CN108111501A - Control method, device and the computer equipment of cheating flow - Google Patents
Control method, device and the computer equipment of cheating flow Download PDFInfo
- Publication number
- CN108111501A CN108111501A CN201711347752.5A CN201711347752A CN108111501A CN 108111501 A CN108111501 A CN 108111501A CN 201711347752 A CN201711347752 A CN 201711347752A CN 108111501 A CN108111501 A CN 108111501A
- Authority
- CN
- China
- Prior art keywords
- exemption
- access request
- field
- value
- updated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Abstract
The application proposes a kind of control method, device and the computer equipment of flow of practising fraud, wherein, the control method of above-mentioned cheating flow includes:The access request that receiving terminal apparatus is sent;If the access request includes exempting field, the value of the exemption field is updated;Exemption verification is carried out to the access request according to the value of updated exemption field;If the access request does not verify by exempting, refuse the access request.The application can be realized carries out global control to cheating flow, and is not required to the storage engines outside introducing, and realization is simple, reduces the processing time of access request, improves user experience.
Description
Technical field
This application involves control of network flow quantity technical field more particularly to a kind of control method of flow of practising fraud, device and
Computer equipment.
Background technology
In existing correlation technique, cheating flow control needs to count the flow of access according to each dimension each to calculate
The frequency of dimension, existing counting mode are divided into two kinds, and one kind is local counting, and one kind is global counting, wherein, the overall situation counts
Method also need to realize by external storage engines.
But the shortcomings that locally being counted in existing correlation technique is that global control cannot be carried out to cheating flow, it is global
The shortcomings that counting is the storage engines outside needing to introduce, relative complex in realization, and the processing time of access request can increase
Length is more, and user experience is poor.
The content of the invention
The application is intended to solve at least some of the technical problems in related technologies.
For this purpose, first purpose of the application is to propose a kind of control method for flow of practising fraud, cheating is flowed with realizing
Amount carries out global control, and is not required to the storage engines outside introducing, and realization is simple, reduces the processing time of access request,
Improve user experience.
Second purpose of the application is to propose a kind of control device for flow of practising fraud.
The 3rd purpose of the application is to propose a kind of computer equipment.
The 4th purpose of the application is to propose a kind of non-transitorycomputer readable storage medium.
In order to achieve the above object, the application first aspect embodiment proposes a kind of control method for flow of practising fraud, including:It receives
The access request that terminal device is sent;If the access request include exempt field, to it is described exemption field value into
Row update;Exemption verification is carried out to the access request according to the value of updated exemption field;If the access request is not
It is verified by exempting, then refuses the access request.
In the control method of the cheating flow of the embodiment of the present application, after the access request that receiving terminal apparatus is sent, such as
The above-mentioned access request of fruit includes exempting field, then the value of above-mentioned exemption field is updated, and is then slitted according to updated
The value for exempting from field carries out exemption verification to above-mentioned access request, if above-mentioned access request is not verified by exempting, on refusal
Access request is stated, so as to realize the control global to cheating flow progress according to field is exempted, and is not required to introduce external
Storage engines, realize simple, reduce the processing time of access request, improve user experience.
In order to achieve the above object, the application second aspect embodiment proposes a kind of control device for flow of practising fraud, including:It connects
Module is received, the access request sent for receiving terminal apparatus;Update module, please for working as the access that the receiving module receives
Ask include exempt field when, to it is described exemption field value be updated;Correction verification module, for according to the update module more
The value of exemption field after new carries out exemption verification to the access request;Control module determines for working as the correction verification module
When the access request does not verify by exempting, refuse the access request.
The embodiment of the present application cheating flow control device, receiving module receiving terminal apparatus send access request it
Afterwards, if above-mentioned access request includes exempting field, update module is updated the value of above-mentioned exemption field, then school
It tests module and exemption verification is carried out to above-mentioned access request according to the value of updated exemption field, if above-mentioned access request is not led to
Exemption verification is crossed, then control module refuses above-mentioned access request, and cheating flow is carried out according to exemption field so as to realize
Global control, and the storage engines outside introducing are not required to, it realizes the processing time for simply, reducing access request, improves
User experience.
In order to achieve the above object, the application third aspect embodiment proposes a kind of computer equipment, including:Memory, place
It manages device and is stored in the computer program that can be run on the memory and on the processor, described in the processor execution
During computer program, method as described above is realized.
In order to achieve the above object, the application fourth aspect embodiment proposes a kind of non-transitory computer-readable storage medium
Matter, is stored thereon with computer program, and the computer program realizes method as described above when being executed by processor.
The additional aspect of the application and advantage will be set forth in part in the description, and will partly become from the following description
It obtains substantially or is recognized by the practice of the application.
Description of the drawings
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
Fig. 1 is the flow chart of control method one embodiment of the application cheating flow;
Fig. 2 is the flow chart of another embodiment of the control method of the application cheating flow;
Fig. 3 is the flow chart of the control method further embodiment of the application cheating flow;
Fig. 4 is the structure diagram of control device one embodiment of the application cheating flow;
Fig. 5 is the structure diagram of another embodiment of the control device of the application cheating flow;
Fig. 6 is the structure diagram of the application computer equipment one embodiment.
Specific embodiment
Embodiments herein is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the application, and it is not intended that limitation to the application.
Fig. 1 is the flow chart of control method one embodiment of the application cheating flow, as shown in Figure 1, above-mentioned cheating stream
The control method of amount can include:
Step 101, the access request that receiving terminal apparatus is sent.
Wherein, above-mentioned terminal device can be smart mobile phone, tablet computer, laptop or personal computer
(Personal Computer;Hereinafter referred to as:) etc. PC the intelligent terminal of web page browsing can be carried out, the present embodiment is to upper
The form for stating terminal device is not construed as limiting.
Step 102, if above-mentioned access request includes exempting field, the value of above-mentioned exemption field is updated.
Step 103, exemption verification is carried out to the access request according to the value of updated exemption field.
Step 104, if above-mentioned access request does not verify by exempting, above-mentioned access request is refused.
Further, after step 103, can also include:
Step 105, if above-mentioned access request is verified by exempting, above-mentioned access request is allowed to continue to access.
In the present embodiment, after the access request of the proxy server receiving terminal apparatus transmission of access layer, if above-mentioned
Access request includes exempting field, then the value of above-mentioned exemption field is updated, then according to updated exemption field
Value exemption verification is carried out to above-mentioned access request, if above-mentioned access request not by exempt verify, refuse above-mentioned access
It asks, so as to realize the control global to cheating flow progress according to field is exempted, and is not required to the storage outside introducing
Engine is realized simply, reduces the processing time of access request, improve user experience.
Fig. 2 is the flow chart of another embodiment of the control method of the application cheating flow, as shown in Fig. 2, the application Fig. 1
Illustrated embodiment step 102 can include:
Step 201, if above-mentioned access request includes exempting field, the exemption word in above-mentioned access request is obtained
Section.
Step 202, above-mentioned exemption field is decrypted.
Step 203, the exemption in the exemption field after decryption is counted and the value of the last timestamp exempted carries out
Update.
Specifically, the value counted to the exemption in the exemption field after decryption is updated:By slitting after decryption
Exempt from the value that the exemption in field counts and add predetermined value, wherein, the size of above-mentioned predetermined value can be in specific implementation, root
According to the sets itselfs such as system performance and/or realization demand, the present embodiment is not construed as limiting the size of above-mentioned predetermined value, and citing comes
It says, above-mentioned predetermined value can be 1.
The value of the last timestamp exempted in exemption field after decryption, which is updated, to be:After decrypting
Exemption field in the value of the last timestamp exempted at the time of be updated to the last exempt.
In this way, step 103 can include:
Step 204, the value for the timestamp that first time passes through identifying code and the last time in updated exemption field are slitted
The value for the timestamp exempted from is compared respectively with current time.
At this moment, access request can not be by exempting verification:Current time with passing through the timestamp of identifying code for the first time
Value compare more than or equal to setting duration threshold value.
Wherein, the duration threshold value of setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of the duration threshold value of above-mentioned setting, for example, the duration threshold value of setting can be 60
Minute.
Step 205, if current time is less than the duration of setting compared with first time is by the value of the timestamp of identifying code
Threshold value, and current time compared with the value of the last timestamp exempted in updated exemption field more than or equal to setting
Whether fixed unit time, the then value for judging to exempt counting in updated exemption field are more than predetermined frequency threshold value.
The unit time of above-mentioned setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of the unit time of above-mentioned setting, for example, the unit time of setting can be 1
Minute;
Above-mentioned predetermined frequency threshold value can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of above-mentioned predetermined frequency threshold value, for example, above-mentioned predetermined frequency threshold value can be with
For 20 times.
In this way, above-mentioned access request can not be by exempting verification:The value of counting is exempted in updated exemption field
More than predetermined frequency threshold value.
That is, in the present embodiment, exempt verification and include two layers and verify, be first, for the first time by identifying code when
Between stab, compared with current time, it is impossible to more than or equal to the duration threshold value of setting, in the present embodiment be 60 minutes.
And when for the first time by the timestamp of identifying code, compared with current time, less than setting duration threshold value when, also need
Determine whether current time is more than compared with the value of the last timestamp exempted in updated exemption field
Or the unit time equal to setting, if it is, it is predetermined to judge whether the value that counting is exempted in updated exemption field is more than
Frequency threshold value, if exempt count value be more than predetermined frequency threshold value, also determine above-mentioned access request do not pass through exemption
Verification.
This was divided into 60 slots, when the duration of each slot is unit that is, in the present embodiment by 60 minutes of exemption
Long (being 1 minute in this example), the exemption of each slot count the frequency threshold value (being 20 times in this example) for having oneself predetermined, normally
User is exempted in a slot no more than predetermined frequency threshold value, so as to effectively control cheating flow.
Further, after step 203, can also include:
Step 206, will be put back to after updated exemption field encryption in above-mentioned access request.
In the present embodiment, step 206 can perform parallel with step 204~step 205, can also successively perform, this reality
Example is applied to be not construed as limiting the execution sequence of step 206 and step 204~step 205.
Fig. 3 is the flow chart of the control method further embodiment of the application cheating flow, as shown in figure 3, the application Fig. 1
In illustrated embodiment after step 101, it can also include:
Step 301, trigger check information server and send check information input page to above-mentioned terminal device, for using
The user of above-mentioned terminal device input validation information in above-mentioned check information input page.
Specifically, triggering check information server can be to above-mentioned terminal device transmission check information input page:Root
According to access times of the above-mentioned access request in scheduled duration, determine that the access granularity of above-mentioned access request is greater than or equal to and make a reservation for
Access granularity threshold value after, triggering check information server to above-mentioned terminal device send check information input page.
Wherein, above-mentioned scheduled duration can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of above-mentioned scheduled duration, for example, above-mentioned scheduled duration can be 1 minute;It is above-mentioned
Predetermined access granularity threshold value can be in specific implementation, according to the sets itselfs such as system performance and/or realization demand, this implementation
Example is not construed as limiting the size of above-mentioned predetermined access granularity threshold value, for example, above-mentioned predetermined access granularity threshold value can be with
For 20.
In the present embodiment, after receiving access request, access that can be according to above-mentioned access request in scheduled duration
Number determines the access granularity of above-mentioned access request, here the business of the access times in scheduled duration and above-mentioned scheduled duration
The access granularity of as above-mentioned access request.Then, judge whether the access granularity of above-mentioned access request is greater than or equal to make a reservation for
Access granularity threshold value, if it is, triggering check information server to above-mentioned terminal device send check information input page.
Step 302, determine the check information of above-mentioned terminal device transmission by verifying it in above-mentioned check information server
Afterwards, the exemption field that above-mentioned check information server adds in above-mentioned access request is obtained.
In the present embodiment, check information server can be identifying code server, and check information input page can be to test
Code input page is demonstrate,proved, above-mentioned check information server determines that the check information that above-mentioned terminal device is sent can be by verification:
Identifying code server determines that the identifying code that above-mentioned terminal device is sent passes through verification.
The identifying code of the forms such as picture, word and/or voice may be employed in above-mentioned identifying code, and certain above-mentioned check information is simultaneously
A kind of identifying code this form is not limited only to, the check information of other forms can also be used, the present embodiment be not construed as limiting this.
Step 303, the exemption field of acquisition is decrypted.
In the present embodiment, exemption field that above-mentioned check information server adds in above-mentioned access request be it is encrypted,
Therefore proxy server obtains above-mentioned exemption field afterwards, it is necessary to which the exemption field of acquisition is decrypted.
During specific implementation, to exempt field be encrypted used by algorithm can be AES-128-CBC with IV, generation
Reason server needs that the exemption field of acquisition is decrypted using corresponding decipherment algorithm, the present embodiment to the encryption of use with
Decipherment algorithm is not construed as limiting, as long as can be encrypted and decrypted to exempting field.
Step 304, the value of the exemption field after decryption is configured.
Specifically, the value of the exemption field after decryption is configured to be:Above-mentioned use in above-mentioned exemption field is set
By the timestamp of identifying code, the last timestamp exempted and exempt the value counted for the first time in family.
Wherein, set above-mentioned user in above-mentioned exemption field for the first time as will be above-mentioned by the value of the timestamp of identifying code
It exempts above-mentioned user in field and above-mentioned user is set to for the first time by identifying code by the value of the timestamp of identifying code for the first time
Time, the value for setting the last timestamp exempted of above-mentioned user in above-mentioned exemption field is will be in above-mentioned exemption field
The value for stating the last timestamp exempted of user is set to the above-mentioned user the last time exempted.
Set the value for exempting counting in above-mentioned exemption field that the value for exempting counting in above-mentioned exemption field as is set to pre-
Fixed number value, wherein, the size of above-mentioned predetermined value can be in specific implementation, according to system performance and/or realization demand etc. certainly
Row setting, the present embodiment are not construed as limiting the size of above-mentioned predetermined value, for example, above-mentioned predetermined value can be 1.
Further, product line title in above-mentioned exemption field, the account number of above-mentioned user and above-mentioned can also be set
The value of the login status of user is configured.
Wherein, the said goods line title is that the requested webpage of above-mentioned access request belongs to which product line, above-mentioned use
The account number at family is the mark of the login account of above-mentioned user, and the login status of above-mentioned user is that above-mentioned user is currently
The state for logging in or being not logged in.
Step 305, will be put back to after the exemption field encryption after setting in above-mentioned access request.
In the present embodiment, when the exemption field after setting is encrypted in proxy server, using with check information service
The exemption field after setting is encrypted in the identical Encryption Algorithm of device.
It is above-mentioned when proxy server receives the above-mentioned access request of terminal device transmission again by above-mentioned steps
It will be carried in access request and exempt field, in this way, after proxy server receives access request, according to above-mentioned access request
The middle value for exempting field can carry out exemption verification to above-mentioned access request, and access request need not be sent to global clothes
It is engaged in carrying out global counting in device, also there is no need to increase external storage engines to store access request, realization is simple, and
And the handling duration of above-mentioned access request can be reduced, improve user experience.
Fig. 4 be the application practise fraud flow control device one embodiment structure diagram, in the embodiment of the present application
The control device of cheating flow can be used as a part for computer equipment or computer equipment to realize that the embodiment of the present application carry
The control method of the cheating flow of confession.
Above computer equipment can be proxy server, and the present embodiment does not limit the form of above computer equipment
It is fixed.
As shown in figure 4, the control device of above-mentioned cheating flow can include:Receiving module 41, update module 42, calibration mode
Block 43 and control module 44;
Receiving module 41, the access request sent for receiving terminal apparatus;Wherein, above-mentioned terminal device can be intelligence
Mobile phone, tablet computer, laptop or PC etc. can carry out the intelligent terminal of web page browsing, and the present embodiment is to above-mentioned end
The form of end equipment is not construed as limiting.
Update module 42, when the access request for being received when receiving module 41 includes exempting field, to above-mentioned exemption
The value of field is updated;
Correction verification module 43, for being slitted according to the updated value for exempting field of update module 42 to above-mentioned access request
Exempt to verify;
Control module 44, for when correction verification module 43 determines that above-mentioned access request does not verify by exempting, refusal to be above-mentioned
Access request.
Further, control module 44 are additionally operable to when correction verification module 43 determines that above-mentioned access request is verified by exempting,
Above-mentioned access request is allowed to continue to access.
In the present embodiment, after the access request that 41 receiving terminal apparatus of receiving module is sent, if above-mentioned access request
Include exempting field, then update module 42 is updated the value of above-mentioned exemption field, and then correction verification module 43 is according to update
The value of exemption field afterwards carries out exemption verification to above-mentioned access request, if above-mentioned access request is not verified by exempting,
Control module 44 refuses above-mentioned access request, so as to realize the control global to cheating flow progress according to field is exempted,
And the storage engines being not required to outside introducing, realize simply, reduce the processing time of access request, improve user experience.
Fig. 5 is the structure diagram of another embodiment of the control device of the application cheating flow, with cheating shown in Fig. 4
The control device of flow is compared, the difference is that, in the control device of the cheating flow shown in Fig. 5, update module 42 can be with
Including:Acquisition submodule 421, decryption submodule 422 and exemption field update submodule 423;
Wherein, acquisition submodule 421, for obtaining the exemption field in above-mentioned access request;
Submodule 422 is decrypted, for above-mentioned exemption field to be decrypted;
Field update submodule 423 is exempted, for being counted to the exemption in the exemption field after the decryption decryption of submodule 422
The value for the timestamp exempted with the last time is updated.
Specifically, the value counted to the exemption in the exemption field after decryption is updated:Exempt field update
The value that submodule 423 counts the exemption in the exemption field after decryption plus predetermined value, wherein, above-mentioned predetermined value it is big
It is small can specific implementation when, according to the sets itselfs such as system performance and/or realization demand, the present embodiment is to above-mentioned predetermined value
Size be not construed as limiting, for example, above-mentioned predetermined value can be 1.
The value of the last timestamp exempted in exemption field after decryption, which is updated, to be:Exempt field
The value of the last timestamp exempted in exemption field after decryption is updated to the last exemption by update submodule 423
Moment.
In this way, correction verification module 43 can include:Compare submodule 431 and judging submodule 432;
Compare submodule 431, for by updated exemption field for the first time by the value of the timestamp of identifying code and
The value for the timestamp that the last time exempts is compared respectively with current time;
At this moment, above-mentioned access request can not be by exempting verification:Current time passes through identifying code with above-mentioned first time
Timestamp value compare more than or equal to setting duration threshold value;Wherein, the duration threshold value of setting can specific implementation when,
According to the sets itselfs such as system performance and/or realization demand, the present embodiment does not limit the size of the duration threshold value of above-mentioned setting
It is fixed, for example, the duration threshold value of setting can be 60 minutes.
Judging submodule 432, at current time with above-mentioned first time by the value of the timestamp of identifying code compared with it is small
In the duration threshold value of setting, and current time is compared with the value of the last timestamp exempted in updated exemption field
More than or equal to setting unit time when, whether the value for judging to exempt counting in updated exemption field is more than predetermined time
Number threshold value.
The unit time of above-mentioned setting can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of the unit time of above-mentioned setting, for example, the unit time of setting can be 1
Minute;
Above-mentioned predetermined frequency threshold value can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of above-mentioned predetermined frequency threshold value, for example, above-mentioned predetermined frequency threshold value can be with
For 20 times.
In this way, above-mentioned access request can not be by exempting verification:The value of counting is exempted in updated exemption field
More than predetermined frequency threshold value.
That is, in the present embodiment, exempting verification includes two layers of verification, is first, and comparison submodule 431 will for the first time
By the timestamp of identifying code, compared with current time, it is impossible to be 60 in the present embodiment more than or equal to the duration threshold value of setting
Minute.
And when for the first time by the timestamp of identifying code, compared with current time, less than setting duration threshold value when, judge
Submodule 432 also needs to determine whether current time and the value of the last timestamp exempted in updated exemption field
Compared to whether the unit time of setting is greater than or equal to, if it is, judging the updated value exempted and counting is exempted in field
Whether it is more than predetermined frequency threshold value, if exempting the value counted is more than predetermined frequency threshold value, also determines that above-mentioned access please
It asks and is not verified by exempting.
This was divided into 60 slots, when the duration of each slot is unit that is, in the present embodiment by 60 minutes of exemption
Long (being 1 minute in this example), the exemption of each slot count the frequency threshold value (being 20 times in this example) for having oneself predetermined, normally
User is exempted in a slot no more than predetermined frequency threshold value, so as to effectively control cheating flow.
Further, the control device of above-mentioned cheating flow can also include:
Add module 45, will be updated after being updated in update module 42 to the value of above-mentioned exemption field
It is put back to after exempting field encryption in above-mentioned access request.
Further, the control device of above-mentioned cheating flow can also include:Trigger module 46, field acquisition module 47,
Field deciphering module 48, setup module 49 and add module 45;
Wherein, trigger module 46, for after the access request that is sent in 41 receiving terminal apparatus of receiving module, triggering school
It tests information server and sends check information input page to above-mentioned terminal device, for using the user of above-mentioned terminal device upper
State input validation information in check information input page;In the present embodiment, trigger module 46, specifically for being asked according to above-mentioned access
The access times in scheduled duration are sought, determine that the access granularity of above-mentioned access request is greater than or equal to predetermined access granularity threshold
After value, triggering check information server sends check information input page to above-mentioned terminal device.
Wherein, above-mentioned scheduled duration can voluntarily be set in specific implementation according to system performance and/or realization demand etc.
Fixed, the present embodiment is not construed as limiting the size of above-mentioned scheduled duration, for example, above-mentioned scheduled duration can be 1 minute;It is above-mentioned
Predetermined access granularity threshold value can be in specific implementation, according to the sets itselfs such as system performance and/or realization demand, this implementation
Example is not construed as limiting the size of above-mentioned predetermined access granularity threshold value, for example, above-mentioned predetermined access granularity threshold value can be with
For 20.
It, can be according to above-mentioned access request in pre- timing after receiving module 41 receives access request in the present embodiment
Access times in length determine the access granularity of above-mentioned access request, here the access times in scheduled duration with it is above-mentioned pre-
The business of timing length is the access granularity of above-mentioned access request.Then, judge whether the access granularity of above-mentioned access request is more than
Or equal to predetermined access granularity threshold value, if it is, trigger module 46 triggers check information server to above-mentioned terminal device
Send check information input page.
Field acquisition module 47, for determining the check information of above-mentioned terminal device transmission in above-mentioned check information server
After verification, the exemption field that above-mentioned check information server adds in above-mentioned access request is obtained;In the present embodiment,
Check information server can be identifying code server, check information input page can be identifying code input page, above-mentioned school
Testing the check information that information server determines that above-mentioned terminal device is sent can be by verification:Identifying code server determines above-mentioned
The identifying code that terminal device is sent passes through verification.
The identifying code of the forms such as picture, word and/or voice may be employed in above-mentioned identifying code, and certain above-mentioned check information is simultaneously
A kind of identifying code this form is not limited only to, the check information of other forms can also be used, the present embodiment be not construed as limiting this.
Field deciphering module 48, the exemption field for being obtained to field acquisition module 47 are decrypted;In the present embodiment,
The exemption field that above-mentioned check information server adds in above-mentioned access request is encrypted, therefore field acquisition module 47 obtains
After taking above-mentioned exemption field, field deciphering module 48 needs the exemption field to acquisition to be decrypted.
During specific implementation, to exempt field be encrypted used by algorithm can be AES-128-CBC with IV, word
Section deciphering module 48 needs that the exemption field of acquisition is decrypted using corresponding decipherment algorithm, and the present embodiment adds use
Close and decipherment algorithm is not construed as limiting, as long as can be encrypted and decrypted to exempting field.
Setup module 49 is configured for the value to the exemption field after the decryption of field deciphering module 48;The present embodiment
In, setup module 49, specifically for set in above-mentioned exemption field above-mentioned user for the first time by the timestamp of identifying code, recently
The value that the timestamp and exemption once exempted count.
Wherein, setup module 49 sets the value of the timestamp that above-mentioned user's first time passes through identifying code in above-mentioned exemption field
Above-mentioned user in above-mentioned exemption field as is set to above-mentioned user by the value of the timestamp of identifying code for the first time for the first time to lead to
The time of identifying code is spent, the value for setting the last timestamp exempted of above-mentioned user in above-mentioned exemption field is to slit above-mentioned
The value for exempting from the last timestamp exempted of above-mentioned user in field is set to the above-mentioned user the last time exempted.
Setup module 49 sets the value for exempting counting in above-mentioned exemption field that will as be exempted in above-mentioned exemption field and counts
Value be set to predetermined value, wherein, the size of above-mentioned predetermined value can be in specific implementation, according to system performance and/or reality
Sets itselfs, the present embodiment such as existing demand are not construed as limiting the size of above-mentioned predetermined value, for example, above-mentioned predetermined value can
Think 1.
Further, setup module 49 can also set product line title, the account of above-mentioned user in above-mentioned exemption field
The value of mark and the login status of above-mentioned user is configured.
Wherein, the said goods line title is that the requested webpage of above-mentioned access request belongs to which product line, above-mentioned use
The account number at family is the mark of the login account of above-mentioned user, and the login status of above-mentioned user is that above-mentioned user is currently
The state for logging in or being not logged in.
Add module 45, for being put back to after the exemption field encryption after setup module 49 is set in above-mentioned access request.
In the present embodiment, add module 45 to setup module 49 set after exemption field be encrypted when, using with school
The identical Encryption Algorithm of information server is tested the exemption field after setting is encrypted.
In this way, when receiving module 41 receives the above-mentioned access request of terminal device transmission again, above-mentioned access request
In will carry and exempt field, in this way, after receiving module 41 receives access request, correction verification module 43 please according to above-mentioned access
Exemption verification can be carried out to above-mentioned access request by seeking the value of middle exemption field, and access request need not be sent to the overall situation
Global counting is carried out in server, also there is no need to increase external storage engines to store access request, is realized simply,
And the handling duration of above-mentioned access request can be reduced, improves user experience.
Fig. 6 is the structure diagram of the application computer equipment one embodiment, as shown in fig. 6, above computer equipment
It can include memory, processor and be stored in the computer program that can be run on above-mentioned memory and on above-mentioned processor,
When above-mentioned processor performs above computer program, the control method of cheating flow provided by the embodiments of the present application can be realized.
Wherein, above computer equipment can be proxy server, the present embodiment to the form of above computer equipment not
It is construed as limiting.
Fig. 6 shows to be used for the block diagram for the exemplary computer device 12 for realizing the application embodiment.Fig. 6 is shown
Computer equipment 12 be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present application.
As shown in fig. 6, computer equipment 12 is showed in the form of universal computing device.The component of computer equipment 12 can be with
Including but not limited to:One or more processor or processing unit 16, system storage 28 connect different system component
The bus 18 of (including system storage 28 and processing unit 16).
Bus 18 represents the one or more in a few class bus structures, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts
For example, these architectures include but not limited to industry standard architecture (Industry Standard
Architecture;Hereinafter referred to as:ISA) bus, microchannel architecture (Micro Channel Architecture;Below
Referred to as:MAC) bus, enhanced isa bus, Video Electronics Standards Association (Video Electronics Standards
Association;Hereinafter referred to as:VESA) local bus and peripheral component interconnection (Peripheral Component
Interconnection;Hereinafter referred to as:PCI) bus.
Computer equipment 12 typically comprises various computing systems readable medium.These media can be it is any can be by
The usable medium that computer equipment 12 accesses, including volatile and non-volatile medium, moveable and immovable medium.
System storage 28 can include the computer system readable media of form of volatile memory, such as arbitrary access
Memory (Random Access Memory;Hereinafter referred to as:RAM) 30 and/or cache memory 32.Computer equipment 12
It may further include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only conduct
Citing, storage system 34 can be used for reading and writing immovable, non-volatile magnetic media, and (Fig. 6 do not show, commonly referred to as " hard disk
Driver ").Although it not shown in Fig. 6, can provide for the magnetic to moving non-volatile magnetic disk (such as " floppy disk ") read-write
Disk drive and to removable anonvolatile optical disk (such as:Compact disc read-only memory (Compact Disc Read Only
Memory;Hereinafter referred to as:CD-ROM), digital multi read-only optical disc (Digital Video Disc Read Only
Memory;Hereinafter referred to as:DVD-ROM) or other optical mediums) read-write CD drive.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 18.Memory 28 can include at least one program and produce
Product, the program product have one group of (for example, at least one) program module, and it is each that these program modules are configured to perform the application
The function of embodiment.
Program/utility 40 with one group of (at least one) program module 42 can be stored in such as memory 28
In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs
Module and program data may include the realization of network environment in each or certain combination in these examples.Program mould
Block 42 usually performs function and/or method in embodiments described herein.
Computer equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24
Deng) communication, the equipment interacted with the computer equipment 12 communication can be also enabled a user to one or more and/or with making
Obtain any equipment that the computer equipment 12 can communicate with one or more of the other computing device (such as network interface card, modulatedemodulate
Adjust device etc.) communication.This communication can be carried out by input/output (I/O) interface 22.Also, computer equipment 12 may be used also
To pass through network adapter 20 and one or more network (such as LAN (Local Area Network;Hereinafter referred to as:
LAN), wide area network (Wide Area Network;Hereinafter referred to as:WAN) and/or public network, for example, internet) communication.Such as figure
Shown in 6, network adapter 20 is communicated by bus 18 with other modules of computer equipment 12.It should be understood that although in Fig. 6 not
It shows, computer equipment 12 can be combined and use other hardware and/or software module, included but not limited to:Microcode, equipment are driven
Dynamic device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 is stored in program in system storage 28 by operation, so as to perform various functions application and
Data processing, such as realize the control method of cheating flow provided by the embodiments of the present application.
The application also provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, above-mentioned
The control method of cheating flow provided by the embodiments of the present application is realized when computer program is executed by processor.
Appointing for one or more computer-readable media may be employed in above-mentioned non-transitorycomputer readable storage medium
Meaning combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer can
It reads storage medium and for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device
Or device or arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:
Electrical connection, portable computer diskette, hard disk, random access memory (RAM), read-only storage with one or more conducting wires
Device (Read Only Memory;Hereinafter referred to as:ROM), erasable programmable read only memory (Erasable
Programmable Read Only Memory;Hereinafter referred to as:EPROM) or flash memory, optical fiber, portable compact disc are read-only deposits
Reservoir (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer
Readable storage medium storing program for executing can be any tangible medium for including or storing program, which can be commanded execution system, device
Either device use or in connection.
Computer-readable signal media can include in a base band or as carrier wave a part propagation data-signal,
Wherein carry computer-readable program code.Diversified forms may be employed in the data-signal of this propagation, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be
Any computer-readable medium beyond computer readable storage medium, which can send, propagate or
Transmission for by instruction execution system, device either device use or program in connection.
The program code included on computer-readable medium can be transmitted with any appropriate medium, including --- but it is unlimited
In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be with one or more programming languages or its computer for combining to write to perform the application operation
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully performs, partly perform on the user computer on the user computer, the software package independent as one performs, portion
Divide and partly perform or perform on a remote computer or server completely on the remote computer on the user computer.
It is related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (Local
Area Network;Hereinafter referred to as:) or wide area network (Wide Area Network LAN;Hereinafter referred to as:WAN) it is connected to user
Computer or, it may be connected to outer computer (such as passing through Internet connection using ISP).
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms is not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It is combined in an appropriate manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the different embodiments described in this specification or example and different embodiments or exemplary feature
It closes and combines.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement custom logic function or process
Point, and the scope of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the application
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
Row system, device or equipment instruction fetch and the system executed instruction) it uses or combines these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
It puts.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (Random Access
Memory;Hereinafter referred to as:RAM), read-only memory (Read Only Memory;Hereinafter referred to as:ROM), erasable editable
Read memory (Erasable Programmable Read Only Memory;Hereinafter referred to as:EPROM) or flash memory,
Fiber device and portable optic disk read-only storage (Compact Disc Read Only Memory;Hereinafter referred to as:CD-
ROM).In addition, computer-readable medium can even is that the paper or other suitable media that can print described program on it, because
For can be then suitable with other into edlin, interpretation or if necessary for example by carrying out optical scanner to paper or other media
Mode is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used
Any one of art or their combination are realized:With for data-signal realize logic function logic gates from
Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (Programmable
Gate Array;Hereinafter referred to as:PGA), field programmable gate array (Field Programmable Gate Array;Below
Referred to as:FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a processing module, it can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be employed in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and is independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although it has been shown and retouches above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the application
System, those of ordinary skill in the art can be changed above-described embodiment, change, replace and become within the scope of application
Type.
Claims (18)
1. a kind of control method for flow of practising fraud, which is characterized in that including:
The access request that receiving terminal apparatus is sent;
If the access request includes exempting field, the value of the exemption field is updated;
Exemption verification is carried out to the access request according to the value of updated exemption field;
If the access request does not verify by exempting, refuse the access request.
2. according to the method described in claim 1, it is characterized in that, the value according to updated exemption field is to the visit
After asking that request carries out exemption verification, further include:
If the access request is verified by exempting, the access request is allowed to continue to access.
3. method according to claim 1 or 2, which is characterized in that the value to the exemption field is updated bag
It includes:
Obtain the exemption field in the access request;
The exemption field is decrypted;
Exemption in exemption field after decryption is counted and the value of the last timestamp exempted is updated.
4. according to the method described in claim 3, it is characterized in that, the value according to updated exemption field is to the visit
Asking that request exempt verifying includes:
The value of timestamp and the timestamp of the last exemption of identifying code will be passed through in updated exemption field for the first time
Value is compared respectively with current time;
The access request is not included by exempting verification:The value for the timestamp that current time passes through identifying code with the first time
Compared to the duration threshold value more than or equal to setting;
If current time is less than the duration threshold value of setting compared with the first time is by the value of the timestamp of identifying code, and
Current time is greater than or equal to the unit of setting compared with the value of the last timestamp exempted in updated exemption field
Whether duration, the then value for judging to exempt counting in updated exemption field are more than predetermined frequency threshold value;
The access request is not included by exempting verification:The value that counting is exempted in updated exemption field is more than predetermined time
Number threshold value.
5. according to the method described in claim 3, it is characterized in that, it is described to it is described exemption field value be updated after,
It further includes:
It will be put back to after updated exemption field encryption in the access request.
6. method according to claim 1 or 2, which is characterized in that the access request that the receiving terminal apparatus is sent it
Afterwards, further include:
It triggers check information server and sends check information input page to the terminal device, for using the terminal device
User in the check information input page input validation information;
After the check information server determines check information that the terminal device sends by verification, the school is obtained
Test the exemption field that information server adds in the access request;
The exemption field of acquisition is decrypted;
The value of exemption field after decryption is configured;
It will be put back to after exemption field encryption after setting in the access request.
7. according to the method described in claim 6, it is characterized in that, the value of the exemption field after described pair of decryption is configured bag
It includes:
Set user described in the exemption field for the first time by the timestamp of identifying code, the last timestamp exempted and
Exempt the value counted.
8. according to the method described in claim 6, it is characterized in that, the check information server that triggers is to the terminal device
Sending check information input page includes:
According to access times of the access request in scheduled duration, determine that the access granularity of the access request is more than or waits
After predetermined access granularity threshold value, triggering check information server sends check information incoming page to the terminal device
Face.
9. a kind of control device for flow of practising fraud, which is characterized in that including:
Receiving module, the access request sent for receiving terminal apparatus;
Update module, when the access request for being received when the receiving module includes exempting field, to the exemption field
Value be updated;
Correction verification module, for carrying out exemption school to the access request according to the updated value for exempting field of the update module
It tests;
Control module, for when the correction verification module determines that the access request does not verify by exempting, refusing the access
Request.
10. device according to claim 9, which is characterized in that
The control module is additionally operable to when the correction verification module determines that the access request is verified by exempting, described in permission
Access request continues to access.
11. the device according to claim 9 or 10, which is characterized in that the update module includes:
Acquisition submodule, for obtaining the exemption field in the access request;
Submodule is decrypted, for the exemption field to be decrypted;
Field update submodule is exempted, for the exemption counting in the exemption field after the decryption submodule decryption and recently
The value for the timestamp once exempted is updated.
12. according to the devices described in claim 11, which is characterized in that the correction verification module includes:
Comparison submodule, for value and the last time of the timestamp of identifying code will to be passed through in updated exemption field for the first time
The value of the timestamp of exemption is compared respectively with current time;
The access request is not included by exempting verification:The value for the timestamp that current time passes through identifying code with the first time
Compared to the duration threshold value more than or equal to setting;
Judging submodule, at current time with the first time by the value of the timestamp of identifying code compared be less than setting
Duration threshold value, and current time be more than or wait compared with the value of the last timestamp exempted in updated exemption field
When the unit time of setting, whether the value for judging to exempt counting in updated exemption field is more than predetermined frequency threshold value;
The access request is not included by exempting verification:The value that counting is exempted in updated exemption field is more than predetermined time
Number threshold value.
13. according to the devices described in claim 11, which is characterized in that further include:
Add module, after being updated in the update module to the value of the exemption field, by updated exemption
It is put back to after field encryption in the access request.
14. the device according to claim 9 or 10, which is characterized in that further include:
Trigger module, for after the access request that is sent in the receiving module receiving terminal apparatus, triggering check information clothes
Device be engaged in terminal device transmission check information input page, for using the user of the terminal device in the verification letter
Cease input validation information in input page;
Field acquisition module, for determining the check information of the terminal device transmission by testing in the check information server
After card, the exemption field that the check information server adds in the access request is obtained;
Field deciphering module, the exemption field for being obtained to the field acquisition module are decrypted;
Setup module is configured for the value to the exemption field after field deciphering module decryption;
Add module, for will be put back to after the exemption field encryption after setup module setting in the access request.
15. device according to claim 14, which is characterized in that
The setup module, specifically for set it is described exempt user described in field for the first time by the timestamp of identifying code,
The timestamp and exempt the value counted that the last time exempts.
16. device according to claim 14, which is characterized in that
The trigger module specifically for the access times according to the access request in scheduled duration, determines the access
The access granularity of request is greater than or equal to after predetermined access granularity threshold value, and triggering check information server is set to the terminal
Preparation send check information input page.
17. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be
The computer program run on the processor when the processor performs the computer program, realizes such as claim 1-8
In any method.
18. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the meter
The method as described in any in claim 1-8 is realized when calculation machine program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347752.5A CN108111501B (en) | 2017-12-15 | 2017-12-15 | Control method and device for cheating flow and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711347752.5A CN108111501B (en) | 2017-12-15 | 2017-12-15 | Control method and device for cheating flow and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108111501A true CN108111501A (en) | 2018-06-01 |
CN108111501B CN108111501B (en) | 2021-08-20 |
Family
ID=62216253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711347752.5A Active CN108111501B (en) | 2017-12-15 | 2017-12-15 | Control method and device for cheating flow and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111501B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981779A (en) * | 2019-03-27 | 2019-07-05 | 掌阅科技股份有限公司 | Service providing method, server and computer storage medium |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753315A (en) * | 2008-11-27 | 2010-06-23 | 百度在线网络技术(北京)有限公司 | Method, device and system for testing DDOS (distributed denial of service) attacks |
CN102739683A (en) * | 2012-06-29 | 2012-10-17 | 杭州迪普科技有限公司 | Network attack filtering method and device |
US20130238799A1 (en) * | 2010-11-01 | 2013-09-12 | Kamome Engineering, Inc. | Access control method, access control apparatus, and access control program |
CN103475637A (en) * | 2013-04-24 | 2013-12-25 | 携程计算机技术(上海)有限公司 | Network access control method and system based on IP access behaviors |
CN104079557A (en) * | 2014-05-22 | 2014-10-01 | 汉柏科技有限公司 | CC attack protection method and device |
US20140304798A1 (en) * | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods for http-body dos attack prevention with adaptive timeout |
CN104333529A (en) * | 2013-07-22 | 2015-02-04 | 中国电信股份有限公司 | Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN104580154A (en) * | 2014-12-09 | 2015-04-29 | 上海斐讯数据通信技术有限公司 | Web service security access method, system and corresponding server |
CN104660552A (en) * | 2013-11-20 | 2015-05-27 | 南京理工高新技术发展有限公司 | Wireless local area network (WLAN) intrusion detection system |
CN105763390A (en) * | 2014-12-16 | 2016-07-13 | 中兴通讯股份有限公司 | Abnormal network flow detection and control method, apparatus and system thereof |
CN106657141A (en) * | 2017-01-19 | 2017-05-10 | 西安电子科技大学 | Android malware real-time detection method based on network flow analysis |
CN106789834A (en) * | 2015-11-20 | 2017-05-31 | 中国电信股份有限公司 | Method, gateway, PCRF network elements and system for identifying user identity |
US20170214657A1 (en) * | 2016-01-22 | 2017-07-27 | Cisco Technology, Inc. | DHCP Client Lease Time Based Threat Detection for Authorised Users |
CN107463808A (en) * | 2017-07-10 | 2017-12-12 | 北京小鸟看看科技有限公司 | The call method for the functional module being integrated in operating system |
-
2017
- 2017-12-15 CN CN201711347752.5A patent/CN108111501B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753315A (en) * | 2008-11-27 | 2010-06-23 | 百度在线网络技术(北京)有限公司 | Method, device and system for testing DDOS (distributed denial of service) attacks |
US20130238799A1 (en) * | 2010-11-01 | 2013-09-12 | Kamome Engineering, Inc. | Access control method, access control apparatus, and access control program |
CN102739683A (en) * | 2012-06-29 | 2012-10-17 | 杭州迪普科技有限公司 | Network attack filtering method and device |
US20150281272A1 (en) * | 2013-04-06 | 2015-10-01 | Citrix Systems, Inc. | Systems and methods for http-body dos attack prevention with adaptive timeout |
US20140304798A1 (en) * | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods for http-body dos attack prevention with adaptive timeout |
CN103475637A (en) * | 2013-04-24 | 2013-12-25 | 携程计算机技术(上海)有限公司 | Network access control method and system based on IP access behaviors |
CN104333529A (en) * | 2013-07-22 | 2015-02-04 | 中国电信股份有限公司 | Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment |
CN104519018A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, device and system for preventing malicious requests for server |
CN104660552A (en) * | 2013-11-20 | 2015-05-27 | 南京理工高新技术发展有限公司 | Wireless local area network (WLAN) intrusion detection system |
CN104079557A (en) * | 2014-05-22 | 2014-10-01 | 汉柏科技有限公司 | CC attack protection method and device |
CN104580154A (en) * | 2014-12-09 | 2015-04-29 | 上海斐讯数据通信技术有限公司 | Web service security access method, system and corresponding server |
CN105763390A (en) * | 2014-12-16 | 2016-07-13 | 中兴通讯股份有限公司 | Abnormal network flow detection and control method, apparatus and system thereof |
CN106789834A (en) * | 2015-11-20 | 2017-05-31 | 中国电信股份有限公司 | Method, gateway, PCRF network elements and system for identifying user identity |
US20170214657A1 (en) * | 2016-01-22 | 2017-07-27 | Cisco Technology, Inc. | DHCP Client Lease Time Based Threat Detection for Authorised Users |
CN106657141A (en) * | 2017-01-19 | 2017-05-10 | 西安电子科技大学 | Android malware real-time detection method based on network flow analysis |
CN107463808A (en) * | 2017-07-10 | 2017-12-12 | 北京小鸟看看科技有限公司 | The call method for the functional module being integrated in operating system |
Non-Patent Citations (1)
Title |
---|
宗兆伟等: "基于统计分析和流量控制的DNS分布式拒绝服务攻击的检测及防御", 《2009全国计算机网络与通信学术会议》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981779A (en) * | 2019-03-27 | 2019-07-05 | 掌阅科技股份有限公司 | Service providing method, server and computer storage medium |
CN109981779B (en) * | 2019-03-27 | 2022-02-22 | 掌阅科技股份有限公司 | Service providing method, server and computer storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108111501B (en) | 2021-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108021805A (en) | Detect method, apparatus, equipment and the storage medium of Android application program running environment | |
CN110515678B (en) | Information processing method, equipment and computer storage medium | |
US9363256B2 (en) | User authentication in separate authentication channels | |
CN104519050B (en) | Login method and login system | |
JP2021522595A (en) | Cryptographic cards, electronic devices, and cryptographic service methods | |
CN104468592B (en) | Login method and login system | |
US20070150818A1 (en) | Remote control device and method | |
CN109873735A (en) | Performance test methods, device and the computer equipment of the H5 page | |
CN109213611A (en) | The striding course means of communication, device, terminal and storage medium | |
CN106911687A (en) | A kind of page makeup control method and device | |
CN106375465B (en) | A kind of data migration method and server | |
WO2016014346A1 (en) | Point of sale system with secure and unsecure modes | |
CN107395670A (en) | Information push method, device, equipment and computer-readable recording medium | |
CN108449321A (en) | Login method, server and client side | |
CN107423055A (en) | Method, apparatus, equipment and the storage medium of adaptive terminal device resolution | |
CN108900562B (en) | Login state sharing method and device, electronic equipment and medium | |
CN104091102B (en) | A kind of multi-user management method and its device based on Android system | |
CN107729768A (en) | A kind of page display method, device, Intelligent flat and storage medium | |
CN108712299A (en) | A kind of method, apparatus, equipment and the computer storage media of monitoring live streaming delay | |
US9430424B2 (en) | Universal serial bus (USB) device access from one or more virtual machines | |
CN104303172A (en) | Creating a web proxy inside a browser | |
CN106776039A (en) | A kind of data processing method and device | |
CN112308236A (en) | Method, device, electronic equipment and storage medium for processing user request | |
CN109359449A (en) | A kind of method for authenticating based on micro services, device, server and storage medium | |
US10853526B2 (en) | Dynamic screen filtering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |