CN107888659A - The processing method and system of user's request - Google Patents
The processing method and system of user's request Download PDFInfo
- Publication number
- CN107888659A CN107888659A CN201710951761.9A CN201710951761A CN107888659A CN 107888659 A CN107888659 A CN 107888659A CN 201710951761 A CN201710951761 A CN 201710951761A CN 107888659 A CN107888659 A CN 107888659A
- Authority
- CN
- China
- Prior art keywords
- identity data
- bloom filter
- user
- data
- blacklist
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
- H04L67/5651—Reducing the amount or size of exchanged application data
Abstract
Present disclose provides a kind of processing method of user request, including:User's request is received, user's request includes the identity data of the user;Judge that the identity data whether there is in Bloom filter, the Bloom filter includes the identity data of legal user;And the user's acquisition request related data for the user being present according to the identity data in the Bloom filter.
Description
Technical field
This disclosure relates to field of computer technology, processing method and a kind of use more particularly, to a kind of user request
The processing system of family request.
Background technology
With the fast development of computer and Internet technology, network access traffic also increases substantially, huge moment
Flowing of access can cause huge pressure to the background server and database of internet.And often deposited in magnanimity access request
There is illegal request (for example, brushing situations such as single), how to filter out these illegal requests to alleviate background server sum
Pressure according to storehouse is need emphasis to consider the problem of.
Filter illegal request usually using the method for white list in the prior art, for example, be stored with white list it is legal
The ID of user, then the ID of visiting subscriber is compared with the validated user ID stored in white list, if come
Visit ID to be not present in white list, then filter out the access request of the visiting subscriber.
During present inventive concept is realized, inventor has found that at least there are the following problems in the prior art, white list
In directly storage validated user ID cause memory space excessive, take substantial amounts of disk space and memory headroom, waste
Resource.
The content of the invention
In view of this, present disclose provides a kind of processing method and processing system for taking the less user's request of memory space
System.
An aspect of this disclosure provides a kind of processing method of user's request, and this method includes:User's request is received,
User's request includes the identity data of the user, judges that the identity data whether there is in Bloom filter,
The Bloom filter includes the identity data of legal user, and is present in the grand mistake of the cloth according to the identity data
User's acquisition request related data of user in filter.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:It is right
The identity data is handled, and obtains at least one mapping data, it is determined that position data corresponding to each mapping data, institute
Bit data includes the first numerical value and second value, and identity data described in first numerical representation method is present in the grand filtering of the cloth
In device, the second value characterizes the identity data and is not present in the Bloom filter, and when each mapping
When position data are the first numerical value corresponding to data, the identity data is present in the Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Judge that the identity data whether there is in blacklist,
The blacklist includes the identity data for being present in the Bloom filter and illegal user.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:The Bloom filter is updated, wherein, the renewal institute
Stating Bloom filter includes:Legal identity data is added in the Bloom filter;And/or by illegal identity number
Deleted according to from the Bloom filter.
In accordance with an embodiment of the present disclosure, it is above-mentioned that legal identity data is added in the Bloom filter, including:Sentence
The legal identity data that breaks whether there is in the blacklist, be present in the legal identity data in blacklist
When, the legal identity data is deleted from the blacklist, the black name is not present in the legal identity data
When in list, judge that the legal identity data whether there is in the Bloom filter, in the legal identity data
When being not present in the Bloom filter, the legal identity data is added in the Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from the Bloom filter includes:
The illegal identity data is added in the blacklist.
In accordance with an embodiment of the present disclosure, the above method also includes:When the identity data in the blacklist is more than default threshold
During value, the Bloom filter is rebuild, and empties the blacklist.
Another aspect of the present disclosure provides a kind of processing system of user's request, and the system includes receiving module, first
Judge module and acquisition module.Wherein, receiving module receives user's request, and user's request includes the body of the user
Part data.First judge module judges that the identity data whether there is in Bloom filter, is wrapped in the Bloom filter
Include the identity data of legal user.The user's that acquisition module is present in the Bloom filter according to the identity data
User's acquisition request related data.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:It is right
The identity data is handled, and obtains at least one mapping data, it is determined that position data corresponding to each mapping data, institute
Bit data includes the first numerical value and second value, and identity data described in first numerical representation method is present in the grand filtering of the cloth
In device, the second value characterizes the identity data and is not present in the Bloom filter, and when each mapping
When position data are the first numerical value corresponding to data, the identity data is present in the Bloom filter.
In accordance with an embodiment of the present disclosure, said system also includes the second judge module.Second judge module judges the body
Part data whether there is in blacklist, and the blacklist includes being present in the Bloom filter and illegal user
Identity data.
In accordance with an embodiment of the present disclosure, the above-mentioned judgement identity data whether there is in Bloom filter, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, said system also includes update module.Update module updates the Bloom filter,
Wherein, the renewal Bloom filter includes:Legal identity data is added in the Bloom filter, and/or
Illegal identity data is deleted from the Bloom filter.
In accordance with an embodiment of the present disclosure, it is above-mentioned that legal identity data is added in the Bloom filter, including:Sentence
The legal identity data that breaks whether there is in the blacklist, be present in the legal identity data in blacklist
When, the legal identity data is deleted from the blacklist, the black name is not present in the legal identity data
When in list, judge that the legal identity data whether there is in the Bloom filter, in the legal identity data
When being not present in the Bloom filter, the legal identity data is added in the Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from the Bloom filter includes:
The illegal identity data is added in the blacklist.
In accordance with an embodiment of the present disclosure, said system also includes reconstructed module.Reconstructed module works as the body in the blacklist
When part data are more than predetermined threshold value, the Bloom filter is rebuild, and empty the blacklist.
Another aspect of the disclosure provides a kind of processing system of user's request, including:One or more processors,
Storage device, for storing one or more programs, wherein, when one or more of programs are by one or more of processing
When device performs so that one or more of computing device methods as described above.
Another aspect of the disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, and this refers to
Order makes computing device method as described above when being executed by processor.
Another aspect of the present disclosure provides a kind of computer program, and the computer program includes the executable finger of computer
Order, the instruction are used to realize method as described above when executed.
In accordance with an embodiment of the present disclosure, can solve the ID that validated user is directly stored in white list at least in part
The problem of causing memory space excessive, and therefore can realize and illegal request is filtered out by Bloom filter, after mitigating
The pressure of platform server and database, and the small technique effect of memory space that Bloom filter takes.
Brief description of the drawings
By the description to the embodiment of the present disclosure referring to the drawings, the above-mentioned and other purposes of the disclosure, feature and
Advantage will be apparent from, in the accompanying drawings:
Fig. 1 diagrammatically illustrates the processing method and processing system that can apply to user's request according to the embodiment of the present disclosure
The exemplary system architecture of system;
Fig. 2 diagrammatically illustrates the flow chart for the processing method asked according to the user of the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow chart for the processing method asked according to the user of another embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the side that legal identity data is added to Bloom filter according to the embodiment of the present disclosure
The flow chart of method;
Fig. 5 diagrammatically illustrates the block diagram for the processing system asked according to the user of the embodiment of the present disclosure;And
Fig. 6 diagrammatically illustrates the block diagram of the computer system for the processing asked according to the user of the embodiment of the present disclosure.
Embodiment
Hereinafter, it will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are simply exemplary
, and it is not intended to limit the scope of the present disclosure.In addition, in the following description, the description to known features and technology is eliminated, with
Avoid unnecessarily obscuring the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.Used here as
Word " one ", " one (kind) " and "the" etc. should also include " multiple ", the meaning of " a variety of ", unless context clearly refers in addition
Go out.In addition, term " comprising " as used herein, "comprising" etc. indicate the presence of the feature, step, operation and/or part,
But it is not excluded that in the presence of or other one or more features of addition, step, operation or parts.
All terms (including technology and scientific terminology) as used herein have what those skilled in the art were generally understood
Implication, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Implication, without should by idealization or it is excessively mechanical in a manner of explain.
, in general should be according to this using in the case of being similar to that " in A, B and C etc. at least one " is such and stating
Art personnel are generally understood that the implication of the statement to make an explanation (for example, " having system at least one in A, B and C "
Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with B and C, and/or
System with A, B, C etc.).Using in the case of being similar to that " in A, B or C etc. at least one " is such and stating, it is general come
Say be generally understood that the implication of the statement to make an explanation (for example, " having in A, B or C at least according to those skilled in the art
The system of one " should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, with
B and C, and/or system etc. with A, B, C).It should also be understood by those skilled in the art that substantially arbitrarily represent two or more
The adversative conjunction and/or phrase of optional project, either in specification, claims or accompanying drawing, shall be construed as
Give including one of these projects, the possibility of these projects either one or two projects.For example, " A or B " should for phrase
It is understood to include " A " or " B " or " A and B " possibility.
Embodiment of the disclosure provides a kind of processing method of user's request and can apply the processing system of this method
System.This method includes:User's request is received, user asks the identity data for including user, judges that identity data whether there is
In Bloom filter, Bloom filter includes the identity data of legal user, and is present in cloth according to identity data
User's acquisition request related data of user in grand filter.
In the disclosed embodiments, user is asked by using Bloom filter to carry out legitimacy verifies, filtered out non-
Method is asked, and only legal user is asked to carry out relevant treatment, can mitigate the pressure of background server and database.Also,
The identity data of user need not be directly stored in Bloom filter, memory space can be reduced, improves resource utilization.
Fig. 1 diagrammatically illustrates the processing method and processing system that can apply to user's request according to the embodiment of the present disclosure
The exemplary system architecture 100 of system.
As shown in figure 1, terminal device 101,102,103, network can be included according to the system architecture 100 of the embodiment
104 and server 105.Network 104 is to the offer communication link between terminal device 101,102,103 and server 105
Medium.Network 104 can include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted with using terminal equipment 101,102,103 by network 104 with server 105, to receive or send out
Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 101,102,103
(merely illustrative) such as the application of page browsing device, searching class application, JICQ, mailbox client, social platform softwares.
Terminal device 101,102,103 can have a display screen and a various electronic equipments that supported web page browses, bag
Include but be not limited to smart mobile phone, tablet personal computer, pocket computer on knee and desktop computer etc..
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user
The website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to the use that receives
The data such as family request analyze etc. processing, and by result (such as according to user's acquisition request or the webpage of generation, believe
Breath or data etc.) feed back to terminal device.
It should be noted that the processing method that the embodiment of the present disclosure is provided can typically be performed by server 105.Accordingly
Ground, the processing system that the embodiment of the present disclosure is provided can be typically arranged in server 105.What the embodiment of the present disclosure was provided
User request processing method method can also by different from server 105 and can with terminal device 101,102,103 and/or
The server or server cluster that server 105 communicates perform.Correspondingly, the processing system that the embodiment of the present disclosure is provided also may be used
To be arranged at the server that is different from server 105 and can be communicated with terminal device 101,102,103 and/or server 105
Or in server cluster.Or the processing method that the embodiment of the present disclosure is provided can also be by terminal device 101,102 or 103
Perform, or can also be by different from terminal device 101,102 or the execution of 103 other-end equipment.Correspondingly, the disclosure is implemented
The processing system that example is provided can also be arranged in terminal device 101,102 or 103, or is arranged at different from terminal device
101st, in 102 or 103 other-end equipment.
For example, terminal device 101 receives user's request, then terminal device 101 can be performed locally disclosure reality
The processing method that example is provided is applied, or user's request is sent to other-end equipment, server or server cluster, and
There is provided by the other-end equipment, server or the server cluster that receive user request to perform the embodiment of the present disclosure
Processing method.
It should be understood that the number of the terminal device, network and server in Fig. 1 is only schematical.According to realizing need
Will, can have any number of terminal device, network and server.
With reference to Fig. 1 system architecture, the use according to disclosure illustrative embodiments is described with reference to 2~Fig. 4 of figure
The processing method of family request.It should be noted that said system framework is for only for ease of the spirit and principle for understanding the disclosure
And show, embodiment of the present disclosure is unrestricted in this regard.On the contrary, embodiment of the present disclosure can apply to fit
Any system architecture.
Fig. 2 diagrammatically illustrates the flow chart for the processing method asked according to the user of the embodiment of the present disclosure.
As shown in Fig. 2 this method includes operation S201~S203.
In operation S201, user's request is received, user asks the identity data for including user.
According to the embodiment of the present disclosure, user's request for example can be the access request of user, for example, user asks to access purchase
Thing website, social network sites, gaming platform or search platform etc..
Include the identity data of user in user's request, identity data for example can be the character string of random length, example
The user name (ID) of user or the client address of user can such as be included.In the disclosed embodiments, it is different to use
The identity data at family is different, i.e. the corresponding identity data of a user.
For example, the user's request received can include:User A (the entitled Aa123 of user user) requests access Jingdone district
" Jingdone district 618 promotees greatly commodity " relevant information.In another example the user's request received can also include:User's B (user names
For Bb123 user) ask to access the relevant information on " Beijing weather forecast " of Baidu.
In operation S202, judge that identity data whether there is in Bloom filter, wherein, Bloom filter includes closing
The identity data of the user of method.
According to the embodiment of the present disclosure, Bloom filter for example can be a binary vector and a series of Random Maps letters
Number, it can be used for one element of retrieval whether in a set.For example, element can be the body of the user of currently transmitted request
Part data, set can be the set of the identity data of legal user, and it is legal for example to include this in Bloom filter
The set of the identity data of user, then Bloom filter can be used for retrieving the user of currently transmitted request identity data whether
In the set of the identity data of legal user.If in the presence of, then it represents that the user of currently transmitted request is validated user, no
Then, the user of currently transmitted request is disabled user.
In the disclosed embodiments, legal user for example can be no illegal operation record or rare illegal operation
The user of record, illegal operation are recorded such as can be frequently brush single act.It is appreciated that the disclosure does not limit legal use
Family and the specific determination methods of disabled user, those skilled in the art can be according to actual conditions to legal user and illegal
User is defined.
According to the embodiment of the present disclosure, following operation can be included in Bloom filter by judging that identity data whether there is:
(1) identity data is handled, obtains at least one mapping data.
According to the embodiment of the present disclosure, identity data is handled, such as can be by a series of in Bloom filter
Random mapping function is handled, and obtains at least one mapping data.
For example, a series of random mapping functions for example can include Message Digest 5 MD series (for example, MD2, MD3,
MD4, MD5 etc.), SHA SHA serial (for example, SHA-1, SHA-256, SHA-384 etc.), Hash operation message authentication
One or several kinds in the code hash function such as HMAC or Advanced Encryption Standard AES.
For example, the processing that user A identity data can pass through MD5 algorithms obtains mapping data A1, calculated by SHA-256
The processing of method obtains mapping data A2, obtains mapping data A3 by the processing of aes algorithm, then an identity data is at
Reason, obtain corresponding 3 mappings data.
It is appreciated that the example above is only disclosure exemplary embodiment, the disclosure does not limit to be carried out to identity data
The type function of processing, the number of function used in being handled identity data is not limited yet, those skilled in the art can
The processing is set with the actual conditions such as quantity of the version of Bloom filter or user used in.
(2) position data corresponding to each mapping data are determined, position data include the first numerical value and second value, the first numerical value
Characterize identity data to be present in Bloom filter, second value characterizes identity data and is not present in Bloom filter.
According to the embodiment of the present disclosure, because Bloom filter can include a very long binary vector, in the grand mistake of cloth
During filter is built, the identity data of each legal user can be input in Bloom filter, then according to cloth
Multiple mapping functions in grand filter are handled, and obtain multiple mapping data, then by two corresponding to multiple mapping data
The position data of the position of system vector are set to the first value (for example, putting 1).
For example, the binary vector length in Bloom filter can be 000~999,1000 units can be placed
According to, and the original state of 1000 bit data is for example all second value (for example, setting to 0).User A mapping data are A1, A2
And A3, then when building Bloom filter, the position data of the position (such as the 12nd) of binary vector corresponding to A1 are set to
1, the position data of the position (such as the 50th) of binary vector corresponding to A2 are set to 1, by binary vector corresponding to A3
The position data of position (such as the 100th) are set to 1.User B mapping data are B1, B2 and B3, then in structure Bloom filter
When, the position data of the position (such as the 12nd) of binary vector corresponding to B1 are set to 1, by binary vector corresponding to B2
The position data of position (such as the 45th) are set to 1, by the position data of the position (such as the 500th) of binary vector corresponding to B3
It is set to 1.Similarly, the identity data of each legal user recorded in Bloom filter by the above method.Can be with
Understanding, the example above is only that help understands, the disclosure does not limit the form and digit of the binary vector in Bloom filter, this
Art personnel can set according to actual conditions.
It is appreciated that the first numerical value and second value of embodiment of the present disclosure contraposition data are not specifically limited, such as the
One numerical value can be 1, and second value can be 0;Or first numerical value can be 0, second value can be 1, art technology
Personnel can set according to actual conditions to the concrete numerical value of the first numerical value and second value.
According to the embodiment of the present disclosure, after the identity data of user of currently transmitted request is received, to the identity data
Handled, obtain at least one mapping data, it is determined that the position data (example of the position of binary vector corresponding to mapping data
Such as, the position data for determining relevant position are 0 or 1).
(3) when position data corresponding to each mapping data are the first numerical value, identity data is present in Bloom filter
In.
According to the embodiment of the present disclosure, when position data corresponding to each mapping data are the first numerical value, then it represents that in structure
When building Bloom filter, the identity data as legal identity data input into Bloom filter, therefore, the identity data
Mapping position data corresponding to data, just meeting set is the first numerical value.At this time, it is believed that the identity data is present in Bloom filter,
Belong to legal identity data.
If have in more bit datas corresponding to multiple mapping data not for the position data of the first numerical value, then it represents that the identity number
According to being not present in Bloom filter, belong to illegal identity data.
For example, user A mapping data are A1, A2 and A3, if those corresponding position data of mapping data are the first number
It is worth (for example, 1), then it represents that user A identity data is present in Bloom filter, belongs to legal identity data.User C's
It is C1, C2 and C3 to map data, if position data corresponding to C1 are the second data (for example, 0), then it represents that user C identity data
It is not present in Bloom filter, belongs to illegal identity data.
In the embodiment of the present disclosure, identity data is handled using multiple mapping functions, obtains multiple mapping data, and
It is the first numerical value by data equal set in position corresponding to multiple mapping data, the degree of accuracy of authentication can be improved, effectively kept away
Multiple identity datas are exempted from and have corresponded to same map data, the problem of so as to cause authentication inaccuracy.
In operation S203, the user's acquisition request dependency number for the user being present according to identity data in Bloom filter
According to.
In the disclosed embodiments, if the identity data of user is present in Bloom filter, then it represents that the user is conjunction
The user of method, receives the request of validated user, and according to the related data of its acquisition request to feed back to the user.If user
Identity data be not present in Bloom filter, then it represents that the user is illegal user, for example, can not be to disabled user
Request handled.
For example, receive user's request:User A (the entitled Aa123 of user user) requests access the " Jingdone district 618 in Jingdone district
The relevant information of big rush commodity ".Empirical tests, if user A identity data (for example, Aa123) is present in Bloom filter,
Asked in response to the user, obtain the relevant information of " Jingdone district 618 promotees greatly commodity ", feed back and show user A.If user A
Identity data be not present in Bloom filter, then do not obtain relevant information, mitigate the pressure of background server and database.
The embodiment of the present disclosure stores the identity data of legal user by using Bloom filter, it is not necessary to directly records
The identity data of each validated user, it is possible to reduce memory space, reduce the internal memory that the identity data of legal user takes
Space or disk space.
According to the embodiment of the present disclosure, at least one mapping function is provided with Bloom filter, can be by an identity number
According to multiple mapping data and position data corresponding with multiple mapping data are corresponded to, the degree of accuracy of verification can be improved, effectively
Avoid multiple identity datas and correspond to same map data, the problem of so as to cause authentication inaccuracy.
Also, the embodiment of the present disclosure carries out legal checking by Bloom filter to user identity, if user identity is legal,
Then respond the request of the user, if user identity is illegal, it does not asked to handle, can mitigate background server and
The pressure of database.
Fig. 3 diagrammatically illustrates the flow chart for the processing method asked according to the user of another embodiment of the disclosure.
As shown in figure 3, this method includes S201, S203 and S301~S302.Wherein, operate S201 and operation S203 and
The method that above-mentioned reference chart 2 describes is same or like, will not be repeated here.
In operation S301, judge that identity data whether there is in blacklist, blacklist includes being present in the grand filtering of cloth
Device and the identity data of illegal user.
According to the embodiment of the present disclosure, if user A is validated user when building Bloom filter, user A mapping number
It is the first numerical value according to position data corresponding to A1, A2, A3.During the use of Bloom filter, user A is because of some operation quilts
Disabled user is defined as, then simply can not be deleted user A from Bloom filter, if for example, A1, A2, A3 is corresponding
Position data be set to second value, it is likely that the checking of other validated users can be influenceed, for example, user B mapping data
The position (such as the 12nd) of B1 and identical binary vector corresponding to user A mapping data A1, if simply that A1 is corresponding
Position data be set to second value, it is clear that have impact on user B legitimacy.
Therefore, the embodiment of the present disclosure provides a blacklist, can include being present in Bloom filter in blacklist,
But current identity is the identity data of illegal user, to solve the problems, such as that Bloom filter is not supported simply to delete.
In operation S302, when identity data is not present in blacklist, judge that identity data whether there is in the grand mistake of cloth
In filter.
In the disclosed embodiments, when receive user request when, by determine the user user identity whether there is in
In blacklist, if being present in blacklist, then it represents that the user is disabled user, then can not be to the request of the user at
Reason, otherwise, judge that the identity data of the user whether there is in Bloom filter.
If the identity of the user is present in Bloom filter, then it represents that the user is legal user, can perform behaviour
Make S203, otherwise it is assumed that the user is illegal user, then the request not to the user is handled.
In the disclosed embodiments, when asking to carry out legitimacy verifies to user using Bloom filter, due to using
During, illegal user is likely to occur in Bloom filter, and can not be direct to the illegal user in Bloom filter
Delete, the identity data for the illegal user that now will be present in Bloom filter is put into blacklist, solves the grand mistake of cloth
The problem of can not directly being deleted in filter, so as to improve the degree of accuracy of verification and efficiency.
The method that the embodiment of the present disclosure additionally provides renewal Bloom filter, wherein, renewal Bloom filter includes:It will close
The identity data of method is added in Bloom filter;And/or illegal identity data is deleted from Bloom filter.
Specifically, Fig. 4 diagrammatically illustrates is added to the grand mistake of cloth according to the embodiment of the present disclosure by legal identity data
The flow chart of the method for filter.
As shown in figure 4, the method legal identity data being added in Bloom filter includes S401~S404.
In operation S401, judge that legal identity data whether there is in blacklist.
New legal identity data for example can be that new user's registration produces, or can be that disabled user is converted into conjunction
Method user etc..
According to the embodiment of the present disclosure, when there is new legal user, first determine whether, whether the new legal user
It is present in blacklist, if there is in blacklist, then it represents that the user is validated user when building Bloom filter, afterwards again
Disabled user is converted into be added in blacklist.That is, the new legal identity data is that disabled user is converted into validated user.
In operation S402, when legal identity data is present in blacklist, legal identity is deleted from blacklist
Data.
According to the embodiment of the present disclosure, if legal identity data is present in blacklist, then it represents that the identity number of the user
According to also being stored in Bloom filter, now, the identity data of the user need to only be deleted from blacklist.
When receiving the request of the legal user, it is first determined the user is not present in blacklist, it is then determined that
The user is present in Bloom filter, then it is legal user to prove the user, and it can be asked to respond.
In operation S403, when legal identity data is not present in blacklist, judge that the legal identity data is
It is no to be present in Bloom filter.
When the legal identity data is not present in blacklist, the user is probably to be constantly in legal state, or
The user is probably legal identity new caused by new user's registration, now, judge the user identity data whether there is in
In Bloom filter.
In operation S404, when legal identity data is not present in Bloom filter, legal identity data is added
It is added in Bloom filter.
If the identity data of the legal user is present in Bloom filter, then it represents that the user is constantly in legal shape
State, it is not necessary to handle again it, if the identity data of the legal user is not present in Bloom filter, then it represents that should
User is probably the user of new registration, at this point it is possible to which the identity data of the user is added in Bloom filter.
Also include in the method for the renewal Bloom filter that the disclosure provides by illegal identity data from the grand filtering of cloth
Deleted in device.
Due to as described above, Bloom filter does not provide deletion function in itself, if directly by user from Bloom filter
The legitimacy of other users can be influenceed by deleting.Therefore, can be by the user's when there is legal user to be converted into disabled user
Identity data is added in blacklist.The identity data of the user stored in blacklist represents that the user is illegal user.
When the identity data in blacklist is more than predetermined threshold value, Bloom filter is rebuild, and empty blacklist.
According to the embodiment of the present disclosure, when the identity data for needing to delete in Bloom filter is excessive, i.e. in blacklist
When identity data is more than predetermined threshold value, then need to rebuild Bloom filter.For example, the body using current legal user
Part data rebuild Bloom filter.
After rebuilding Bloom filter, do not include the identity data of illegal user in Bloom filter now,
Blacklist can be then emptied, when waiting next user being present in Bloom filter to be converted into disabled user by validated user,
It is added to again in blacklist.
Can be that identity data in blacklist updates the grand filtering of cloth when being more than predetermined threshold value according to the embodiment of the present disclosure
Device or set time update a Bloom filter, such as can be Bloom filters of renewal in each month etc..
The disclosure is not restricted for the opportunity and frequency for updating Bloom filter, and those skilled in the art can enter according to practical application
Row is set.
According to the embodiment of the present disclosure, by being updated in real time or regularly to Bloom filter, for example, addition is legal
User identity deletes illegal user identity, can improve the degree of accuracy of verification.
According to the embodiment of the present disclosure, when the illegal identity data quantity for needing to delete in Bloom filter gradually increases
When, those illegal identity datas are all added in blacklist, cause the identity data in blacklist excessive, when in blacklist
Identity data when being more than predetermined threshold value, cause blacklist to take excessive memory space, now can be by reconstructing the grand mistake of cloth
Filter, blacklist is emptied, discharge memory space.
Fig. 5 diagrammatically illustrates the block diagram for the processing system 500 asked according to the user of the embodiment of the present disclosure.
As shown in figure 5, the processing system 500 of user's request includes receiving module 510, the first judge module 520, obtains mould
Block 530, the second judge module 540, update module 550 and reconstructed module 560.
Receiving module 510 can receive user's request, and user asks the identity data for including user.It is real according to the disclosure
Example is applied, receiving module 510 can for example perform the operation S201 above with reference to Fig. 2 descriptions, will not be repeated here.
First judge module 520 may determine that identity data whether there is in Bloom filter, be wrapped in Bloom filter
Include the identity data of legal user.According to the embodiment of the present disclosure, the first judge module 520 can be for example performed above with reference to figure
The operation S202 of 2 descriptions, will not be repeated here.
The user's acquisition request for the user that acquisition module 530 can be present in Bloom filter according to identity data is related
Data.According to the embodiment of the present disclosure, acquisition module 530 can for example perform the operation S203 above with reference to Fig. 2 descriptions, herein not
Repeat again.
Second judge module 540 may determine that identity data whether there is in blacklist, and blacklist includes being present in
Bloom filter and the identity data of illegal user.According to the embodiment of the present disclosure, the second judge module 540 for example can be with
The operation S301 above with reference to Fig. 3 descriptions is performed, will not be repeated here.
Update module 550 can update Bloom filter, wherein, renewal Bloom filter includes:By legal identity number
According to being added in Bloom filter;And/or illegal identity data is deleted from Bloom filter.Implemented according to the disclosure
Example, update module 550 can for example perform operation S401~S404 above with reference to Fig. 4 descriptions, will not be repeated here.
Reconstructed module 560 can rebuild Bloom filter when the identity data in blacklist is more than predetermined threshold value,
And empty blacklist.
It is understood that receiving module 510, the first judge module 520, acquisition module 530, the second judge module 540,
Update module 550 and reconstructed module 560 may be incorporated in a module and realize, or any one module therein can
To be split into multiple modules.Or at least part function of one or more of these modules module can be with other moulds
At least part function phase of block combines, and is realized in a module.According to an embodiment of the invention, receiving module 510, first
At least one in judge module 520, acquisition module 530, the second judge module 540, update module 550 and reconstructed module 560
It is individual to be at least implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array
(PLA), on-chip system, the system on substrate, the system in encapsulation, application specific integrated circuit (ASIC), or can be to enter to circuit
Row is integrated or the hardware such as any other rational method of encapsulation or firmware are realized, or with three kinds of software, hardware and firmware
The appropriately combined of implementation is realized.Or receiving module 510, the first judge module 520, acquisition module 530, second sentence
At least one in disconnected module 540, update module 550 and reconstructed module 560 can at least be implemented partly as computer
Program module, when the program is run by computer, the function of corresponding module can be performed.
Fig. 6 diagrammatically illustrates the block diagram of the computer system for the processing asked according to the user of the embodiment of the present disclosure.
Computer system shown in Fig. 6 is only an example, the function and use range of the embodiment of the present disclosure should not be brought any
Limitation.
As shown in fig. 6, including processor 601 according to the computer system 600 of the embodiment of the present disclosure, it can be according to storage
Program in read-only storage (ROM) 602 is loaded into random access storage device (RAM) 603 from storage part 608
Program and perform various appropriate actions and processing.Processor 601 can for example include general purpose microprocessor (such as CPU), refer to
Make set processor and/or related chip group and/or special microprocessor (for example, application specific integrated circuit (ASIC)), etc..Processing
Device 610 can also include being used for the onboard storage device for caching purposes.Processor 610 can include being used to perform with reference to 2~Fig. 4 of figure
Single treatment unit either multiple processing units of the different actions of the method flow according to the embodiment of the present disclosure of description.
In RAM 603, it is stored with system 600 and operates required various programs and data.Processor 601, ROM 602 with
And RAM 603 is connected with each other by bus 604.Processor 601 is held by performing the program in ROM 602 and/or RAM 603
Various operations of the row above with reference to Fig. 2~Fig. 4 user's request processing methods described.It is noted that described program can also deposit
Storage is in one or more memories in addition to ROM 602 and RAM 603.Processor 601 can also be stored in by performing
Program in one or more of memories performs above with reference to each of Fig. 2~Fig. 4 user's request processing methods described
Kind operation.
In accordance with an embodiment of the present disclosure, system 600 can also include input/output (I/O) interface 605, input/output
(I/O) interface 605 is also connected to bus 604.System 600 can also include be connected to I/O interfaces 605 with one in lower component
Item is multinomial:Importation 606 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD)
Deng and loudspeaker etc. output par, c 607;Storage part 608 including hard disk etc.;And including such as LAN card, modulatedemodulate
Adjust the communications portion 609 of the NIC of device etc..Communications portion 609 performs communication process via the network of such as internet.
Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor
Memory etc., it is arranged on as needed on driver 610, in order to which the computer program read from it is pacified as needed
Load storage part 608.
In accordance with an embodiment of the present disclosure, it may be implemented as computer software journey above with reference to the method for flow chart description
Sequence.For example, embodiment of the disclosure includes a kind of computer program product, it includes carrying meter on a computer-readable medium
Calculation machine program, the computer program include the program code for being used for the method shown in execution flow chart.In such embodiments,
The computer program can be downloaded and installed by communications portion 609 from network, and/or be pacified from detachable media 611
Dress.When the computer program is performed by processor 601, the above-mentioned function of being limited in the system of the embodiment of the present disclosure is performed.Root
According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come
Realize.
It should be noted that the computer-readable medium shown in the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable recording medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, system, device or the device of infrared ray or semiconductor, or it is any more than combination.Meter
The more specifically example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more wires, just
Take formula computer disk, hard disk, random access storage device (RAM), read-only storage (ROM), erasable type and may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only storage (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer-readable recording medium can any include or store journey
The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this
In open, computer-readable signal media can be included in a base band or the data-signal as carrier wave part propagation,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium beyond storage medium is read, the computer-readable medium, which can send, propagates or transmit, to be used for
By instruction execution system, device either device use or program in connection.Included on computer-readable medium
Program code can be transmitted with any appropriate medium, be included but is not limited to:Wirelessly, electric wire, optical cable, RF etc., or it is above-mentioned
Any appropriate combination.In accordance with an embodiment of the present disclosure, computer-readable medium can include above-described ROM 602
And/or one or more memories beyond RAM 603 and/or ROM 602 and RAM 603.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the disclosure, method and computer journey
Architectural framework in the cards, function and the operation of sequence product.At this point, each square frame in flow chart or block diagram can generation
The part of one module of table, program segment or code, a part for above-mentioned module, program segment or code include one or more
For realizing the executable instruction of defined logic function.It should also be noted that some as replace realization in, institute in square frame
The function of mark can also be with different from the order marked in accompanying drawing generation.For example, two square frames succeedingly represented are actual
On can perform substantially in parallel, they can also be performed in the opposite order sometimes, and this is depending on involved function.Also
It is noted that the combination of each square frame and block diagram in block diagram or flow chart or the square frame in flow chart, can use and perform rule
Fixed function or the special hardware based system of operation are realized, or can use the group of specialized hardware and computer instruction
Close to realize.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, and the computer-readable medium can be
Included in equipment described in above-described embodiment;Can also be individualism, and without be incorporated the equipment in.Above-mentioned calculating
Machine computer-readable recording medium carries one or more program, when said one or multiple programs are performed by the equipment, makes
Obtain equipment execution:Receive user's request, user asks to include the identity data of user, judge identity data with the presence or absence of in
In Bloom filter, Bloom filter includes the identity data of legal user, and is present in Bu Long according to identity data
User's acquisition request related data of user in filter.
In accordance with an embodiment of the present disclosure, above-mentioned judgement identity data whether there is in Bloom filter, including:To identity
Data are handled, and obtain at least one mapping data, it is determined that each position data, position data include first corresponding to mapping data
Numerical value and second value, the first numerical representation method identity data are present in Bloom filter, and second value characterizes identity data not
It is present in Bloom filter, and when position data corresponding to each mapping data are the first numerical value, identity data is present
In Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Judge that identity data whether there is in blacklist, black name
List includes the identity data for being present in Bloom filter and illegal user.
In accordance with an embodiment of the present disclosure, above-mentioned judgement identity data whether there is in Bloom filter, including:In identity
When data are not present in blacklist, judge that identity data whether there is in Bloom filter.
In accordance with an embodiment of the present disclosure, the above method also includes:Bloom filter is updated, wherein, update Bloom filter
Including:
Legal identity data is added in Bloom filter;And/or
Illegal identity data is deleted from Bloom filter.
In accordance with an embodiment of the present disclosure, the above method, wherein, legal identity data is added in Bloom filter,
Including:Judge that legal identity data whether there is in blacklist, when legal identity data is present in blacklist, from
Legal identity data is deleted in blacklist, when legal identity data is not present in blacklist, judges legal identity
Data whether there is in Bloom filter, when legal identity data is not present in Bloom filter, by legal body
Part data are added in Bloom filter.
In accordance with an embodiment of the present disclosure, above-mentioned delete illegal identity data from Bloom filter includes:Will not
Legal identity data is added in blacklist.
In accordance with an embodiment of the present disclosure, the above method also includes:When the identity data in blacklist is more than predetermined threshold value,
Bloom filter is rebuild, and empties blacklist.
Embodiment of the disclosure is described above.But the purpose that these embodiments are merely to illustrate that, and
It is not intended to limit the scope of the present disclosure.Although respectively describing each embodiment more than, but it is not intended that each reality
Use can not be advantageously combined by applying the measure in example.The scope of the present disclosure is defined by the appended claims and the equivalents thereof.Do not take off
From the scope of the present disclosure, those skilled in the art can make a variety of alternatives and modifications, and these alternatives and modifications should all fall at this
Within scope of disclosure.
Claims (18)
1. a kind of processing method of user's request, including:
User's request is received, user's request includes the identity data of the user;
Judge that the identity data whether there is in Bloom filter, the Bloom filter includes the body of legal user
Part data;And
The user's acquisition request related data for the user being present according to the identity data in the Bloom filter.
2. according to the method for claim 1, wherein, the judgement identity data whether there is in Bloom filter
In, including:
The identity data is handled, obtains at least one mapping data;
It is determined that position data corresponding to each mapping data, institute's bit data includes the first numerical value and second value, described the
Identity data described in one numerical representation method is present in the Bloom filter, and the second value characterizes the identity data and do not deposited
In the Bloom filter;And
When position data corresponding to each mapping data are the first numerical value, the identity data is present in the grand mistake of the cloth
In filter.
3. the method according to claim 11, in addition to:
Judge that the identity data whether there is in blacklist, the blacklist includes being present in the Bloom filter simultaneously
And the identity data of illegal user.
4. according to the method for claim 3, wherein, the judgement identity data whether there is in Bloom filter
In, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter
In.
5. the method according to claim 11, in addition to:The Bloom filter is updated, wherein, the renewal cloth is grand
Filter includes:
Legal identity data is added in the Bloom filter;And/or
Illegal identity data is deleted from the Bloom filter.
6. the method according to claim 11, wherein, it is described that legal identity data is added to the Bloom filter
In, including:
Judge that the legal identity data whether there is in the blacklist;
When the legal identity data is present in blacklist, the legal identity number is deleted from the blacklist
According to;
When the legal identity data is not present in the blacklist, judge that the legal identity data whether there is
In the Bloom filter;
When the legal identity data is not present in the Bloom filter, the legal identity data is added to
In the Bloom filter.
7. the method according to claim 11, wherein, it is described to delete illegal identity data from the Bloom filter
Except including:
The illegal identity data is added in the blacklist.
8. the method according to claim 11, in addition to:
When the identity data in the blacklist is more than predetermined threshold value, the Bloom filter is rebuild, and empty institute
State blacklist.
9. a kind of processing system of user's request, including:
Receiving module, receives user's request, and user's request includes the identity data of the user;
First judge module, judge that the identity data whether there is in Bloom filter, the Bloom filter includes
The identity data of legal user;And
Acquisition module, the user's acquisition request dependency number for the user being present according to the identity data in the Bloom filter
According to.
10. system according to claim 9, wherein, it is described to judge that the identity data whether there is in Bloom filter
In, including:
The identity data is handled, obtains at least one mapping data;
It is determined that position data corresponding to each mapping data, institute's bit data includes the first numerical value and second value, described the
Identity data described in one numerical representation method is present in the Bloom filter, and the second value characterizes the identity data and do not deposited
In the Bloom filter;And
When position data corresponding to each mapping data are the first numerical value, the identity data is present in the grand mistake of the cloth
In filter.
11. system according to claim 9, in addition to:
Second judge module, judge that the identity data whether there is in blacklist, the blacklist includes being present in institute
State Bloom filter and the identity data of illegal user.
12. system according to claim 11, wherein, it is described to judge that the identity data whether there is in Bloom filter
In, including:
When the identity data is not present in the blacklist, judge that the identity data whether there is in Bloom filter
In.
13. system according to claim 11, in addition to:Update module, the Bloom filter is updated, wherein, it is described
Updating the Bloom filter includes:
Legal identity data is added in the Bloom filter;And/or
Illegal identity data is deleted from the Bloom filter.
14. system according to claim 13, wherein, it is described that legal identity data is added to the Bloom filter
In, including:
Judge that the legal identity data whether there is in the blacklist;
When the legal identity data is present in blacklist, the legal identity number is deleted from the blacklist
According to;
When the legal identity data is not present in the blacklist, judge that the legal identity data whether there is
In the Bloom filter;
When the legal identity data is not present in the Bloom filter, the legal identity data is added to
In the Bloom filter.
15. system according to claim 13, wherein, it is described by illegal identity data from the Bloom filter
Deletion includes:
The illegal identity data is added in the blacklist.
16. system according to claim 11, in addition to:
Reconstructed module, when the identity data in the blacklist is more than predetermined threshold value, the Bloom filter is rebuild, and
And empty the blacklist.
17. a kind of processing system of user's request, including:
One or more processors;
Storage device, for storing one or more programs,
Wherein, when one or more of programs are by one or more of computing devices so that one or more of
Computing device is according to method according to any one of claims 1 to 8.
18. a kind of computer-readable medium, is stored thereon with executable instruction, the instruction holds processor when being executed by processor
Row is according to method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710951761.9A CN107888659A (en) | 2017-10-12 | 2017-10-12 | The processing method and system of user's request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710951761.9A CN107888659A (en) | 2017-10-12 | 2017-10-12 | The processing method and system of user's request |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888659A true CN107888659A (en) | 2018-04-06 |
Family
ID=61781598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710951761.9A Pending CN107888659A (en) | 2017-10-12 | 2017-10-12 | The processing method and system of user's request |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888659A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109255001A (en) * | 2018-08-31 | 2019-01-22 | 阿里巴巴集团控股有限公司 | Maintaining method and device, the electronic equipment in interface instance library |
CN109299147A (en) * | 2018-09-26 | 2019-02-01 | 中国平安人寿保险股份有限公司 | Database access processing method, device, computer equipment and storage medium |
CN109614407A (en) * | 2018-12-10 | 2019-04-12 | 北京奇艺世纪科技有限公司 | A kind of request processing method and equipment |
CN110209874A (en) * | 2019-04-24 | 2019-09-06 | 北京奇艺世纪科技有限公司 | Information processing method, device, electronic equipment and storage medium |
CN110324329A (en) * | 2019-06-21 | 2019-10-11 | 深圳前海微众银行股份有限公司 | Auth method, device, equipment and computer readable storage medium |
CN111581512A (en) * | 2020-05-08 | 2020-08-25 | 孙颐 | Webpage visitor number statistical method and device |
CN112330366A (en) * | 2020-11-13 | 2021-02-05 | 北京沃东天骏信息技术有限公司 | Redemption code redemption request verification method, apparatus, device and computer readable medium |
CN112527433A (en) * | 2020-12-08 | 2021-03-19 | 平安科技(深圳)有限公司 | Page popup control method and device, computer equipment and storage medium |
CN112989147A (en) * | 2021-02-20 | 2021-06-18 | 每日互动股份有限公司 | Data information pushing method and device, computer equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938583A (en) * | 2010-09-03 | 2011-01-05 | 电子科技大学 | Method for filtering abnormal call based on multiple lists |
CN102253991A (en) * | 2011-05-25 | 2011-11-23 | 北京星网锐捷网络技术有限公司 | Uniform resource locator (URL) storage method, web filtering method, device and system |
CN102682037A (en) * | 2011-03-18 | 2012-09-19 | 阿里巴巴集团控股有限公司 | Data acquisition method, system and device |
CN103248472A (en) * | 2013-04-16 | 2013-08-14 | 华为技术有限公司 | Operation request processing method and system and attack identification device |
CN103544316A (en) * | 2013-11-06 | 2014-01-29 | 苏州大拿信息技术有限公司 | Uniform resource locator (URL) filtering system and achieving method thereof |
KR101381614B1 (en) * | 2012-10-24 | 2014-04-10 | 아주대학교산학협력단 | Countermeasure apparatus and method against sip flooding attacks using a bloom filter |
CN104506525A (en) * | 2014-12-22 | 2015-04-08 | 北京奇虎科技有限公司 | Method for preventing malicious grabbing and protection device |
CN104601557A (en) * | 2014-12-29 | 2015-05-06 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Method and system for defending malicious websites based on software-defined network |
CN105718455A (en) * | 2014-12-01 | 2016-06-29 | 阿里巴巴集团控股有限公司 | Data query method and apparatus |
CN107087007A (en) * | 2017-05-25 | 2017-08-22 | 腾讯科技(深圳)有限公司 | A kind of defence method of network attack, relevant device and system |
-
2017
- 2017-10-12 CN CN201710951761.9A patent/CN107888659A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101938583A (en) * | 2010-09-03 | 2011-01-05 | 电子科技大学 | Method for filtering abnormal call based on multiple lists |
CN102682037A (en) * | 2011-03-18 | 2012-09-19 | 阿里巴巴集团控股有限公司 | Data acquisition method, system and device |
CN102253991A (en) * | 2011-05-25 | 2011-11-23 | 北京星网锐捷网络技术有限公司 | Uniform resource locator (URL) storage method, web filtering method, device and system |
KR101381614B1 (en) * | 2012-10-24 | 2014-04-10 | 아주대학교산학협력단 | Countermeasure apparatus and method against sip flooding attacks using a bloom filter |
CN103248472A (en) * | 2013-04-16 | 2013-08-14 | 华为技术有限公司 | Operation request processing method and system and attack identification device |
CN103544316A (en) * | 2013-11-06 | 2014-01-29 | 苏州大拿信息技术有限公司 | Uniform resource locator (URL) filtering system and achieving method thereof |
CN105718455A (en) * | 2014-12-01 | 2016-06-29 | 阿里巴巴集团控股有限公司 | Data query method and apparatus |
CN104506525A (en) * | 2014-12-22 | 2015-04-08 | 北京奇虎科技有限公司 | Method for preventing malicious grabbing and protection device |
CN104601557A (en) * | 2014-12-29 | 2015-05-06 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Method and system for defending malicious websites based on software-defined network |
CN107087007A (en) * | 2017-05-25 | 2017-08-22 | 腾讯科技(深圳)有限公司 | A kind of defence method of network attack, relevant device and system |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109255001A (en) * | 2018-08-31 | 2019-01-22 | 阿里巴巴集团控股有限公司 | Maintaining method and device, the electronic equipment in interface instance library |
CN109299147A (en) * | 2018-09-26 | 2019-02-01 | 中国平安人寿保险股份有限公司 | Database access processing method, device, computer equipment and storage medium |
CN109299147B (en) * | 2018-09-26 | 2024-04-05 | 中国平安人寿保险股份有限公司 | Database access processing method, device, computer equipment and storage medium |
CN109614407A (en) * | 2018-12-10 | 2019-04-12 | 北京奇艺世纪科技有限公司 | A kind of request processing method and equipment |
CN110209874A (en) * | 2019-04-24 | 2019-09-06 | 北京奇艺世纪科技有限公司 | Information processing method, device, electronic equipment and storage medium |
CN110209874B (en) * | 2019-04-24 | 2021-08-20 | 北京奇艺世纪科技有限公司 | Information processing method, information processing device, electronic equipment and storage medium |
CN110324329A (en) * | 2019-06-21 | 2019-10-11 | 深圳前海微众银行股份有限公司 | Auth method, device, equipment and computer readable storage medium |
CN111581512A (en) * | 2020-05-08 | 2020-08-25 | 孙颐 | Webpage visitor number statistical method and device |
CN111581512B (en) * | 2020-05-08 | 2023-06-02 | 孙颐 | Webpage visitor quantity counting method and device |
CN112330366A (en) * | 2020-11-13 | 2021-02-05 | 北京沃东天骏信息技术有限公司 | Redemption code redemption request verification method, apparatus, device and computer readable medium |
CN112527433A (en) * | 2020-12-08 | 2021-03-19 | 平安科技(深圳)有限公司 | Page popup control method and device, computer equipment and storage medium |
CN112989147A (en) * | 2021-02-20 | 2021-06-18 | 每日互动股份有限公司 | Data information pushing method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888659A (en) | The processing method and system of user's request | |
CN106886375A (en) | The method and apparatus of data storage | |
CN106133743B (en) | System and method for optimizing the scanning of pre-installation application program | |
CN110019211A (en) | The methods, devices and systems of association index | |
CN110019080B (en) | Data access method and device | |
US20200183906A1 (en) | Using an lsm tree file structure for the on-disk format of an object storage platform | |
CN110019125A (en) | The method and apparatus of data base administration | |
CN105760395A (en) | Data processing method, device and system | |
CN110209662A (en) | A kind of method and apparatus of automation load data | |
CN112468409A (en) | Access control method, device, computer equipment and storage medium | |
CN108536617A (en) | Buffer memory management method, medium, system and electronic equipment | |
CN103580991B (en) | The method for uploading and equipment of a kind of Email attachment | |
CN113536185A (en) | Application page loading method, storage medium and related equipment thereof | |
CN110119386A (en) | Data processing method, data processing equipment, medium and calculating equipment | |
CN112241298A (en) | Page display method and device, storage medium and electronic device | |
CN110020373A (en) | The method and apparatus that static page is stored, browsed | |
CN108494728A (en) | Blacklist base establishing method, device, equipment and the medium for preventing flow from kidnapping | |
WO2019091101A1 (en) | Salary calculation method, application server and computer-readable storage medium | |
CN116842012A (en) | Method, device, equipment and storage medium for storing Redis cluster in fragments | |
CN107133245A (en) | Presence information management system, method and electronic equipment | |
CN110019531A (en) | A kind of method and apparatus obtaining analogical object set | |
CN115543428A (en) | Simulated data generation method and device based on strategy template | |
CN115203672A (en) | Information access control method and device, computer equipment and medium | |
CN107832347A (en) | Method of Data with Adding Windows, system and electronic equipment | |
CN110019366A (en) | A kind of data cached method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |