CN106372992A - Access control method and access control device - Google Patents
Access control method and access control device Download PDFInfo
- Publication number
- CN106372992A CN106372992A CN201610792114.3A CN201610792114A CN106372992A CN 106372992 A CN106372992 A CN 106372992A CN 201610792114 A CN201610792114 A CN 201610792114A CN 106372992 A CN106372992 A CN 106372992A
- Authority
- CN
- China
- Prior art keywords
- user
- access
- identifying code
- access control
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
Abstract
The invention belongs to the network technology field and discloses an access control method and an access control device. The method comprises steps that access operation of a user is responded, the access times of the user within a preset period is acquired, when the access times within the preset period is detected to arrive the preset access times, access operation of the user surpassing the preset access times is limited. Through the method, the access times of the user within the preset period is detected, access operation of the user is limited to control an access volume of the user, so a problem of increase of the access volume within the preset period is solved.
Description
Technical field
The invention belongs to networking technology area, more particularly, to a kind of access control method and access control apparatus.
Background technology
Competition with electric business industry is increasing, and various network marketing means also emerge in an endless stream, and a lot of businessmans are in order to declare
Pass the commodity of oneself, through attracting client frequently with some low price panic buying activities, such as: the unitary second kills, a folding limitation is rushed to purchase etc.
Deng.
Because the commodity price in panic buying activity is well below market price, so in low price panic buying activity, being frequently encountered by
Panic buying user constantly clicks on panic buying button and more rushes to purchase chances to obtain, or cattle party uses software to increase access times,
Thus obtain going on the razzle-dazzle, user constantly clicks on panic buying operation or cattle party and is easily caused clothes using software increase access times
The loading of business device increases.
Effective method is there is no to prevent user from increasing visit capacity using software and obtaining and go on the razzle-dazzle at present.
Content of the invention
The invention provides a kind of access control method and access control apparatus are visited it is intended to solving user and using software to increase
The amount of asking thus increase website loading problem.
Embodiments provide a kind of access control method, comprising:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit and exceed
The operation that the described user of described preset access times accesses.
The embodiment of the present invention additionally provides a kind of access control apparatus, comprising:
Number of times acquiring unit, for the operation accessing in response to user, obtains access times in during cycle for the user;
Operation limiting unit, reaches preset access for access times in during cycle for the described user is detected
After number of times, then limit and exceed the operation that the described user of described preset access times accesses.
Knowable to the embodiments of the present invention, the present invention passes through to detect access times in during cycle for the user, and right
User access operation limited to control the visit capacity of user, with this reach control during cycle in visit capacity increase ask
Topic.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
Have technology description in required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only this
Some embodiments of invention, for those skilled in the art, without having to pay creative labor, can also root
Obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is a kind of structured flowchart of mobile terminal.
A kind of flow chart of access control method that Fig. 2 provides for the embodiment of the present invention one.
A kind of flow chart of access control method that Fig. 3 provides for the embodiment of the present invention two.
A kind of flow chart of access control method that Fig. 4 provides for the embodiment of the present invention three.
A kind of flow chart of access control method that Fig. 5 provides for the embodiment of the present invention four.
A kind of flow chart of access control method that Fig. 6 provides for the embodiment of the present invention five.
A kind of structural representation of access control apparatus that Fig. 7 provides for the embodiment of the present invention six.
A kind of structural representation of access control apparatus that Fig. 8 provides for the embodiment of the present invention seven.
A kind of structural representation of access control apparatus that Fig. 9 provides for the embodiment of the present invention eight.
A kind of structural representation of access control apparatus that Figure 10 provides for the embodiment of the present invention nine.
A kind of structural representation of access control apparatus that Figure 11 provides for the embodiment of the present invention ten.
Specific embodiment
For enabling the goal of the invention of the present invention, feature, advantage more obvious and understandable, below in conjunction with the present invention
Accompanying drawing in embodiment, is clearly and completely described the reality it is clear that described to the technical scheme in the embodiment of the present invention
Applying example is only a part of embodiment of the present invention, and not all embodiments.Based on the embodiment in the present invention, people in the art
The every other embodiment that member is obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
Fig. 1 shows a kind of structured flowchart of mobile terminal.Access control method provided in an embodiment of the present invention can be applied
In mobile terminal 10 as shown in Figure 1, mobile terminal 10 can be, but not limited to including: need to rely on battery maintain normal run and
The smart mobile phone of support network and download function, notebook, panel computer etc..
As shown in figure 1, mobile terminal 10 includes memorizer 101, storage control 102, one or more (in figure only illustrates
One) processor 103, Peripheral Interface 104, radio-frequency module 105, key-press module 106, audio-frequency module 107 and Touch Screen
108.These assemblies are mutually communicated by one or more communication bus/holding wire 109.
It is appreciated that the structure shown in Fig. 1 is only illustrating, it does not cause to the structure of mobile terminal to limit.Mobile whole
End 10 may also include the assembly more or more less than shown in Fig. 1, or has the configurations different from shown in Fig. 1.Shown in Fig. 1
Each assembly can be realized using hardware, software or a combination thereof.
Memorizer 101 can be used for storing software program and module, the such as method of the access control in the embodiment of the present invention
And the corresponding programmed instruction/module of device, processor 103 is by running software program and the mould being stored in memorizer 101
Block, thus executing various function application and data processing, that is, realizes the method that above-mentioned mobile terminal 10 nullifies application program.
Memorizer 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memorizer 101 can further include
The memorizer remotely located with respect to processor 103, these remote memories can be by network connection to mobile terminal 10.On
The example stating network includes but is not limited to the Internet, intranet, LAN, mobile radio communication and combinations thereof.Processor 103
And other possible assemblies can be carried out to the access of memorizer 101 under the control of storage control 102.
Various input/output devices are coupled to cpu and memorizer 101 by Peripheral Interface 104.Processor 103 runs and deposits
Various softwares in reservoir 101, instruction are to execute the various functions of mobile terminal 10 and to carry out data processing.
In certain embodiments, Peripheral Interface 104, processor 103 and storage control 102 can be in one single chips
Realize.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used for receiving and sends electromagnetic wave, realizes the mutual conversion of electromagnetic wave and the signal of telecommunication, thus with
Communication network or other equipment are communicated.Radio-frequency module 105 may include the various existing electricity for executing these functions
Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (sim) card,
Memorizer etc..Radio-frequency module 105 can with various networks for example the Internet, intranet, preset type wireless network carry out
Communication or the wireless network by preset type are communicated with other equipment.The wireless network of above-mentioned preset type can wrap
Include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).The wireless network of above-mentioned preset type can use various communications
Standard, agreement and technology, including but not limited to global system for mobile communications (global system for mobile
Communication, gsm), enhancement mode mobile communication technology (enhanced data gsm environment, edge), wide
Band CDMA (wideband code division multiple access, w-cdma), CDMA
(code division access, cdma), tdma (time division multiple access, tdma),
Bluetooth, adopting wireless fidelity technology (wireless-fidelity, wifi) is (as IEEE-USA's standard ieee
802.11a, ieee 802.11b, ieee802.11g and/or ieee 802.11n), the networking telephone (voice over
Internet protocal, voip), worldwide interoperability for microwave accesses (worldwide interoperability for
Microwave access, wi-max), other are used for the agreement of mail, instant messaging and short message, and any other is suitable
Communications protocol.
Key-press module 106 provides the interface that inputted to mobile terminal of user, user can by press different by
Key is so that mobile terminal 10 executes different functions.
Audio-frequency module 107 provides a user with audio interface, and it may include one or more mikes, one or more raises
Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface 104, and voice data is converted to electrical information,
Electrical information is transmitted to speaker.Electrical information is converted to the sound wave that human ear can be heard by speaker.Voicefrequency circuit is also from mike
Place receive electrical information, convert electrical signals to voice data, and by data transmission in network telephony to Peripheral Interface 104 to enter traveling one
The process of step.Voice data can be obtained at memorizer 101 or by radio-frequency module 105.Additionally, voice data can also
Store to memorizer 101 or be transmitted by radio-frequency module 105.In some instances, audio-frequency module 107 may also include
Hole broadcast by one earphone, for providing audio interface to earphone or other equipment.
Touch Screen 108 provides an output and inputting interface between mobile terminal and user simultaneously.Specifically, touch-control
Screen 108 displays to the user that video frequency output, and the content of these video frequency output may include word, figure, video and its any group
Close.Some output results correspond to some user interface object.The input of Touch Screen 108 also receive user, such as user
Click, the gesture operation such as slip so that user interface object responds to the input of these users.Detection user input
Technology can be based on resistance-type, condenser type or other arbitrarily possible touch control detection technology.Touch Screen 108 display unit
Instantiation include but is not limited to liquid crystal display or light emitting polymer displays.
Fig. 2 shows a kind of access control method that first embodiment of the invention provides, comprising:
S101, the operation accessing in response to user, obtain access times in during cycle for the user.
User can access the website providing the second to kill commodity using mobile terminal or using computer end.When user is in commodity
Also do not start before the second kills or rush to purchase, when this website is conducted interviews, access control apparatus are by the access of real-time detection user
Operation, obtains access times in during cycle for the user.The operation that user accesses includes entering buyer's guide page browsing commodity
Introduce content, click on and check commodity parameter or refresh panic buying page etc..In a particular application, the operation that user accesses can also be
After commodity start panic buying, user uses click to rush to purchase button in computer end, or in mobile terminal finger touch
Click on panic buying button etc., be all considered as the operation accessing.Being simultaneous for user uses externally hung software to increase the behavior of click volume, works as inspection
When measuring the interface access panic buying interface of externally hung software and triggering panic buying operation, will be regarded as this user and there is access operation.Preset
Cycle can be configured according to practical situation, can with 1 second as a cycle, or be such as within one minute a cycle.
S102, after access times in during cycle for the described user is detected and reach preset access times, then limits
System exceedes the operation that the described user of described preset access times accesses.
After obtaining access times in during cycle for the user, access control apparatus are detecting user in during cycle
After interior access times reach preset access times, it will limited according to preset control model and exceed preset access times
The operation that user afterwards accesses.Specifically, if during cycle is 1 second, preset access times are three times, in 1 second before
Access all accessed control device of operation for three times to allow and enter follow-up process, such as panic buying process or other processes.Work as visit
Ask that control device detects user when internal trigger in 1 second accesses operation 5 times, can be by the operation of the 4th and the 5th according to preset
Control model is limited.Preset control model be directly refusal the 4th and the 5th access operation, do not allow the 4th and
The access of the 5th is operated into subsequent processes or is delayed, by delay mode, the operation that the 4th and the 5th access
To next cycle, can also be other control models.It is not limited herein.
In the present embodiment, after access times in during cycle for the user is detected and exceed preset access times,
The operation exceeding the access of the user after preset access times will be limited.The present embodiment is reached by the access times limiting user
To the problem mitigating server load amount, pass through to limit the access times of user simultaneously, to reach control cattle party and to use software
To increase the problem of visit capacity, can make commonly to rush to purchase user and cattle party possesses same panic buying chance.It is to be understood that
In the present embodiment, limit a during cycle in user exceed preset access times access operation, do not affect user under
Access operation in a cycle, but after as user, the access times in next cycle exceed preset access times, will
The access operation of user equally can be limited.
Present invention also offers second embodiment as shown in Figure 3, a kind of access control method includes:
S201, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset
Access times in cycle.
In this step, specifically can be limited for different situations, such as when user in same terminal logs in not
When same account carries out brush ticket or is rushed to purchase, can be according to Internet protocol address (ip, the internet of the terminal of user
Protocol address), obtain access times in during cycle for this Internet protocol address, when user is using different
During the same account of terminal landing, access times in during cycle for the account can be obtained.
S202, after access times in during cycle for the described user is detected and reach preset access times, then limits
System exceedes the operation that the described user of described preset access times accesses.
S203, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to
Limit in list.
In this step, when user is detected after the access times in during cycle exceed preset access times,
This user is classified as restriction object, and the Internet protocol address of the terminal that the account of this user or this user are used preserves
To restriction list.In a particular application, the account by this user or this user of nginx+lua development technique can be adopted
The Internet protocol address of the terminal using is synchronized in existing restriction list, in the present embodiment, limits list and is equivalent to
Digital dictionary, lua can be write by standard c language and form, and code is succinct, can be in no operating system and operating platform
It is compiled, run.
The present embodiment passes through to obtain the account or Internet protocol address of the user access times in during cycle, comes
Determine whether to list this user in restriction object, if access times in during cycle for this user exceed preset access times
Afterwards, access control apparatus will be classified as this user as restriction object, and the account of user or Internet protocol address are preserved
To limiting in list, so that follow-up restriction operation.
Because in actual applications, when user's using terminal, being rushed to purchase including mobile terminal or computer end or snapped
When, normal users all obtain access qualification using the manual mode clicked on, and therefore can in the light of actual conditions arrange a visit
Ask frequency, restriction object is determined with this access frequency.As when user is gone on the razzle-dazzle, 3 typically can be realized in 1 second
Secondary visit capacity, therefore can set the access frequency of user as 3 times/second, when detect the model essay frequency of user more than 3 times/
During the second, then by user setup for limiting object, and the account of user or Internet protocol address are preserved to restriction list.
Present invention also offers the 3rd embodiment shown in Fig. 4, a kind of access control method, comprising:
S301, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset
Access times in cycle.
S302, after access times in during cycle for the described user is detected and reach preset access times, then limits
System exceedes the operation that the described user of described preset access times accesses.
S303, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to
Limit in list.
S304, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
When commodity start to snap or rush to purchase, access control apparatus snap operation by real-time detection user's, and obtain
The accounts information of user or Internet protocol address.When commodity start to rush to purchase or snap, because user's snaps operation, clothes
The visit capacity of business device will increase moment, in order to mitigate the loading of server, can first the access operation to user judge,
Access control apparatus will carry out subsequent operation according to judged result.
S305, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search
Location.
Limit list and can add index in the account or Internet protocol address of user during preserving, work as access
Control device according to the account of user or Internet protocol address limit make a look up in list when, can be come by index
Determine and limit account or the Internet protocol address with the presence or absence of this user in list.
S306, if existing, snaps operation according to what preset control model limited described user, if not existing, will
The operation of snapping of described user is set to effectively.
In this step, after judging to limit account or the Internet protocol address that there is this user in list, press
Snap operation according to what preset control model limited this user, although that is, user triggers and snaps operation, this snaps operation
Will be unable to immediately enter follow-up process of snapping, access control apparatus will limit snapping of this user according to preset control model
Operation.
In the present embodiment, access control apparatus are provided with lock (key), when access control apparatus are searched in limiting list
To after the account or Internet protocol of user, the operation of snapping of this user will be locked it is necessary to pass through preset unlocking manner
Follow-up carrying out could be entered after being unlocked.Just can be allowed to after operation unlocks execute subsequent processes in snapping of user, that is,
When user is after snapping the accessed control device of operation and be set to effectively, this user snap operation just can be allowed to enter snap into
Journey.And when user is after snapping operation and be asserted, this user snaps operation and will be endowed an identification information, this mark
Information by allow user snap operation can only be performed predetermined times within the valid period.Operation of snapping as user is set to
After effectively, in preset effective time, user can enter follow-up queuing process or payment process, effective when exceeding this
After time, user snap operation will be set to be set to invalid.By the present embodiment, when user is snapped, access control
Device processed can judge to the account of user or Internet protocol address, when this user is to limit object, will be according to
Preset control model limits the panic buying of this user or snaps behavior, to ensure the panic buying chance of common snapper-up, simultaneously
Server can be prevented and lead to loading to increase because of the unexpected increase of visit capacity.
Present invention also offers fourth embodiment as shown in Figure 5, a kind of access control method, comprising:
S401, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset
Access times in cycle.
S402, after access times in during cycle for the described user is detected and reach preset access times, then limits
System exceedes the operation that the described user of described preset access times accesses.
S403, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to
Limit in list.
S404, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
S405, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search
Location.
S406, if existing, ejects identifying code input frame, described identifying code input frame is in order to point out user input identifying code.
Determine that finding user in limiting list participates in the account snapped or the internet protocol using the terminal snapped
Behind view address, access control apparatus will snap being predisposed to ejecting identifying code input frame, the input of described identifying code of interface
Frame will be prompted to user according to showing in identifying code input frame that identifying code inserts corresponding content.In the present embodiment, identifying code can
With using pure digi-tal identifying code, it would however also be possible to employ alphabetical identifying code or numeral and alphabetical combination.
S407, obtains the identifying code of user input, by the identifying code of described user input and described identifying code input frame
The checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, output prompting
Message, described prompting message re-enters identifying code in order to point out user.
In this step, the identifying code of user input is judged, after the identifying code judging user input is correct, will use
The operation of snapping at family is set to effectively, makes user can enter follow-up process of snapping, such as ranks, places an order, pays the bill, if using
The identifying code of family input is incorrect, will point out user input identifying code again.
S408, if not existing, the operation of snapping of described user is set to effectively.
In the present embodiment, to limit user in the form of identifying code and enter and follow-up to snap process, by limiting user
Enter follow-up process of snapping and reduce the server problem that loading increases because moment visit capacity increases to reach.Need to note
Meaning, in the present embodiment, access control apparatus use identifying code input frame to show identifying code, make user defeated according to identifying code
Enter the mode of the identifying code input content in frame and snap operation to limit user, but in a particular application, but note is tested
Card, transmission verbal messages make user complete the checking such as picture mosaic according to the information input checking content in speech message, dragging pattern
Mode, is not limited herein.
Present invention also offers the 5th embodiment as shown in Figure 6, a kind of access control method, comprising:
S501, when the operation that user accesses is detected, the accounts information of acquisition user or Internet protocol address are preset
Access times in cycle.
S502, after access times in during cycle for the described user is detected and reach preset access times, then limits
System exceedes the operation that the described user of described preset access times accesses.
S503, using nginx+lua development technique by the accounts information of described user or Internet protocol address preserve to
Limit in list.
S504, when when snapping operation of user is detected, obtains accounts information or the Internet protocol address of user.
S505, limits accounts information or the Internet protocol ground with the presence or absence of described user in list by index search
Location;
S506, if exist, by described user snap operation be set to invalid, if not existing, by robbing of described user
Clap operation to be set to effectively.
In the present embodiment, when the internet protocol of the account finding user in restricted list or the terminal of user's use
Behind view address, the operation of snapping of this user direct is set to invalid, the operation of snapping refusing this user is subsequently carried out.This reality
Applying example can effectively prevent such as cattle party, or increases the robbing of user that visit capacity reaches panic buying chance using software
Purchase behavior, it also avoid server simultaneously and asks because moment visit capacity leads to loading to increase machine of delaying causing etc. in increase
Topic.
In above-described embodiment provided in an embodiment of the present invention, by detecting the access times of user come restricting user access
Operation, when user access operation limited after, will be unable to enter subsequent processes, or postpone enter subsequent processes.
It should be noted that in the above-described embodiments, it is invalid that the operation of user is set to, and refers to access control apparatus and use is being detected
During the operation at family, first accessing of detection user operates the condition whether meeting entrance subsequent processes, and the standard of judgement is user
Whether access times reach the account of preset access times or this user or the Internet protocol address of the terminal of use
It is in limiting list, when the operation of user does not meet the condition entering subsequent processes, the operation of this user will be rejected,
Server will be unable to receive the operation of user.And work as access control apparatus and the operation of user is set to after effectively, server can
To receive the operation of user, and process is snapped according to the operation execution of snapping of user.
It should be noted that in the above-described embodiments, only illustrate is when the operation that user participates in panic buying is detected, can
So that controlling the access operation of user in aforementioned manners, but should only not be understood as above-mentioned access control method and only be suitable for
In the panic buying operation of user, the operation that server access amount increases is caused in such as user's malicious access website, is likewise supplied with limiting effect
Really.
Present invention also offers sixth embodiment as shown in Figure 7, a kind of access control apparatus, comprising:
Number of times acquiring unit 601, for the operation accessing in response to user, obtains access in during cycle for the user time
Number.
User can access the website providing the second to kill commodity using mobile terminal or using computer end.When user is in commodity
Also do not start before the second kills or rush to purchase, when this website is conducted interviews, number of times acquiring unit 601 is by the visit of real-time detection user
Ask operation, obtain access times in during cycle for the user.The operation that user accesses includes entering buyer's guide page browsing business
Product are introduced content, are clicked on and check commodity parameter or refresh panic buying page etc..In a particular application, the operation that user accesses is acceptable
It is after commodity start panic buying, user uses click to rush to purchase button in computer end, or in mobile terminal finger touch
Click panic buying button etc., be all considered as the operation accessing.Being simultaneous for user uses externally hung software to increase the behavior of click volume, when
When the interface access panic buying interface of externally hung software is detected and triggering panic buying operation, will be regarded as this user and there is access operation.In advance
The cycle of putting can be configured according to practical situation, can with 1 second as a cycle, or be such as within one minute a cycle.
Operation limiting unit 602, user when detect access times in during cycle for the described user reach preset
After access times, then limit and exceed the operation that the described user of described preset access times accesses.
After obtaining access times in during cycle for the user, operation limiting unit 602 is detecting user preset
After access times in cycle reach preset access times, it will limited according to preset control model and exceed preset access
The operation that user after number of times accesses.Specifically, if during cycle is 1 second, preset access times are three times, in 1 second
First three time access operation and all allowed and enter follow-up process by operation limiting unit 602, such as panic buying process or other enter
Journey.When accessing operation 5 times when operating limiting unit 602 user is detected in internal trigger in 1 second, can be by the operation of the 4th and the 5th
Limited according to preset control model.Preset control model is the access operation of directly refusal the 4th and the 5th, no
The 4th and the access of the 5th is allowed to be operated into subsequent processes or access the 4th and the 5th by delay mode
Operation delay to next cycle, can also be other control models.It is not limited herein.
In the present embodiment, operation limiting unit 602 detect access times in during cycle for the user exceed preset
Access times after, by limit exceed the user after preset access times access operation.The present embodiment passes through to limit user
Access times come to reach mitigate server load amount problem, simultaneously pass through limit user access times, to reach control
Cattle party increases the problem of visit capacity using software, can make commonly to rush to purchase user and cattle party possesses same panic buying machine
Meeting.It is to be understood that in the present embodiment, limiting the access behaviour that user in a during cycle exceedes preset access times
Make, do not affect user in a cycle access operation, but when access times in next cycle for the user exceed preset
Access times after, equally can be limited user access operation.
Present invention also offers the 7th embodiment as shown in Figure 8, a kind of access control apparatus, comprising:
Number of times acquiring unit 701: for detect user's access operation when, obtain the accounts information of user or the Internet
Access times in during cycle for the protocol address.
Specifically can be limited for different situations, such as when user is carried out in the different account of same terminal logs in
Brush ticket or when being rushed to purchase, number of times acquiring unit 701 can according to the Internet protocol address of the terminal of user (ip,
Internet protocol address), obtain access times in during cycle for this Internet protocol address, work as user
During using the different same account of terminal landing, number of times acquiring unit 701 can obtain access in during cycle for the account
Number of times.
Operation limiting unit 702, for when detect access times in during cycle for the described user reach preset
After access times, then limit and exceed the operation that the described user of described preset access times accesses.
Information holding unit 703, for using nginx+lua development technique by the accounts information of described user or the Internet
Protocol address preserves to restriction list.
When user is detected after the access times in during cycle exceed preset access times, information holding unit
This user is classified as restriction object, and the Internet protocol address of the terminal that the account of this user or this user are used by 703
Preserve to restriction list.In a particular application, information holding unit 703 can adopt the account by this user of nginx+lua
The Internet protocol address of the terminal of family or this user use is synchronized in existing restriction list, in the present embodiment, limit
List processed is equivalent to digital dictionary, and lua can be write by standard c language and form, and code is succinct, can be in no operating system
Be compiled on operating platform, run.
The present embodiment passes through to obtain the account or Internet protocol address of the user access times in during cycle, comes
Determine whether to list this user in restriction object, if access times in during cycle for this user exceed preset access times
Afterwards, information holding unit 703 will be classified as this user as restriction object, and the account of user or Internet protocol address are protected
Deposit to limiting in list, so that follow-up restriction operation.
Because in actual applications, when user's using terminal, being rushed to purchase including mobile terminal or computer end or snapped
When, normal users all obtain access qualification using the manual mode clicked on, and therefore can in the light of actual conditions arrange a visit
Ask frequency, restriction object is determined with this access frequency.As when user is gone on the razzle-dazzle, 3 typically can be realized in 1 second
Secondary visit capacity, therefore can set the access frequency of user as 3 times/second, when detect the model essay frequency of user more than 3 times/
During the second, user setup is to limit object by information holding unit 703, and the account of user or Internet protocol address are preserved
To restriction list.
Present invention also offers the 8th embodiment as shown in Figure 9, a kind of access control apparatus, comprising:
Number of times acquiring unit 801, for detect user's access operation when, obtain the accounts information of user or the Internet
Access times in during cycle for the protocol address;
Operation limiting unit 802, for when detect access times in during cycle for the described user reach preset
After access times, then limit and exceed the operation that the described user of described preset access times accesses.
Information holding unit 803, for using nginx+lua development technique by the accounts information of described user or the Internet
Protocol address preserves to restriction list.
Information acquisition unit 804, for when when snapping operation of user is detected, obtaining accounts information or the interconnection of user
FidonetFido address.
When commodity start to snap or rush to purchase, information acquisition unit 804 snaps operation by real-time detection user's, and obtains
Take accounts information or the Internet protocol address at family.When commodity start to rush to purchase or snap, because user's snaps operation,
The visit capacity of server will increase moment, in order to mitigate the loading of server, can first the access operation to user sentence
Disconnected, information acquisition unit 804 will carry out subsequent operation according to judged result.
Information searching module 805, for limiting the accounts information with the presence or absence of described user in list by index search
Or Internet protocol address.
Limit list and can add index in the account or Internet protocol address of user during preserving, work as information
Searching modul 805 according to the account of user or Internet protocol address limit make a look up in list when, rope can be passed through
Attract and determine account or the Internet protocol address with the presence or absence of this user in restriction list.
Operation setting unit 806, if for existing, snaps behaviour according to what preset control model limited described user
Making, if not existing, the operation of snapping of described user being set to effectively.
Operation setting unit 806 limits, when judgement, account or the Internet protocol address that there is this user in list
Afterwards, snap operation according to what preset control model limited this user, although that is, user triggers and snaps operation, this is snapped
Operation will be unable to immediately enter follow-up process of snapping, and limits module operation setting unit 806 by according to preset control model
Limit this user snaps operation.
In the present embodiment, operation setting unit 806 is provided with lock (key), when operation setting unit 806 is limiting list
In find account or the Internet protocol of user after, the operation of snapping of this user will be locked it is necessary to by preset solution
Lock mode could enter follow-up carrying out after being unlocked.Just can be allowed to after operation unlocks execute subsequently to enter in snapping of user
Journey, that is, when user is after snapping the accessed control device of operation and be set to effectively, this user snaps operation and just can be allowed to enter
Snap process.And when user is after snapping operation and be asserted, this user snaps operation and will be endowed an identification information,
This identification information by allow user snap operation can only be performed predetermined times within the valid period.Snap operation as user
After being asserted, in preset effective time, user can enter follow-up queuing process or payment process, when exceeding
After this effective time, user snap operation will be set to be set to invalid.By the present embodiment, when user is snapped,
Operation setting unit 806 can judge to the account of user or Internet protocol address, when this user is to limit object
When, the panic buying of this user will be limited according to preset control model or snap behavior, to ensure the panic buying machine of common snapper-up
Meeting, is also possible to prevent server simultaneously and leads to loading to increase because of the unexpected increase of visit capacity.
Figure 10 outputs operation setting unit 806 concrete structure provided in an embodiment of the present invention, comprising:
Pop-up module 8061, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input to test
Card code.
Determine that finding user in limiting list participates in the account snapped or the internet protocol using the terminal snapped
Behind view address, pop-up module 8061 will snap being predisposed to ejecting identifying code input frame, the input of described identifying code of interface
Frame will be prompted to user according to showing in identifying code input frame that identifying code inserts corresponding content.In the present embodiment, identifying code can
With using pure digi-tal identifying code, it would however also be possible to employ alphabetical identifying code or numeral and alphabetical combination.
Authentication module 8062, for obtaining the identifying code of user input, by the identifying code of described user input with described test
In card code input frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if differing
Cause, then export prompting message, described prompting message re-enters identifying code in order to point out user.
Authentication module 8062 judges to the identifying code of user input, after the identifying code judging user input is correct,
The operation of snapping of user is set to effectively, makes user can enter follow-up process of snapping, such as rank, place an order, pay the bill,
If the identifying code of user input is incorrect, user input identifying code will be pointed out again.
In the present embodiment, to limit user in the form of identifying code and enter and follow-up to snap process, by limiting user
Enter follow-up process of snapping and reduce the server problem that loading increases because moment visit capacity increases to reach.Need to note
Meaning, in the present embodiment, operation setting unit 806 uses identifying code input frame to show identifying code, makes user according to checking
The mode of the identifying code input content in code input frame snaps operation to limit user, but in a particular application, but short
Letter checking, transmission verbal messages make user complete picture mosaic etc. according to the information input checking content in speech message, dragging pattern
Verification mode, is not limited herein.
Figure 11 shows the structural representation of operation setting unit 806 provided in an embodiment of the present invention, comprising:
Pop-up module 8061, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input to test
Card code.
Authentication module 8062, for obtaining the identifying code of user input, by the identifying code of described user input with described test
In card code input frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if differing
Cause, then export prompting message, described prompting message re-enters identifying code in order to point out user.
Invalid module 8063, if for limiting accounts information or the Internet protocol address that there is described user in list,
Then by described user snap operation be set to invalid.
In the present embodiment, when the internet protocol of the account finding user in restricted list or the terminal of user's use
Behind view address, the operation of snapping of this user direct is set to invalid by invalid module 8063, and the operation of snapping refusing this user is carried out
Subsequently carry out.The present embodiment can effectively prevent such as cattle party, or increase visit capacity using software and reach panic buying
The panic buying behavior of the user of chance, it also avoid server simultaneously and makes because moment visit capacity leads to loading to increase in increase
If become delay machine the problems such as.
In above-described embodiment provided in an embodiment of the present invention, by detecting the access times of user come restricting user access
Operation, when user access operation limited after, will be unable to enter subsequent processes, or postpone enter subsequent processes.
It should be noted that in the above-described embodiments, it is invalid that the operation of user is set to, and refers to access control apparatus and use is being detected
During the operation at family, first accessing of detection user operates the condition whether meeting entrance subsequent processes, and the standard of judgement is user
Whether access times reach the account of preset access times or this user or the Internet protocol address of the terminal of use
It is in limiting list, when the operation of user does not meet the condition entering subsequent processes, the operation of this user will be rejected,
Server will be unable to receive the operation of user.And work as access control apparatus and the operation of user is set to after effectively, server can
To receive the operation of user, and process is snapped according to the operation execution of snapping of user.
Eleventh embodiment of the invention additionally provides a kind of terminal for executing access control, this terminal can be including
Mobile phone, panel computer, pda (personal digital assistant, personal digital assistant), desktop computer, vehicle-mounted computer
Terminal etc. the control operation that conducts interviews.
This terminal includes: one or more processor, memorizer and one or more program (module).Wherein should
One or more program (module) is stored in this memorizer, when by this one or more computing device, this process
Device execution is following to be operated:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit and exceed
The operation that the described user of described preset access times accesses.
Embodiment pass through detect access times in during cycle for the user, and to user access operation limited with
Control the visit capacity of user, reached with this and control the problem that in during cycle, visit capacity increases.
It should be understood that disclosed apparatus and method in several embodiments provided herein, can be passed through it
Its mode is realized.For example, device embodiment described above is only schematically, for example, the division of described module, and only
It is only a kind of division of logic function, actual can have other dividing mode when realizing, and for example multiple module or components can be tied
Close or be desirably integrated into another system, or some features can be ignored, or do not execute.Another, shown or discussed
Coupling each other or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or module or logical
Letter connects, and can be electrical, mechanical or other forms.
The described module illustrating as separating component can be or may not be physically separate, show as module
The part showing can be or may not be physical module, you can with positioned at a place, or can also be distributed to multiple
On mixed-media network modules mixed-media.The mesh to realize this embodiment scheme for some or all of module therein can be selected according to the actual needs
's.
In addition, can be integrated in a processing module in each functional module in each embodiment of the present invention it is also possible to
It is that modules are individually physically present it is also possible to two or more modules are integrated in a module.Above-mentioned integrated mould
Block both can be to be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.
If described integrated module is realized and as independent production marketing or use using in the form of software function module
When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part in other words prior art being contributed or all or part of this technical scheme can be in the form of software products
Embody, this computer software product is stored in a storage medium, including some instructions with so that a computer
Equipment (can be personal computer, server, or network equipment etc.) executes the complete of each embodiment methods described of the present invention
Portion or part steps.And aforesaid storage medium includes: u disk, portable hard drive, read only memory (rom, read-only
Memory), random access memory (ram, random access memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
It should be noted that for aforesaid each method embodiment, for easy description, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art also should know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module might not be all these
Bright necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
It is more than the description to access control method provided by the present invention and access control apparatus, for the skill of this area
Art personnel, according to the thought of the embodiment of the present invention, all will change in specific embodiments and applications, to sum up,
This specification content should not be construed as limitation of the present invention.
Claims (10)
1. a kind of access control method is it is characterised in that include:
The operation accessing in response to user, obtains access times in during cycle for the user;
After access times in during cycle for the described user is detected and reach preset access times, then limit exceed described
The operation that the described user of preset access times accesses.
2. access control method as claimed in claim 1, it is characterised in that the described operation in response to user's access, obtains
Access times in during cycle for the user include:
Detect user's access operation when, obtain the visit in during cycle of accounts information or Internet protocol address of user
Ask number of times;
After then described restriction exceedes the operation of described user's access of described preset access times, also include:
Using nginx+lua development technique, the accounts information of described user or Internet protocol address are preserved to restriction list
In.
3. access control method as claimed in claim 2 is it is characterised in that described access control method also includes:
When snapping operation of user is detected, obtain accounts information or the Internet protocol address of user;
Accounts information or Internet protocol address with the presence or absence of described user in list is limited by index search;
If existing, snap operation according to what preset control model limited described user, if not existing, by described user's
Snap operation to be set to effectively.
4. access control method as claimed in claim 3 it is characterised in that described limit according to preset control model described
The operation of snapping of user includes:
Eject identifying code input frame, described identifying code input frame is in order to point out user input identifying code;
Obtain the identifying code of user input, by the checking of display in the identifying code of described user input and described identifying code input frame
It is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, export prompting message, described carry
Show message in order to point out user to re-enter identifying code.
5. access control method as claimed in claim 3 it is characterised in that described limit according to preset control model described
The operation of snapping of user includes:
By described user snap operation be set to invalid.
6. a kind of access control apparatus are it is characterised in that include:
Number of times acquiring unit, for the operation accessing in response to user, obtains access times in during cycle for the user;
Operation limiting unit, reaches preset access times for access times in during cycle for the described user is detected
Afterwards, then limit and exceed the operation that the described user of described preset access times accesses.
7. access control apparatus as claimed in claim 6 it is characterised in that described acquiring unit specifically for:
Detect user's access operation when, obtain the visit in during cycle of accounts information or Internet protocol address of user
Ask number of times;
Then described access control apparatus also include:
Information holding unit, for using nginx+lua development technique by the accounts information of described user or Internet protocol ground
Location preserves to restriction list.
8. access control apparatus as claimed in claim 7 are it is characterised in that described access control apparatus also include:
Information acquisition unit, for when when snapping operation of user is detected, obtaining accounts information or the Internet protocol of user
Address;
Information searching unit, for limiting accounts information or the Internet with the presence or absence of described user in list by index search
Protocol address;
Operation setting unit, if for existing, snaps operation according to what preset control model limited described user, if not depositing
Then the operation of snapping of described user is being set to effectively.
9. access control apparatus as claimed in claim 8 are it is characterised in that described operation setting unit includes:
Pop-up module, for ejecting identifying code input frame, described identifying code input frame is in order to point out user input identifying code;
Authentication module, for obtaining the identifying code of user input, by the identifying code of described user input and the input of described identifying code
In frame, the checking of display is compared, if unanimously, the operation of snapping of described user is set to effectively, if inconsistent, exports
Prompting message, described prompting message re-enters identifying code in order to point out user.
10. access control apparatus as claimed in claim 8 are it is characterised in that described operation setting unit also includes:
Invalid module, if for limiting accounts information or the Internet protocol address that there is described user in list, will be described
User snap operation be set to invalid.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792114.3A CN106372992A (en) | 2016-08-31 | 2016-08-31 | Access control method and access control device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610792114.3A CN106372992A (en) | 2016-08-31 | 2016-08-31 | Access control method and access control device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106372992A true CN106372992A (en) | 2017-02-01 |
Family
ID=57899854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610792114.3A Pending CN106372992A (en) | 2016-08-31 | 2016-08-31 | Access control method and access control device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106372992A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878335A (en) * | 2017-03-28 | 2017-06-20 | 武汉斗鱼网络科技有限公司 | A kind of method and system for login authentication |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN112148756A (en) * | 2020-09-24 | 2020-12-29 | 四川长虹电器股份有限公司 | Commodity reservation and first-purchase optimization method |
CN113794679A (en) * | 2021-08-02 | 2021-12-14 | 浪潮软件股份有限公司 | Method and system for preventing automatic script number robbing |
-
2016
- 2016-08-31 CN CN201610792114.3A patent/CN106372992A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878335A (en) * | 2017-03-28 | 2017-06-20 | 武汉斗鱼网络科技有限公司 | A kind of method and system for login authentication |
CN111507729A (en) * | 2020-04-29 | 2020-08-07 | 广东所能网络有限公司 | Electronic commerce risk control system and method based on mobile internet |
CN112148756A (en) * | 2020-09-24 | 2020-12-29 | 四川长虹电器股份有限公司 | Commodity reservation and first-purchase optimization method |
CN113794679A (en) * | 2021-08-02 | 2021-12-14 | 浪潮软件股份有限公司 | Method and system for preventing automatic script number robbing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020037918A1 (en) | Risk control strategy determining method based on predictive model, and related device | |
CN106534572B (en) | Information display method, device and terminal | |
CN106372992A (en) | Access control method and access control device | |
CN103891242A (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
CN105306495B (en) | user identification method and device | |
CN105281906A (en) | Safety authentication method and device | |
CN107729745A (en) | Data processing method, terminal, computer installation and computer-readable recording medium | |
CN107346397A (en) | Information processing method and related product | |
CN109194689B (en) | Abnormal behavior recognition method, device, server and storage medium | |
CN107872555A (en) | Call recording method, device, terminal device and computer-readable recording medium | |
CN107657039A (en) | Bill recording method, mobile terminal and computer-readable recording medium | |
CN108702413A (en) | A kind of input method and device of identifying code | |
CN106341259A (en) | Fault information report method and device | |
CN107634947A (en) | Limitation malice logs in or the method and apparatus of registration | |
CN110705585A (en) | Network fraud identification method and device, computer device and storage medium | |
CN107563187A (en) | Access operation monitoring method, device, mobile terminal and readable storage medium storing program for executing | |
CN108235767A (en) | A kind of partition method, device and terminal for paying application | |
CN114726947B (en) | Message display method, device, user terminal and readable storage medium | |
CN108255936A (en) | A kind of edit methods of webpage, system and editing machine | |
CN106547833A (en) | Web browser method and device | |
CN104426960B (en) | A kind of trial method and device of payment applications | |
CN106294707A (en) | A kind of countdown information output intent and device | |
CN106856474A (en) | A kind of processing method and processing device of checking information | |
CN107871015A (en) | Daily record data processing method and processing device, terminal and readable storage medium storing program for executing | |
CN108076042A (en) | User information acquiring method, server and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170201 |
|
WD01 | Invention patent application deemed withdrawn after publication |