit 806, if for existing, snaps behaviour according to what preset control model limited described user Making, if not existing, the operation of snapping of described user being set to effectively.
Operation setting unit 806 limits, when judgement, account or the Internet protocol address that there is this user in list Afterwards, snap operation according to what preset control model limited this user, although that is, user triggers and snaps operation, this is snapped Operation will be unable to immediately enter follow-up process of snapping, and limits module operation setting unit 806 by according to preset control model Limit this user snaps operation.
In the present embodiment, operation setting unit 806 is provided with lock (key), when operation setting unit 806 is limiting list In find account or the Internet protocol of user after, the operation of snapping of this user will be locked it is necessary to by preset solution Lock mode could enter follow-up carrying out after being unlocked.Just can be allowed to after operation unlocks execute subsequently to enter in snapping of user Journey, that is, when user is after snapping the accessed control device of operation and be set to effectively, this user snaps operation and just can be allowed to enter Snap process.And when user is after snapping operation and be asserted, this user snaps operation and will be endowed an identification information, This identification information by allow user snap operation can only be performed predetermined times within the valid period.Snap operation as user After being asserted, in preset effective time, user can enter follow-up queuing process or payment process, when exceeding After this effective time, user snap operation will be set to be set to invalid.By the present embodiment, when user is snapped, Operation setting unit 806 can judge to the account of user or Internet protocol address, when this user is to limit object When, the panic buying of this user will be limited according to preset control model or snap behavior, to ensure the panic buying machine of common snapper-up Meeting, is also possible to prevent server simultaneously and leads to loading to increase because of the unexpected increase of visit capacity.
Figure 10 outputs operation setting unit 806 concrete structure provided in an embodiment of the present invention, comprising:
Pop-up module 8061, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input to test Card code.
Determine that finding user in limiting list participates in the account snapped or the internet protocol using the terminal snapped Behind view address, pop-up module 8061 will snap being predisposed to ejecting identifying code input frame, the input of described identifying code of interface Frame will be prompted to user according to showing in identifying code input frame that identifying code inserts corresponding content.In the present embodiment, identifying code can With using pure digi-tal identifying code, it would however also be possible to employ alphabetical identifying code or numeral and alphabetical combination.
Authentication module 8062, for obtaining the identifying code of user input, by the identifying code of described user input with described test In card code input frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if differing Cause, then export prompting message, described prompting message re-enters identifying code in order to point out user.
Authentication module 8062 judges to the identifying code of user input, after the identifying code judging user input is correct, The operation of snapping of user is set to effectively, makes user can enter follow-up process of snapping, such as rank, place an order, pay the bill, If the identifying code of user input is incorrect, user input identifying code will be pointed out again.
In the present embodiment, to limit user in the form of identifying code and enter and follow-up to snap process, by limiting user Enter follow-up process of snapping and reduce the server problem that loading increases because moment visit capacity increases to reach.Need to note Meaning, in the present embodiment, operation setting unit 806 uses identifying code input frame to show identifying code, makes user according to checking The mode of the identifying code input content in code input frame snaps operation to limit user, but in a particular application, but short Letter checking, transmission verbal messages make user complete picture mosaic etc. according to the information input checking content in speech message, dragging pattern Verification mode, is not limited herein.
Figure 11 shows the structural representation of operation setting unit 806 provided in an embodiment of the present invention, comprising:
Pop-up module 8061, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input to test Card code.
Authentication module 8062, for obtaining the identifying code of user input, by the identifying code of described user input with described test In card code input frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if differing Cause, then export prompting message, described prompting message re-enters identifying code in order to point out user.
Invalid module 8063, if for limiting accounts information or the Internet protocol address that there is described user in list, Then by described user snap operation be set to invalid.
In the present embodiment, when the internet protocol of the account finding user in restricted list or the terminal of user's use Behind view address, the operation of snapping of this user direct is set to invalid by invalid module 8063, and the operation of snapping refusing this user is carried out Subsequently carry out.The present embodiment can effectively prevent such as cattle party, or increase visit capacity using software and reach panic buying The panic buying behavior of the user of chance, it also avoid server simultaneously and makes because moment visit capacity leads to loading to increase in increase If become delay machine the problems such as.
In above-described embodiment provided in an embodiment of the present invention, by detecting the access times of user come restricting user access Operation, when user access operation limited after, will be unable to enter subsequent processes, or postpone enter subsequent processes. It should be noted that in the above-described embodiments, it is invalid that the operation of user is set to, and refers to access control apparatus and use is being detected During the operation at family, first accessing of detection user operates the condition whether meeting entrance subsequent processes, and the standard of judgement is user Whether access times reach the account of preset access times or this user or the Internet protocol address of the terminal of use It is in limiting list, when the operation of user does not meet the condition entering subsequent processes, the operation of this user will be rejected, Server will be unable to receive the operation of user.And work as access control apparatus and the operation of user is set to after effectively, server can To receive the operation of user, and process is snapped according to the operation execution of snapping of user.
Eleventh embodiment of the invention additionally provides a kind of terminal for executing access control, this terminal can be including Mobile phone, panel computer, pda (personal digital assistant, personal digital assistant), desktop computer, vehicle-mounted computer Terminal etc. the control operation that conducts interviews.
This terminal includes: one or more processor, memorizer and one or more program (module).Wherein should One or more program (module) is stored in this memorizer, when by this one or more computing device, this process Device execution is following to be operated:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit and exceed The operation that the described user of described preset access times accesses.
Embodiment pass through detect access times in during cycle for the user, and to user access operation limited with Control the visit capacity of user, reached with this and control the problem that in during cycle, visit capacity increases.
It should be understood that disclosed apparatus and method in several embodiments provided herein, can be passed through it Its mode is realized.For example, device embodiment described above is only schematically, for example, the division of described module, and only It is only a kind of division of logic function, actual can have other dividing mode when realizing, and for example multiple module or components can be tied Close or be desirably integrated into another system, or some features can be ignored, or do not execute.Another, shown or discussed Coupling each other or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or module or logical Letter connects, and can be electrical, mechanical or other forms.
The described module illustrating as separating component can be or may not be physically separate, show as module The part showing can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple On mixed-media network modules mixed-media.The mesh to realize this embodiment scheme for some or all of module therein can be selected according to the actual needs 's.
In addition, can be integrated in a processing module in each functional module in each embodiment of the present invention it is also possible to It is that modules are individually physically present it is also possible to two or more modules are integrated in a module.Above-mentioned integrated mould Block both can be to be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.
If described integrated module is realized and as independent production marketing or use using in the form of software function module When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part in other words prior art being contributed or all or part of this technical scheme can be in the form of software products Embody, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the present invention Portion or part steps.And aforesaid storage medium includes: u disk, portable hard drive, read only memory (rom, read-only Memory), random access memory (ram, random access memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It should be noted that for aforesaid each method embodiment, for easy description, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art also should know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not be all these Bright necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
It is more than the description to access control method provided by the present invention and access control apparatus, for the skill of this area Art personnel, according to the thought of the embodiment of the present invention, all will change in specific embodiments and applications, to sum up, This specification content should not be construed as limitation of the present invention.

Claims (10)

1. a kind of access control method is it is characterised in that include:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit exceed described The operation that the described user of preset access times accesses.
2. access control method as claimed in claim 1, it is characterised in that the described operation in response to user's access, obtains Access times in during cycle for the user include:
Detect user's access operation when, obtain the visit in during cycle of accounts information or Internet protocol address of user Ask number of times;
After then described restriction exceedes the operation of described user's access of described preset access times, also include:
Using nginx+lua development technique, the accounts information of described user or Internet protocol address are preserved to restriction list In.
3. access control method as claimed in claim 2 is it is characterised in that described access control method also includes:
When snapping operation of user is detected, obtain accounts information or the Internet protocol address of user;
Accounts information or Internet protocol address with the presence or absence of described user in list is limited by index search;
If existing, snap operation according to what preset control model limited described user, if not existing, by described user's Snap operation to be set to effectively.
4. access control method as claimed in claim 3 it is characterised in that described limit according to preset control model described The operation of snapping of user includes:
Eject identifying code input frame, described identifying code input frame is in order to point out user input identifying code;
Obtain the identifying code of user input, by the checking of display in the identifying code of described user input and described identifying code input frame It is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, export prompting message, described carry Show message in order to point out user to re-enter identifying code.
5. access control method as claimed in claim 3 it is characterised in that described limit according to preset control model described The operation of snapping of user includes:
By described user snap operation be set to invalid.
6. a kind of access control apparatus are it is characterised in that include:
Number of times acquiring unit, for the operation accessing in response to user, obtains access times in during cycle for the user;
Operation limiting unit, reaches preset access times for access times in during cycle for the described user is detected Afterwards, then limit and exceed the operation that the described user of described preset access times accesses.
7. access control apparatus as claimed in claim 6 it is characterised in that described acquiring unit specifically for:
Detect user's access operation when, obtain the visit in during cycle of accounts information or Internet protocol address of user Ask number of times;
Then described access control apparatus also include:
Information holding unit, for using nginx+lua development technique by the accounts information of described user or Internet protocol ground Location preserves to restriction list.
8. access control apparatus as claimed in claim 7 are it is characterised in that described access control apparatus also include:
Information acquisition unit, for when when snapping operation of user is detected, obtaining accounts information or the Internet protocol of user Address;
Information searching unit, for limiting accounts information or the Internet with the presence or absence of described user in list by index search Protocol address;
Operation setting unit, if for existing, snaps operation according to what preset control model limited described user, if not depositing Then the operation of snapping of described user is being set to effectively.
9. access control apparatus as claimed in claim 8 are it is characterised in that described operation setting unit includes:
Pop-up module, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input identifying code;
Authentication module, for obtaining the identifying code of user input, by the identifying code of described user input and the input of described identifying code In frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, exports Prompting message, described prompting message re-enters identifying code in order to point out user.
10. access control apparatus as claimed in claim 8 are it is characterised in that described operation setting unit also includes:
Invalid module, if for limiting accounts information or the Internet protocol address that there is described user in list, will be described User snap operation be set to invalid.
CN201610792114.3A 2016-08-31 2016-08-31 Access control method and access control device Pending CN106372992A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610792114.3A CN106372992A (en) 2016-08-31 2016-08-31 Access control method and access control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610792114.3A CN106372992A (en) 2016-08-31 2016-08-31 Access control method and access control device

Publications (1)

Publication Number Publication Date
CN106372992A true CN106372992A (en) 2017-02-01

Family

ID=57899854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610792114.3A Pending CN106372992A (en) 2016-08-31 2016-08-31 Access control method and access control device

Country Status (1)

Country Link
CN (1) CN106372992A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878335A (en) * 2017-03-28 2017-06-20 武汉斗鱼网络科技有限公司 A kind of method and system for login authentication
CN111507729A (en) * 2020-04-29 2020-08-07 广东所能网络有限公司 Electronic commerce risk control system and method based on mobile internet
CN112148756A (en) * 2020-09-24 2020-12-29 四川长虹电器股份有限公司 Commodity reservation and first-purchase optimization method
CN113794679A (en) * 2021-08-02 2021-12-14 浪潮软件股份有限公司 Method and system for preventing automatic script number robbing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878335A (en) * 2017-03-28 2017-06-20 武汉斗鱼网络科技有限公司 A kind of method and system for login authentication
CN111507729A (en) * 2020-04-29 2020-08-07 广东所能网络有限公司 Electronic commerce risk control system and method based on mobile internet
CN112148756A (en) * 2020-09-24 2020-12-29 四川长虹电器股份有限公司 Commodity reservation and first-purchase optimization method
CN113794679A (en) * 2021-08-02 2021-12-14 浪潮软件股份有限公司 Method and system for preventing automatic script number robbing

Similar Documents

Publication Publication Date Title
WO2020037918A1 (en) Risk control strategy determining method based on predictive model, and related device
CN106534572B (en) Information display method, device and terminal
CN106372992A (en) Access control method and access control device
CN103891242A (en) System and method for profile based filtering of outgoing information in a mobile environment
CN105306495B (en) user identification method and device
CN105281906A (en) Safety authentication method and device
CN107729745A (en) Data processing method, terminal, computer installation and computer-readable recording medium
CN107346397A (en) Information processing method and related product
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN107872555A (en) Call recording method, device, terminal device and computer-readable recording medium
CN107657039A (en) Bill recording method, mobile terminal and computer-readable recording medium
CN108702413A (en) A kind of input method and device of identifying code
CN106341259A (en) Fault information report method and device
CN107634947A (en) Limitation malice logs in or the method and apparatus of registration
CN110705585A (en) Network fraud identification method and device, computer device and storage medium
CN107563187A (en) Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing
CN108235767A (en) A kind of partition method, device and terminal for paying application
CN114726947B (en) Message display method, device, user terminal and readable storage medium
CN108255936A (en) A kind of edit methods of webpage, system and editing machine
CN106547833A (en) Web browser method and device
CN104426960B (en) A kind of trial method and device of payment applications
CN106294707A (en) A kind of countdown information output intent and device
CN106856474A (en) A kind of processing method and processing device of checking information
CN107871015A (en) Daily record data processing method and processing device, terminal and readable storage medium storing program for executing
CN108076042A (en) User information acquiring method, server and computer-readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170201

WD01 Invention patent application deemed withdrawn after publication