CN107888659A - The processing method and system of user's request - Google Patents

The processing method and system of user's request Download PDF

Info

Publication number
CN107888659A
CN107888659A CN201710951761.9A CN201710951761A CN107888659A CN 107888659 A CN107888659 A CN 107888659A CN 201710951761 A CN201710951761 A CN 201710951761A CN 107888659 A CN107888659 A CN 107888659A
Authority
CN
China
Prior art keywords
identity data
bloom filter
user
data
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710951761.9A
Other languages
Chinese (zh)
Inventor
高启航
孟春慧
袁建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201710951761.9A priority Critical patent/CN107888659A/en
Publication of CN107888659A publication Critical patent/CN107888659A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • H04L67/5651Reducing the amount or size of exchanged application data

Abstract

Present disclose provides a kind of processing method of user request, including:User's request is received, user's request includes the identity data of the user;Judge that the identity data whether there is in Bloom filter, the Bloom filter includes the identity data of legal user;And the user's acquisition request related data for the user being present according to the identity data in the Bloom filter.

Description

The processing method and system of user's request
Technical field
This disclosure relates to field of computer technology, processing method and a kind of use more particularly, to a kind of user request The processing system of family request.
Background technology
With the fast development of computer and Internet technology, network access traffic also increases substantially, huge moment Flowing of access can cause huge pressure to the background server and database of internet.And often deposited in magnanimity access request There is illegal request (for example, brushing situations such as single), how to filter out these illegal requests to alleviate background server sum Pressure according to storehouse is need emphasis to consider the problem of.
Filter illegal request usually using the method for white list in the prior art, for example, be stored with white list it is legal The ID of user, then the ID of visiting subscriber is compared with the validated user ID stored in white list, if come Visit ID to be not present in white list, then filter out the access request of the visiting subscriber.
During present inventive concept is realized, inventor has found that at least there are the following problems in the prior art, white list In directly storage validated user ID cause memory space excessive, take substantial amounts of disk space and memory headroom, waste Resource.
The content of the invention
In view of this, present disclose provides a kind of processing method and processing system for taking the less user's request of memory space System.
An aspect of this disclosure provides a kind of processing method of user's request, and this method includes:User's request is received, User's request includes the identity data of the user, judges that the identity data whether there is in Bloom filter, The Bloom filter includes the identity data of legal user, and is present in the grand mistake of the cloth according to the identity data User's acquisition request related data of user in filter.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:It is right The identity data is handled, and obtains at least one mapping data, it is determined that position data corresponding to each mapping data, institute Bit data includes the first numerical value and second value, and identity data described in first numerical representation method is present in the grand filtering of the cloth In device, the second value characterizes the identity data and is not present in the Bloom filter, and when each mapping When position data are the first numerical value corresponding to data, the identity data is present in the Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Judge that the identity data whether there is in blacklist, The blacklist includes the identity data for being present in the Bloom filter and illegal user.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including: When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:The Bloom filter is updated, wherein, the renewal institute Stating Bloom filter includes:Legal identity data is added in the Bloom filter;And/or by illegal identity number Deleted according to from the Bloom filter.
In accordance with an embodiment of the present disclosure, it is above-mentioned that legal identity data is added in the Bloom filter, including:Sentence The legal identity data that breaks whether there is in the blacklist, be present in the legal identity data in blacklist When, the legal identity data is deleted from the blacklist, the black name is not present in the legal identity data When in list, judge that the legal identity data whether there is in the Bloom filter, in the legal identity data When being not present in the Bloom filter, the legal identity data is added in the Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from the Bloom filter includes: The illegal identity data is added in the blacklist.
In accordance with an embodiment of the present disclosure, the above method also includes:When the identity data in the blacklist is more than default threshold During value, the Bloom filter is rebuild, and empties the blacklist.
Another aspect of the present disclosure provides a kind of processing system of user's request, and the system includes receiving module, first Judge module and acquisition module.Wherein, receiving module receives user's request, and user's request includes the body of the user Part data.First judge module judges that the identity data whether there is in Bloom filter, is wrapped in the Bloom filter Include the identity data of legal user.The user's that acquisition module is present in the Bloom filter according to the identity data User's acquisition request related data.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:It is right The identity data is handled, and obtains at least one mapping data, it is determined that position data corresponding to each mapping data, institute Bit data includes the first numerical value and second value, and identity data described in first numerical representation method is present in the grand filtering of the cloth In device, the second value characterizes the identity data and is not present in the Bloom filter, and when each mapping When position data are the first numerical value corresponding to data, the identity data is present in the Bloom filter.
In accordance with an embodiment of the present disclosure, said system also includes the second judge module.Second judge module judges the body Part data whether there is in blacklist, and the blacklist includes being present in the Bloom filter and illegal user Identity data.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including: When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, said system also includes update module.Update module updates the Bloom filter, Wherein, the renewal Bloom filter includes:Legal identity data is added in the Bloom filter, and/or Illegal identity data is deleted from the Bloom filter.
In accordance with an embodiment of the present disclosure, it is above-mentioned that legal identity data is added in the Bloom filter, including:Sentence The legal identity data that breaks whether there is in the blacklist, be present in the legal identity data in blacklist When, the legal identity data is deleted from the blacklist, the black name is not present in the legal identity data When in list, judge that the legal identity data whether there is in the Bloom filter, in the legal identity data When being not present in the Bloom filter, the legal identity data is added in the Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from the Bloom filter includes: The illegal identity data is added in the blacklist.
In accordance with an embodiment of the present disclosure, said system also includes reconstructed module.Reconstructed module works as the body in the blacklist When part data are more than predetermined threshold value, the Bloom filter is rebuild, and empty the blacklist.
Another aspect of the disclosure provides a kind of processing system of user's request, including:One or more processors, Storage device, for storing one or more programs, wherein, when one or more of programs are by one or more of processing When device performs so that one or more of computing device methods as described above.
Another aspect of the disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, and this refers to Order makes computing device method as described above when being executed by processor.
Another aspect of the present disclosure provides a kind of computer program, and the computer program includes the executable finger of computer Order, the instruction are used to realize method as described above when executed.
In accordance with an embodiment of the present disclosure, can solve the ID that validated user is directly stored in white list at least in part The problem of causing memory space excessive, and therefore can realize and illegal request is filtered out by Bloom filter, after mitigating The pressure of platform server and database, and the small technique effect of memory space that Bloom filter takes.
Brief description of the drawings
By the description to the embodiment of the present disclosure referring to the drawings, the above-mentioned and other purposes of the disclosure, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 diagrammatically illustrates the processing method and processing system that can apply to user's request according to the embodiment of the present disclosure The exemplary system architecture of system;
Fig. 2 diagrammatically illustrates the flow chart for the processing method asked according to the user of the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow chart for the processing method asked according to the user of another embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the side that legal identity data is added to Bloom filter according to the embodiment of the present disclosure The flow chart of method;
Fig. 5 diagrammatically illustrates the block diagram for the processing system asked according to the user of the embodiment of the present disclosure;And
Fig. 6 diagrammatically illustrates the block diagram of the computer system for the processing asked according to the user of the embodiment of the present disclosure.
Embodiment
Hereinafter, it will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are simply exemplary , and it is not intended to limit the scope of the present disclosure.In addition, in the following description, the description to known features and technology is eliminated, with Avoid unnecessarily obscuring the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.Used here as Word " one ", " one (kind) " and "the" etc. should also include " multiple ", the meaning of " a variety of ", unless context clearly refers in addition Go out.In addition, term " comprising " as used herein, "comprising" etc. indicate the presence of the feature, step, operation and/or part, But it is not excluded that in the presence of or other one or more features of addition, step, operation or parts.
All terms (including technology and scientific terminology) as used herein have what those skilled in the art were generally understood Implication, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Implication, without should by idealization or it is excessively mechanical in a manner of explain.
, in general should be according to this using in the case of being similar to that " in A, B and C etc. at least one " is such and stating Art personnel are generally understood that the implication of the statement to make an explanation (for example, " having system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or System with A, B, C etc.).Using in the case of being similar to that " in A, B or C etc. at least one " is such and stating, it is general come Say be generally understood that the implication of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art The system of one " should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily represent two or more The adversative conjunction and/or phrase of optional project, either in specification, claims or accompanying drawing, shall be construed as Give including one of these projects, the possibility of these projects either one or two projects.For example, " A or B " should for phrase It is understood to include " A " or " B " or " A and B " possibility.
Embodiment of the disclosure provides a kind of processing method of user's request and can apply the processing system of this method System.This method includes:User's request is received, user asks the identity data for including user, judges that identity data whether there is In Bloom filter, Bloom filter includes the identity data of legal user, and is present in cloth according to identity data User's acquisition request related data of user in grand filter.
In the disclosed embodiments, user is asked by using Bloom filter to carry out legitimacy verifies, filtered out non- Method is asked, and only legal user is asked to carry out relevant treatment, can mitigate the pressure of background server and database.Also, The identity data of user need not be directly stored in Bloom filter, memory space can be reduced, improves resource utilization.
Fig. 1 diagrammatically illustrates the processing method and processing system that can apply to user's request according to the embodiment of the present disclosure The exemplary system architecture 100 of system.
As shown in figure 1, terminal device 101,102,103, network can be included according to the system architecture 100 of the embodiment 104 and server 105.Network 104 is to the offer communication link between terminal device 101,102,103 and server 105 Medium.Network 104 can include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted with using terminal equipment 101,102,103 by network 104 with server 105, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 101,102,103 (merely illustrative) such as the application of page browsing device, searching class application, JICQ, mailbox client, social platform softwares.
Terminal device 101,102,103 can have a display screen and a various electronic equipments that supported web page browses, bag Include but be not limited to smart mobile phone, tablet personal computer, pocket computer on knee and desktop computer etc..
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user The website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to the use that receives The data such as family request analyze etc. processing, and by result (such as according to user's acquisition request or the webpage of generation, believe Breath or data etc.) feed back to terminal device.
It should be noted that the processing method that the embodiment of the present disclosure is provided can typically be performed by server 105.Accordingly Ground, the processing system that the embodiment of the present disclosure is provided can be typically arranged in server 105.What the embodiment of the present disclosure was provided User request processing method method can also by different from server 105 and can with terminal device 101,102,103 and/or The server or server cluster that server 105 communicates perform.Correspondingly, the processing system that the embodiment of the present disclosure is provided also may be used To be arranged at the server that is different from server 105 and can be communicated with terminal device 101,102,103 and/or server 105 Or in server cluster.Or the processing method that the embodiment of the present disclosure is provided can also be by terminal device 101,102 or 103 Perform, or can also be by different from terminal device 101,102 or the execution of 103 other-end equipment.Correspondingly, the disclosure is implemented The processing system that example is provided can also be arranged in terminal device 101,102 or 103, or is arranged at different from terminal device 101st, in 102 or 103 other-end equipment.
For example, terminal device 101 receives user's request, then terminal device 101 can be performed locally disclosure reality The processing method that example is provided is applied, or user's request is sent to other-end equipment, server or server cluster, and There is provided by the other-end equipment, server or the server cluster that receive user request to perform the embodiment of the present disclosure Processing method.
It should be understood that the number of the terminal device, network and server in Fig. 1 is only schematical.According to realizing need Will, can have any number of terminal device, network and server.
With reference to Fig. 1 system architecture, the use according to disclosure illustrative embodiments is described with reference to 2~Fig. 4 of figure The processing method of family request.It should be noted that said system framework is for only for ease of the spirit and principle for understanding the disclosure And show, embodiment of the present disclosure is unrestricted in this regard.On the contrary, embodiment of the present disclosure can apply to fit Any system architecture.
Fig. 2 diagrammatically illustrates the flow chart for the processing method asked according to the user of the embodiment of the present disclosure.
As shown in Fig. 2 this method includes operation S201~S203.
In operation S201, user's request is received, user asks the identity data for including user.
According to the embodiment of the present disclosure, user's request for example can be the access request of user, for example, user asks to access purchase Thing website, social network sites, gaming platform or search platform etc..
Include the identity data of user in user's request, identity data for example can be the character string of random length, example The user name (ID) of user or the client address of user can such as be included.In the disclosed embodiments, it is different to use The identity data at family is different, i.e. the corresponding identity data of a user.
For example, the user's request received can include:User A (the entitled Aa123 of user user) requests access Jingdone district " Jingdone district 618 promotees greatly commodity " relevant information.In another example the user's request received can also include:User's B (user names For Bb123 user) ask to access the relevant information on " Beijing weather forecast " of Baidu.
In operation S202, judge that identity data whether there is in Bloom filter, wherein, Bloom filter includes closing The identity data of the user of method.
According to the embodiment of the present disclosure, Bloom filter for example can be a binary vector and a series of Random Maps letters Number, it can be used for one element of retrieval whether in a set.For example, element can be the body of the user of currently transmitted request Part data, set can be the set of the identity data of legal user, and it is legal for example to include this in Bloom filter The set of the identity data of user, then Bloom filter can be used for retrieving the user of currently transmitted request identity data whether In the set of the identity data of legal user.If in the presence of, then it represents that the user of currently transmitted request is validated user, no Then, the user of currently transmitted request is disabled user.
In the disclosed embodiments, legal user for example can be no illegal operation record or rare illegal operation The user of record, illegal operation are recorded such as can be frequently brush single act.It is appreciated that the disclosure does not limit legal use Family and the specific determination methods of disabled user, those skilled in the art can be according to actual conditions to legal user and illegal User is defined.
According to the embodiment of the present disclosure, following operation can be included in Bloom filter by judging that identity data whether there is:
(1) identity data is handled, obtains at least one mapping data.
According to the embodiment of the present disclosure, identity data is handled, such as can be by a series of in Bloom filter Random mapping function is handled, and obtains at least one mapping data.
For example, a series of random mapping functions for example can include Message Digest 5 MD series (for example, MD2, MD3, MD4, MD5 etc.), SHA SHA serial (for example, SHA-1, SHA-256, SHA-384 etc.), Hash operation message authentication One or several kinds in the code hash function such as HMAC or Advanced Encryption Standard AES.
For example, the processing that user A identity data can pass through MD5 algorithms obtains mapping data A1, calculated by SHA-256 The processing of method obtains mapping data A2, obtains mapping data A3 by the processing of aes algorithm, then an identity data is at Reason, obtain corresponding 3 mappings data.
It is appreciated that the example above is only disclosure exemplary embodiment, the disclosure does not limit to be carried out to identity data The type function of processing, the number of function used in being handled identity data is not limited yet, those skilled in the art can The processing is set with the actual conditions such as quantity of the version of Bloom filter or user used in.
(2) position data corresponding to each mapping data are determined, position data include the first numerical value and second value, the first numerical value Characterize identity data to be present in Bloom filter, second value characterizes identity data and is not present in Bloom filter.
According to the embodiment of the present disclosure, because Bloom filter can include a very long binary vector, in the grand mistake of cloth During filter is built, the identity data of each legal user can be input in Bloom filter, then according to cloth Multiple mapping functions in grand filter are handled, and obtain multiple mapping data, then by two corresponding to multiple mapping data The position data of the position of system vector are set to the first value (for example, putting 1).
For example, the binary vector length in Bloom filter can be 000~999,1000 units can be placed According to, and the original state of 1000 bit data is for example all second value (for example, setting to 0).User A mapping data are A1, A2 And A3, then when building Bloom filter, the position data of the position (such as the 12nd) of binary vector corresponding to A1 are set to 1, the position data of the position (such as the 50th) of binary vector corresponding to A2 are set to 1, by binary vector corresponding to A3 The position data of position (such as the 100th) are set to 1.User B mapping data are B1, B2 and B3, then in structure Bloom filter When, the position data of the position (such as the 12nd) of binary vector corresponding to B1 are set to 1, by binary vector corresponding to B2 The position data of position (such as the 45th) are set to 1, by the position data of the position (such as the 500th) of binary vector corresponding to B3 It is set to 1.Similarly, the identity data of each legal user recorded in Bloom filter by the above method.Can be with Understanding, the example above is only that help understands, the disclosure does not limit the form and digit of the binary vector in Bloom filter, this Art personnel can set according to actual conditions.
It is appreciated that the first numerical value and second value of embodiment of the present disclosure contraposition data are not specifically limited, such as the One numerical value can be 1, and second value can be 0;Or first numerical value can be 0, second value can be 1, art technology Personnel can set according to actual conditions to the concrete numerical value of the first numerical value and second value.
According to the embodiment of the present disclosure, after the identity data of user of currently transmitted request is received, to the identity data Handled, obtain at least one mapping data, it is determined that the position data (example of the position of binary vector corresponding to mapping data Such as, the position data for determining relevant position are 0 or 1).
(3) when position data corresponding to each mapping data are the first numerical value, identity data is present in Bloom filter In.
According to the embodiment of the present disclosure, when position data corresponding to each mapping data are the first numerical value, then it represents that in structure When building Bloom filter, the identity data as legal identity data input into Bloom filter, therefore, the identity data Mapping position data corresponding to data, just meeting set is the first numerical value.At this time, it is believed that the identity data is present in Bloom filter, Belong to legal identity data.
If have in more bit datas corresponding to multiple mapping data not for the position data of the first numerical value, then it represents that the identity number According to being not present in Bloom filter, belong to illegal identity data.
For example, user A mapping data are A1, A2 and A3, if those corresponding position data of mapping data are the first number It is worth (for example, 1), then it represents that user A identity data is present in Bloom filter, belongs to legal identity data.User C's It is C1, C2 and C3 to map data, if position data corresponding to C1 are the second data (for example, 0), then it represents that user C identity data It is not present in Bloom filter, belongs to illegal identity data.
In the embodiment of the present disclosure, identity data is handled using multiple mapping functions, obtains multiple mapping data, and It is the first numerical value by data equal set in position corresponding to multiple mapping data, the degree of accuracy of authentication can be improved, effectively kept away Multiple identity datas are exempted from and have corresponded to same map data, the problem of so as to cause authentication inaccuracy.
In operation S203, the user's acquisition request dependency number for the user being present according to identity data in Bloom filter According to.
In the disclosed embodiments, if the identity data of user is present in Bloom filter, then it represents that the user is conjunction The user of method, receives the request of validated user, and according to the related data of its acquisition request to feed back to the user.If user Identity data be not present in Bloom filter, then it represents that the user is illegal user, for example, can not be to disabled user Request handled.
For example, receive user's request:User A (the entitled Aa123 of user user) requests access the " Jingdone district 618 in Jingdone district The relevant information of big rush commodity ".Empirical tests, if user A identity data (for example, Aa123) is present in Bloom filter, Asked in response to the user, obtain the relevant information of " Jingdone district 618 promotees greatly commodity ", feed back and show user A.If user A Identity data be not present in Bloom filter, then do not obtain relevant information, mitigate the pressure of background server and database.
The embodiment of the present disclosure stores the identity data of legal user by using Bloom filter, it is not necessary to directly records The identity data of each validated user, it is possible to reduce memory space, reduce the internal memory that the identity data of legal user takes Space or disk space.
According to the embodiment of the present disclosure, at least one mapping function is provided with Bloom filter, can be by an identity number According to multiple mapping data and position data corresponding with multiple mapping data are corresponded to, the degree of accuracy of verification can be improved, effectively Avoid multiple identity datas and correspond to same map data, the problem of so as to cause authentication inaccuracy.
Also, the embodiment of the present disclosure carries out legal checking by Bloom filter to user identity, if user identity is legal, Then respond the request of the user, if user identity is illegal, it does not asked to handle, can mitigate background server and The pressure of database.
Fig. 3 diagrammatically illustrates the flow chart for the processing method asked according to the user of another embodiment of the disclosure.
As shown in figure 3, this method includes S201, S203 and S301~S302.Wherein, operate S201 and operation S203 and The method that above-mentioned reference chart 2 describes is same or like, will not be repeated here.
In operation S301, judge that identity data whether there is in blacklist, blacklist includes being present in the grand filtering of cloth Device and the identity data of illegal user.
According to the embodiment of the present disclosure, if user A is validated user when building Bloom filter, user A mapping number It is the first numerical value according to position data corresponding to A1, A2, A3.During the use of Bloom filter, user A is because of some operation quilts Disabled user is defined as, then simply can not be deleted user A from Bloom filter, if for example, A1, A2, A3 is corresponding Position data be set to second value, it is likely that the checking of other validated users can be influenceed, for example, user B mapping data The position (such as the 12nd) of B1 and identical binary vector corresponding to user A mapping data A1, if simply that A1 is corresponding Position data be set to second value, it is clear that have impact on user B legitimacy.
Therefore, the embodiment of the present disclosure provides a blacklist, can include being present in Bloom filter in blacklist, But current identity is the identity data of illegal user, to solve the problems, such as that Bloom filter is not supported simply to delete.
In operation S302, when identity data is not present in blacklist, judge that identity data whether there is in the grand mistake of cloth In filter.
In the disclosed embodiments, when receive user request when, by determine the user user identity whether there is in In blacklist, if being present in blacklist, then it represents that the user is disabled user, then can not be to the request of the user at Reason, otherwise, judge that the identity data of the user whether there is in Bloom filter.
If the identity of the user is present in Bloom filter, then it represents that the user is legal user, can perform behaviour Make S203, otherwise it is assumed that the user is illegal user, then the request not to the user is handled.
In the disclosed embodiments, when asking to carry out legitimacy verifies to user using Bloom filter, due to using During, illegal user is likely to occur in Bloom filter, and can not be direct to the illegal user in Bloom filter Delete, the identity data for the illegal user that now will be present in Bloom filter is put into blacklist, solves the grand mistake of cloth The problem of can not directly being deleted in filter, so as to improve the degree of accuracy of verification and efficiency.
The method that the embodiment of the present disclosure additionally provides renewal Bloom filter, wherein, renewal Bloom filter includes:It will close The identity data of method is added in Bloom filter;And/or illegal identity data is deleted from Bloom filter.
Specifically, Fig. 4 diagrammatically illustrates is added to the grand mistake of cloth according to the embodiment of the present disclosure by legal identity data The flow chart of the method for filter.
As shown in figure 4, the method legal identity data being added in Bloom filter includes S401~S404.
In operation S401, judge that legal identity data whether there is in blacklist.
New legal identity data for example can be that new user's registration produces, or can be that disabled user is converted into conjunction Method user etc..
According to the embodiment of the present disclosure, when there is new legal user, first determine whether, whether the new legal user It is present in blacklist, if there is in blacklist, then it represents that the user is validated user when building Bloom filter, afterwards again Disabled user is converted into be added in blacklist.That is, the new legal identity data is that disabled user is converted into validated user.
In operation S402, when legal identity data is present in blacklist, legal identity is deleted from blacklist Data.
According to the embodiment of the present disclosure, if legal identity data is present in blacklist, then it represents that the identity number of the user According to also being stored in Bloom filter, now, the identity data of the user need to only be deleted from blacklist.
When receiving the request of the legal user, it is first determined the user is not present in blacklist, it is then determined that The user is present in Bloom filter, then it is legal user to prove the user, and it can be asked to respond.
In operation S403, when legal identity data is not present in blacklist, judge that the legal identity data is It is no to be present in Bloom filter.
When the legal identity data is not present in blacklist, the user is probably to be constantly in legal state, or The user is probably legal identity new caused by new user's registration, now, judge the user identity data whether there is in In Bloom filter.
In operation S404, when legal identity data is not present in Bloom filter, legal identity data is added It is added in Bloom filter.
If the identity data of the legal user is present in Bloom filter, then it represents that the user is constantly in legal shape State, it is not necessary to handle again it, if the identity data of the legal user is not present in Bloom filter, then it represents that should User is probably the user of new registration, at this point it is possible to which the identity data of the user is added in Bloom filter.
Also include in the method for the renewal Bloom filter that the disclosure provides by illegal identity data from the grand filtering of cloth Deleted in device.
Due to as described above, Bloom filter does not provide deletion function in itself, if directly by user from Bloom filter The legitimacy of other users can be influenceed by deleting.Therefore, can be by the user's when there is legal user to be converted into disabled user Identity data is added in blacklist.The identity data of the user stored in blacklist represents that the user is illegal user.
When the identity data in blacklist is more than predetermined threshold value, Bloom filter is rebuild, and empty blacklist.
According to the embodiment of the present disclosure, when the identity data for needing to delete in Bloom filter is excessive, i.e. in blacklist When identity data is more than predetermined threshold value, then need to rebuild Bloom filter.For example, the body using current legal user Part data rebuild Bloom filter.
After rebuilding Bloom filter, do not include the identity data of illegal user in Bloom filter now, Blacklist can be then emptied, when waiting next user being present in Bloom filter to be converted into disabled user by validated user, It is added to again in blacklist.
Can be that identity data in blacklist updates the grand filtering of cloth when being more than predetermined threshold value according to the embodiment of the present disclosure Device or set time update a Bloom filter, such as can be Bloom filters of renewal in each month etc.. The disclosure is not restricted for the opportunity and frequency for updating Bloom filter, and those skilled in the art can enter according to practical application Row is set.
According to the embodiment of the present disclosure, by being updated in real time or regularly to Bloom filter, for example, addition is legal User identity deletes illegal user identity, can improve the degree of accuracy of verification.
According to the embodiment of the present disclosure, when the illegal identity data quantity for needing to delete in Bloom filter gradually increases When, those illegal identity datas are all added in blacklist, cause the identity data in blacklist excessive, when in blacklist Identity data when being more than predetermined threshold value, cause blacklist to take excessive memory space, now can be by reconstructing the grand mistake of cloth Filter, blacklist is emptied, discharge memory space.
Fig. 5 diagrammatically illustrates the block diagram for the processing system 500 asked according to the user of the embodiment of the present disclosure.
As shown in figure 5, the processing system 500 of user's request includes receiving module 510, the first judge module 520, obtains mould Block 530, the second judge module 540, update module 550 and reconstructed module 560.
Receiving module 510 can receive user's request, and user asks the identity data for including user.It is real according to the disclosure Example is applied, receiving module 510 can for example perform the operation S201 above with reference to Fig. 2 descriptions, will not be repeated here.
First judge module 520 may determine that identity data whether there is in Bloom filter, be wrapped in Bloom filter Include the identity data of legal user.According to the embodiment of the present disclosure, the first judge module 520 can be for example performed above with reference to figure The operation S202 of 2 descriptions, will not be repeated here.
The user's acquisition request for the user that acquisition module 530 can be present in Bloom filter according to identity data is related Data.According to the embodiment of the present disclosure, acquisition module 530 can for example perform the operation S203 above with reference to Fig. 2 descriptions, herein not Repeat again.
Second judge module 540 may determine that identity data whether there is in blacklist, and blacklist includes being present in Bloom filter and the identity data of illegal user.According to the embodiment of the present disclosure, the second judge module 540 for example can be with The operation S301 above with reference to Fig. 3 descriptions is performed, will not be repeated here.
Update module 550 can update Bloom filter, wherein, renewal Bloom filter includes:By legal identity number According to being added in Bloom filter;And/or illegal identity data is deleted from Bloom filter.Implemented according to the disclosure Example, update module 550 can for example perform operation S401~S404 above with reference to Fig. 4 descriptions, will not be repeated here.
Reconstructed module 560 can rebuild Bloom filter when the identity data in blacklist is more than predetermined threshold value, And empty blacklist.
It is understood that receiving module 510, the first judge module 520, acquisition module 530, the second judge module 540, Update module 550 and reconstructed module 560 may be incorporated in a module and realize, or any one module therein can To be split into multiple modules.Or at least part function of one or more of these modules module can be with other moulds At least part function phase of block combines, and is realized in a module.According to an embodiment of the invention, receiving module 510, first At least one in judge module 520, acquisition module 530, the second judge module 540, update module 550 and reconstructed module 560 It is individual to be at least implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), on-chip system, the system on substrate, the system in encapsulation, application specific integrated circuit (ASIC), or can be to enter to circuit Row is integrated or the hardware such as any other rational method of encapsulation or firmware are realized, or with three kinds of software, hardware and firmware The appropriately combined of implementation is realized.Or receiving module 510, the first judge module 520, acquisition module 530, second sentence At least one in disconnected module 540, update module 550 and reconstructed module 560 can at least be implemented partly as computer Program module, when the program is run by computer, the function of corresponding module can be performed.
Fig. 6 diagrammatically illustrates the block diagram of the computer system for the processing asked according to the user of the embodiment of the present disclosure. Computer system shown in Fig. 6 is only an example, the function and use range of the embodiment of the present disclosure should not be brought any Limitation.
As shown in fig. 6, including processor 601 according to the computer system 600 of the embodiment of the present disclosure, it can be according to storage Program in read-only storage (ROM) 602 is loaded into random access storage device (RAM) 603 from storage part 608 Program and perform various appropriate actions and processing.Processor 601 can for example include general purpose microprocessor (such as CPU), refer to Make set processor and/or related chip group and/or special microprocessor (for example, application specific integrated circuit (ASIC)), etc..Processing Device 610 can also include being used for the onboard storage device for caching purposes.Processor 610 can include being used to perform with reference to 2~Fig. 4 of figure Single treatment unit either multiple processing units of the different actions of the method flow according to the embodiment of the present disclosure of description.
In RAM 603, it is stored with system 600 and operates required various programs and data.Processor 601, ROM 602 with And RAM 603 is connected with each other by bus 604.Processor 601 is held by performing the program in ROM 602 and/or RAM 603 Various operations of the row above with reference to Fig. 2~Fig. 4 user's request processing methods described.It is noted that described program can also deposit Storage is in one or more memories in addition to ROM 602 and RAM 603.Processor 601 can also be stored in by performing Program in one or more of memories performs above with reference to each of Fig. 2~Fig. 4 user's request processing methods described Kind operation.
In accordance with an embodiment of the present disclosure, system 600 can also include input/output (I/O) interface 605, input/output (I/O) interface 605 is also connected to bus 604.System 600 can also include be connected to I/O interfaces 605 with one in lower component Item is multinomial:Importation 606 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD) Deng and loudspeaker etc. output par, c 607;Storage part 608 including hard disk etc.;And including such as LAN card, modulatedemodulate Adjust the communications portion 609 of the NIC of device etc..Communications portion 609 performs communication process via the network of such as internet. Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor Memory etc., it is arranged on as needed on driver 610, in order to which the computer program read from it is pacified as needed Load storage part 608.
In accordance with an embodiment of the present disclosure, it may be implemented as computer software journey above with reference to the method for flow chart description Sequence.For example, embodiment of the disclosure includes a kind of computer program product, it includes carrying meter on a computer-readable medium Calculation machine program, the computer program include the program code for being used for the method shown in execution flow chart.In such embodiments, The computer program can be downloaded and installed by communications portion 609 from network, and/or be pacified from detachable media 611 Dress.When the computer program is performed by processor 601, the above-mentioned function of being limited in the system of the embodiment of the present disclosure is performed.Root According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come Realize.
It should be noted that the computer-readable medium shown in the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable recording medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, system, device or the device of infrared ray or semiconductor, or it is any more than combination.Meter The more specifically example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more wires, just Take formula computer disk, hard disk, random access storage device (RAM), read-only storage (ROM), erasable type and may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only storage (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer-readable recording medium can any include or store journey The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this In open, computer-readable signal media can be included in a base band or the data-signal as carrier wave part propagation, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium beyond storage medium is read, the computer-readable medium, which can send, propagates or transmit, to be used for By instruction execution system, device either device use or program in connection.Included on computer-readable medium Program code can be transmitted with any appropriate medium, be included but is not limited to:Wirelessly, electric wire, optical cable, RF etc., or it is above-mentioned Any appropriate combination.In accordance with an embodiment of the present disclosure, computer-readable medium can include above-described ROM 602 And/or one or more memories beyond RAM 603 and/or ROM 602 and RAM 603.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the disclosure, method and computer journey Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation The part of one module of table, program segment or code, a part for above-mentioned module, program segment or code include one or more For realizing the executable instruction of defined logic function.It should also be noted that some as replace realization in, institute in square frame The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also It is noted that the combination of each square frame and block diagram in block diagram or flow chart or the square frame in flow chart, can use and perform rule Fixed function or the special hardware based system of operation are realized, or can use the group of specialized hardware and computer instruction Close to realize.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, and the computer-readable medium can be Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating Machine computer-readable recording medium carries one or more program, when said one or multiple programs are performed by the equipment, makes Obtain equipment execution:Receive user's request, user asks to include the identity data of user, judge identity data with the presence or absence of in In Bloom filter, Bloom filter includes the identity data of legal user, and is present in Bu Long according to identity data User's acquisition request related data of user in filter.
In accordance with an embodiment of the present disclosure, above-mentioned judgement identity data whether there is in Bloom filter, including:To identity Data are handled, and obtain at least one mapping data, it is determined that each position data, position data include first corresponding to mapping data Numerical value and second value, the first numerical representation method identity data are present in Bloom filter, and second value characterizes identity data not It is present in Bloom filter, and when position data corresponding to each mapping data are the first numerical value, identity data is present In Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Judge that identity data whether there is in blacklist, black name List includes the identity data for being present in Bloom filter and illegal user.
In accordance with an embodiment of the present disclosure, above-mentioned judgement identity data whether there is in Bloom filter, including:In identity When data are not present in blacklist, judge that identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Bloom filter is updated, wherein, update Bloom filter Including:
Legal identity data is added in Bloom filter;And/or
Illegal identity data is deleted from Bloom filter.
In accordance with an embodiment of the present disclosure, the above method, wherein, legal identity data is added in Bloom filter, Including:Judge that legal identity data whether there is in blacklist, when legal identity data is present in blacklist, from Legal identity data is deleted in blacklist, when legal identity data is not present in blacklist, judges legal identity Data whether there is in Bloom filter, when legal identity data is not present in Bloom filter, by legal body Part data are added in Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from Bloom filter includes:Will not Legal identity data is added in blacklist.
In accordance with an embodiment of the present disclosure, the above method also includes:When the identity data in blacklist is more than predetermined threshold value, Bloom filter is rebuild, and empties blacklist.
Embodiment of the disclosure is described above.But the purpose that these embodiments are merely to illustrate that, and It is not intended to limit the scope of the present disclosure.Although respectively describing each embodiment more than, but it is not intended that each reality Use can not be advantageously combined by applying the measure in example.The scope of the present disclosure is defined by the appended claims and the equivalents thereof.Do not take off From the scope of the present disclosure, those skilled in the art can make a variety of alternatives and modifications, and these alternatives and modifications should all fall at this Within scope of disclosure.

Claims (18)

1. a kind of processing method of user's request, including:
User's request is received, user's request includes the identity data of the user;
Judge that the identity data whether there is in Bloom filter, the Bloom filter includes the body of legal user Part data;And
The user's acquisition request related data for the user being present according to the identity data in the Bloom filter.
2. according to the method for claim 1, wherein, the judgement identity data whether there is in Bloom filter In, including:
The identity data is handled, obtains at least one mapping data;
It is determined that position data corresponding to each mapping data, institute's bit data includes the first numerical value and second value, described the Identity data described in one numerical representation method is present in the Bloom filter, and the second value characterizes the identity data and do not deposited In the Bloom filter;And
When position data corresponding to each mapping data are the first numerical value, the identity data is present in the grand mistake of the cloth In filter.
3. the method according to claim 11, in addition to:
Judge that the identity data whether there is in blacklist, the blacklist includes being present in the Bloom filter simultaneously And the identity data of illegal user.
4. according to the method for claim 3, wherein, the judgement identity data whether there is in Bloom filter In, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter In.
5. the method according to claim 11, in addition to:The Bloom filter is updated, wherein, the renewal cloth is grand Filter includes:
Legal identity data is added in the Bloom filter;And/or
Illegal identity data is deleted from the Bloom filter.
6. the method according to claim 11, wherein, it is described that legal identity data is added to the Bloom filter In, including:
Judge that the legal identity data whether there is in the blacklist;
When the legal identity data is present in blacklist, the legal identity number is deleted from the blacklist According to;
When the legal identity data is not present in the blacklist, judge that the legal identity data whether there is In the Bloom filter;
When the legal identity data is not present in the Bloom filter, the legal identity data is added to In the Bloom filter.
7. the method according to claim 11, wherein, it is described to delete illegal identity data from the Bloom filter Except including:
The illegal identity data is added in the blacklist.
8. the method according to claim 11, in addition to:
When the identity data in the blacklist is more than predetermined threshold value, the Bloom filter is rebuild, and empty institute State blacklist.
9. a kind of processing system of user's request, including:
Receiving module, receives user's request, and user's request includes the identity data of the user;
First judge module, judge that the identity data whether there is in Bloom filter, the Bloom filter includes The identity data of legal user;And
Acquisition module, the user's acquisition request dependency number for the user being present according to the identity data in the Bloom filter According to.
10. system according to claim 9, wherein, it is described to judge that the identity data whether there is in Bloom filter In, including:
The identity data is handled, obtains at least one mapping data;
It is determined that position data corresponding to each mapping data, institute's bit data includes the first numerical value and second value, described the Identity data described in one numerical representation method is present in the Bloom filter, and the second value characterizes the identity data and do not deposited In the Bloom filter;And
When position data corresponding to each mapping data are the first numerical value, the identity data is present in the grand mistake of the cloth In filter.
11. system according to claim 9, in addition to:
Second judge module, judge that the identity data whether there is in blacklist, the blacklist includes being present in institute State Bloom filter and the identity data of illegal user.
12. system according to claim 11, wherein, it is described to judge that the identity data whether there is in Bloom filter In, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter In.
13. system according to claim 11, in addition to:Update module, the Bloom filter is updated, wherein, it is described Updating the Bloom filter includes:
Legal identity data is added in the Bloom filter;And/or
Illegal identity data is deleted from the Bloom filter.
14. system according to claim 13, wherein, it is described that legal identity data is added to the Bloom filter In, including:
Judge that the legal identity data whether there is in the blacklist;
When the legal identity data is present in blacklist, the legal identity number is deleted from the blacklist According to;
When the legal identity data is not present in the blacklist, judge that the legal identity data whether there is In the Bloom filter;
When the legal identity data is not present in the Bloom filter, the legal identity data is added to In the Bloom filter.
15. system according to claim 13, wherein, it is described by illegal identity data from the Bloom filter Deletion includes:
The illegal identity data is added in the blacklist.
16. system according to claim 11, in addition to:
Reconstructed module, when the identity data in the blacklist is more than predetermined threshold value, the Bloom filter is rebuild, and And empty the blacklist.
17. a kind of processing system of user's request, including:
One or more processors;
Storage device, for storing one or more programs,
Wherein, when one or more of programs are by one or more of computing devices so that one or more of Computing device is according to method according to any one of claims 1 to 8.
18. a kind of computer-readable medium, is stored thereon with executable instruction, the instruction holds processor when being executed by processor Row is according to method according to any one of claims 1 to 8.
CN201710951761.9A 2017-10-12 2017-10-12 The processing method and system of user's request Pending CN107888659A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710951761.9A CN107888659A (en) 2017-10-12 2017-10-12 The processing method and system of user's request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710951761.9A CN107888659A (en) 2017-10-12 2017-10-12 The processing method and system of user's request

Publications (1)

Publication Number Publication Date
CN107888659A true CN107888659A (en) 2018-04-06

Family

ID=61781598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710951761.9A Pending CN107888659A (en) 2017-10-12 2017-10-12 The processing method and system of user's request

Country Status (1)

Country Link
CN (1) CN107888659A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255001A (en) * 2018-08-31 2019-01-22 阿里巴巴集团控股有限公司 Maintaining method and device, the electronic equipment in interface instance library
CN109299147A (en) * 2018-09-26 2019-02-01 中国平安人寿保险股份有限公司 Database access processing method, device, computer equipment and storage medium
CN109614407A (en) * 2018-12-10 2019-04-12 北京奇艺世纪科技有限公司 A kind of request processing method and equipment
CN110209874A (en) * 2019-04-24 2019-09-06 北京奇艺世纪科技有限公司 Information processing method, device, electronic equipment and storage medium
CN110324329A (en) * 2019-06-21 2019-10-11 深圳前海微众银行股份有限公司 Auth method, device, equipment and computer readable storage medium
CN111581512A (en) * 2020-05-08 2020-08-25 孙颐 Webpage visitor number statistical method and device
CN112330366A (en) * 2020-11-13 2021-02-05 北京沃东天骏信息技术有限公司 Redemption code redemption request verification method, apparatus, device and computer readable medium
CN112527433A (en) * 2020-12-08 2021-03-19 平安科技(深圳)有限公司 Page popup control method and device, computer equipment and storage medium
CN112989147A (en) * 2021-02-20 2021-06-18 每日互动股份有限公司 Data information pushing method and device, computer equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938583A (en) * 2010-09-03 2011-01-05 电子科技大学 Method for filtering abnormal call based on multiple lists
CN102253991A (en) * 2011-05-25 2011-11-23 北京星网锐捷网络技术有限公司 Uniform resource locator (URL) storage method, web filtering method, device and system
CN102682037A (en) * 2011-03-18 2012-09-19 阿里巴巴集团控股有限公司 Data acquisition method, system and device
CN103248472A (en) * 2013-04-16 2013-08-14 华为技术有限公司 Operation request processing method and system and attack identification device
CN103544316A (en) * 2013-11-06 2014-01-29 苏州大拿信息技术有限公司 Uniform resource locator (URL) filtering system and achieving method thereof
KR101381614B1 (en) * 2012-10-24 2014-04-10 아주대학교산학협력단 Countermeasure apparatus and method against sip flooding attacks using a bloom filter
CN104506525A (en) * 2014-12-22 2015-04-08 北京奇虎科技有限公司 Method for preventing malicious grabbing and protection device
CN104601557A (en) * 2014-12-29 2015-05-06 广东顺德中山大学卡内基梅隆大学国际联合研究院 Method and system for defending malicious websites based on software-defined network
CN105718455A (en) * 2014-12-01 2016-06-29 阿里巴巴集团控股有限公司 Data query method and apparatus
CN107087007A (en) * 2017-05-25 2017-08-22 腾讯科技(深圳)有限公司 A kind of defence method of network attack, relevant device and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938583A (en) * 2010-09-03 2011-01-05 电子科技大学 Method for filtering abnormal call based on multiple lists
CN102682037A (en) * 2011-03-18 2012-09-19 阿里巴巴集团控股有限公司 Data acquisition method, system and device
CN102253991A (en) * 2011-05-25 2011-11-23 北京星网锐捷网络技术有限公司 Uniform resource locator (URL) storage method, web filtering method, device and system
KR101381614B1 (en) * 2012-10-24 2014-04-10 아주대학교산학협력단 Countermeasure apparatus and method against sip flooding attacks using a bloom filter
CN103248472A (en) * 2013-04-16 2013-08-14 华为技术有限公司 Operation request processing method and system and attack identification device
CN103544316A (en) * 2013-11-06 2014-01-29 苏州大拿信息技术有限公司 Uniform resource locator (URL) filtering system and achieving method thereof
CN105718455A (en) * 2014-12-01 2016-06-29 阿里巴巴集团控股有限公司 Data query method and apparatus
CN104506525A (en) * 2014-12-22 2015-04-08 北京奇虎科技有限公司 Method for preventing malicious grabbing and protection device
CN104601557A (en) * 2014-12-29 2015-05-06 广东顺德中山大学卡内基梅隆大学国际联合研究院 Method and system for defending malicious websites based on software-defined network
CN107087007A (en) * 2017-05-25 2017-08-22 腾讯科技(深圳)有限公司 A kind of defence method of network attack, relevant device and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255001A (en) * 2018-08-31 2019-01-22 阿里巴巴集团控股有限公司 Maintaining method and device, the electronic equipment in interface instance library
CN109299147A (en) * 2018-09-26 2019-02-01 中国平安人寿保险股份有限公司 Database access processing method, device, computer equipment and storage medium
CN109299147B (en) * 2018-09-26 2024-04-05 中国平安人寿保险股份有限公司 Database access processing method, device, computer equipment and storage medium
CN109614407A (en) * 2018-12-10 2019-04-12 北京奇艺世纪科技有限公司 A kind of request processing method and equipment
CN110209874A (en) * 2019-04-24 2019-09-06 北京奇艺世纪科技有限公司 Information processing method, device, electronic equipment and storage medium
CN110209874B (en) * 2019-04-24 2021-08-20 北京奇艺世纪科技有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN110324329A (en) * 2019-06-21 2019-10-11 深圳前海微众银行股份有限公司 Auth method, device, equipment and computer readable storage medium
CN111581512A (en) * 2020-05-08 2020-08-25 孙颐 Webpage visitor number statistical method and device
CN111581512B (en) * 2020-05-08 2023-06-02 孙颐 Webpage visitor quantity counting method and device
CN112330366A (en) * 2020-11-13 2021-02-05 北京沃东天骏信息技术有限公司 Redemption code redemption request verification method, apparatus, device and computer readable medium
CN112527433A (en) * 2020-12-08 2021-03-19 平安科技(深圳)有限公司 Page popup control method and device, computer equipment and storage medium
CN112989147A (en) * 2021-02-20 2021-06-18 每日互动股份有限公司 Data information pushing method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107888659A (en) The processing method and system of user's request
CN106886375A (en) The method and apparatus of data storage
CN106133743B (en) System and method for optimizing the scanning of pre-installation application program
CN110019211A (en) The methods, devices and systems of association index
CN110019080B (en) Data access method and device
US20200183906A1 (en) Using an lsm tree file structure for the on-disk format of an object storage platform
CN110019125A (en) The method and apparatus of data base administration
CN105760395A (en) Data processing method, device and system
CN110209662A (en) A kind of method and apparatus of automation load data
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN108536617A (en) Buffer memory management method, medium, system and electronic equipment
CN103580991B (en) The method for uploading and equipment of a kind of Email attachment
CN113536185A (en) Application page loading method, storage medium and related equipment thereof
CN110119386A (en) Data processing method, data processing equipment, medium and calculating equipment
CN112241298A (en) Page display method and device, storage medium and electronic device
CN110020373A (en) The method and apparatus that static page is stored, browsed
CN108494728A (en) Blacklist base establishing method, device, equipment and the medium for preventing flow from kidnapping
WO2019091101A1 (en) Salary calculation method, application server and computer-readable storage medium
CN116842012A (en) Method, device, equipment and storage medium for storing Redis cluster in fragments
CN107133245A (en) Presence information management system, method and electronic equipment
CN110019531A (en) A kind of method and apparatus obtaining analogical object set
CN115543428A (en) Simulated data generation method and device based on strategy template
CN115203672A (en) Information access control method and device, computer equipment and medium
CN107832347A (en) Method of Data with Adding Windows, system and electronic equipment
CN110019366A (en) A kind of data cached method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180406