CN109246216A - A kind of access request treating method and apparatus - Google Patents
A kind of access request treating method and apparatus Download PDFInfo
- Publication number
- CN109246216A CN109246216A CN201811055683.5A CN201811055683A CN109246216A CN 109246216 A CN109246216 A CN 109246216A CN 201811055683 A CN201811055683 A CN 201811055683A CN 109246216 A CN109246216 A CN 109246216A
- Authority
- CN
- China
- Prior art keywords
- access request
- planned number
- processing
- user identifier
- processing planned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Abstract
This application discloses a kind of access request treating method and apparatus.Method includes: the access request for receiving client and sending, and the access request carries user identifier;If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;Unappropriated processing planned number if it exists then handles planned number for user identifier distribution one and handles the access request.The problem of user behavior analysis inaccuracy caused by capable of effectively avoiding the access request due to user from being rejected.
Description
Technical field
This application involves field of computer technology more particularly to a kind of access request treating method and apparatus.
Background technique
Product data acquisition refers to the registration for acquiring user and triggering to the application products such as APP, webpage, logs in, clicks, purchasing
It the various event datas and for statistical analysis such as buys, to determine user behavior rule and hobby, and then drives the further of product
Optimization achievees the purpose that promote product income.
And since product data acquisition needs to acquire mass data, very big pressure can be brought to back-end server.
Currently, mitigate the pressure of server generally by number of requests (Query Per Second, QPS) per second is arranged, such as:
When server number of request is more than QPS upper threshold, then refuse user's request, and then alleviate the pressure of server.
Since product data acquisition needs the detailed record of each user's individual behavior, if will be made using above-mentioned current-limiting mode
It obtains each user to be likely to be refused because flow control reaches the upper limit by server, in turn, leads to the same user's
There is " tomography " in behavioral data, influences the accuracy of subsequent user behavioural analysis.
Summary of the invention
This specification embodiment provides a kind of access request processing method, exists to solve the prior art due to user's
The problem of the inaccuracy of user behavior analysis caused by access denied.
This specification embodiment also provides a kind of access request processing method, comprising:
The access request that client is sent is received, the access request carries the mark of the client;
If the mark is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;
Unappropriated processing planned number if it exists then handles planned number for mark distribution one and handles the access request.
Optionally, it is determined whether there are before unappropriated processing planned number, further includes:
Data-handling capacity based on server generates the processing planned number of predetermined quantity.
Optionally, further includes:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Optionally, for the synchronization of one processing planned number of user identifier distribution or later, further includes:
It adds user identifications into the pre-established logo collection.
Optionally, further includes:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
Optionally, further includes:
If the mark is present in the pre-established logo collection, the access request is handled.
Optionally, the logo collection includes the corresponding mark subclass of multiple client, the method also includes:
When destination client meets predetermined condition, the mark in the corresponding mark subclass in the destination client is recycled
Processing planned number.
Optionally, further includes:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre-
If the processing planned number of the recycling target identification in delay time section.
Optionally, further includes:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it
Difference.
This specification embodiment also provides a kind of access request processing unit, comprising:
Receiving module, for receiving the access request of client transmission, the access request carries user identifier;
Determining module, if being not present in for the user identifier in pre-established logo collection, it is determined whether exist
Unappropriated processing planned number;
Processing module, for handling planned number simultaneously for user identifier distribution one when there are unappropriated processing planned number
Handle the access request.
Optionally, further includes:
Planned number generation module generates the processing planned number of predetermined quantity for the data-handling capacity based on server.
Optionally, further includes:
Planned number adjusts module, for the fluctuation situation of the data-handling capacity based on the server, adjustment processing planned number
Quantity.
Optionally, the processing module, is also used to:
It adds user identifications into the pre-established logo collection.
Optionally, the processing module, is also used to:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
Optionally, the processing module, is also used to:
If the user identifier is present in the pre-established logo collection, the access request is handled.
Optionally, the logo collection includes the corresponding mark subclass of multiple client, further includes:
Planned number recycling module, for it is corresponding to recycle the destination client when destination client meets predetermined condition
Identify the processing planned number of the user identifier in subclass.
Optionally, planned number recycling module is also used to:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre-
If the processing planned number of the recycling target identification in delay time section.
Optionally, planned number recycling module is also used to:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it
Difference.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
By introducing the concept of ' the processing planned number ' of the access request of server process user, to receive carrying user
The access request of mark, and user identifier is determined there is no after in pre-established logo collection, whether there are also not for detection service device
The processing planned number of distribution, if so, for one processing planned number of user identifier distribution and handling the corresponding access of the user identifier
Request.Thus, it can be ensured that the access of user identifier and the user for the user identifier for being assigned processing planned number in logo collection is asked
Asking will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With in the prior art, limit
The scheme of access request number to be treated is compared in the server unit time, can effectively avoid reaching due to flow control
It limits and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then influence subsequent user behavioural analysis
The problem of accuracy.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of schematic diagram for application scenarios that this specification provides;
Fig. 2 is a kind of flow diagram for access request processing method that this specification provides;
The process signal of planned number step is recycled in a kind of access request processing method that Fig. 3 provides for this specification
Figure;
Fig. 4 is a kind of structural schematic diagram for access request processing unit that this specification provides;
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that this specification provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
As background technology part statement, each product is limited by server end QPS to subtract mostly on the market at present
The pressure of light server.Specific practice includes: to enter the number of request of server by QPS control, when server number of request is more than
QPS upper threshold, then refuse user's request, and then alleviates the pressure of server.
And in internet product data collecting field, each user's individual behavior requires to record in detail, control described above
The mode of flow processed is carried out under the premise of not recording user, each user may be because flow control reach the upper limit and
Refused by server.Cause the behavioral data of the same user " tomography " occur in this way, subsequent user behavioural analysis can be brought
Inaccuracy.
Based on this, the present invention provides a kind of access request processing method, and the access by introducing server process user is asked
The concept of ' the processing planned number ' asked, it can be ensured that the use of user identifier and the user identifier for being assigned processing planned number in logo collection
The access request at family will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With it is existing
Technology is compared, and the behavior number for reaching the upper limit and the same user caused by server refusal due to flow control can be effectively avoided
According to appearance ' tomography ', and then the problem of the accuracy of influence subsequent user behavioural analysis.
Application scenarios of the invention are illustrated referring to Fig. 1.
It include: server and multiple client in the application scenarios, in which:
Client, the operation carried out for acquiring user in client end interface, and service is sent in the form of access request
Device;
Server, the access request for being sent based on client is for statistical analysis to user behavior, to obtain user
Behavioural analysis result.
Wherein, user behavior includes: click, collection, browsing duration, transaction channel, transaction results etc.;User terminal can
Think the end PC, or mobile terminal makes mobile communication terminal refer to the computer equipment that can be used on the move,
Broad sense says that including mobile phone, notebook, tablet computer, POS machine include even vehicle-mounted computer.But refer to hand in most cases
Machine or smart phone and tablet computer with a variety of application functions.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Fig. 2 is a kind of flow diagram for access request processing method that this specification provides, and this method can be by Fig. 1
Server executes, and referring to fig. 2, can specifically include following steps:
Step 202 receives the access request that client is sent, and the access request carries user identifier;
Wherein, user identifier can be user account, the exclusive identification code of client etc., and access request is for requesting clothes
Business device uploads the corresponding user behavior data of the user identifier.
Step 204 determines that the user identifier whether there is and pre-established logo collection;
If so, thening follow the steps 210;If it is not, thening follow the steps 206;
Step 206 determines whether there is unappropriated processing planned number;
If so, 208 are thened follow the steps, if it is not, then process terminates;
Wherein, processing planned number is used to indicate the accessible access request quantity of server, such as: total processing planned number is
10k, remaining unappropriated processing planned number are 2k, then illustrate that the access request number that server can be handled is 10k, currently allocated to give
It is 8k that user, which handles planned number, and the remaining processing planned number to be allocated to user is 2k;
Step 208 handles planned number for user identifier distribution one;
Step 210, the processing access request, process terminate.
For step 204- step 210, it should be noted that a kind of its implementation can be with are as follows:
Server pre-establishes a logo collection, which can be sky, can also be prestored into a part of user's mark
Know, the user identifier of the pre- nonresident portion can be not take up processing planned number;The synchronous data-handling capacity based on server generates pre-
The processing planned number of fixed number amount;Wherein, the data-handling capacity of server can be obtained based on the monitoring information situation to server, this
Place does not limit its specific implementation.
Then, when receiving the access request for carrying user identifier, first by the use in the user identifier and logo collection
Family mark compares, if the user identifier is present in logo collection, handles the access request;If the user identifier is not
In the presence of in logo collection, then detect whether there are also unappropriated processing planned number, if it is not, then illustrating that the number of request of server has reached
To the predetermined upper limit, then ignore or refuse the access request;It is somebody's turn to do if so, handling planned number for user identifier distribution one and handling
Access request, and selectively the user identifier is added to the pre-established logo collection, so as to subsequently received carrying
When the access request of the user identifier, directly handle.
Optionally, the data-handling capacity of server may fluctuate, such as: by upgrading, optimize server
Data-handling capacity is reinforced, then the quantity of its accessible access request also increases corresponding, therefore, to be adjusted flexibly
The pressure state of server, method further include:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Such as: when the data-handling capacity of server increases, then increase the quantity of processing planned number;If the data of server
When processing capacity reduces, it is determined whether there are also unappropriated processing planned numbers, if so, reduce the quantity of processing planned number, if it is not,
Then keep the quantity of processing planned number constant.
Optionally, for processing planned number, using the processing planned number for finishing, distributing, excessive, distribution processing planned number quantity occurs
Situations such as variation, for the utilization rate for improving processing planned number, the recyclable processing planned number distributed is for reassignment.Can specifically it show
Example are as follows:
Situation 1, the logo collection include the corresponding mark subclass of multiple client, i.e., the client tool of each application
There is an individually mark subclass;
When the destination client in multiple client meets predetermined condition, the corresponding mark in the destination client is recycled
The processing planned number of user identifier in subclass.
Wherein, predetermined condition includes at least following one or more:
The user behavior analysis operation of destination client application is completed or terminated etc.;
The disposal right recurrence of destination client, processing weight refer to the ratio for occupying the processing planned number of server, can use
User behavior analysis precision, the efficiency etc. certainly required with destination client, such as: it is required that time limit is longer, precision is lower, it is single
The processing planned number needed in the time of position is then lower.
Situation 2, when the target identification in the logo collection meets predetermined condition, access request described in delay process,
And the processing planned number of the target identification is recycled in default delay time section.Specifically it can be exemplified are as follows:
Each user identifier holds the duration of processing planned number in step 320, server record identification set;
Step 340 is selected and holds the user identifier that duration is greater than scheduled duration threshold value, and target identification is denoted as;
The corresponding access request of the target identification is put into processing queue and carries out delay process by step 360, and is being delayed
Recycling is by the processing planned number of target identification in period, for being re-assigned to other users mark.
That is, situation 2 holds the access request of processing planned number, and the delay process access request by recording for a long time, with
By the processing allocation of quotas of the access request to the access request of other users within the period of delay process, with further
The utilization rate of processing planned number is provided.
Situation 3, the allocated processing planned number that predetermined quantity is recycled in default access low peak period;
Wherein, the access request number that presetting access low peak period can refer to that server is determined based on history access data is less than pre-
Determine the period of threshold value, corresponding access peak period can refer to that access request number is higher than the period of predetermined threshold.
It is understandable to be for the fluctuation situation of this access request number, when in access low peak period, due to distribution
Processing planned number out is far longer than the access request number for having processing planned number being an actually-received, and other do not handle the visit of planned number
It asks that the user behavior data of request can not be collected, leads to the waste for handling planned number.
Situation 3 is by recycling the processing planned number of predetermined quantity in the access low peak period corresponding period and distributing to as a result,
The access request of planned number is not handled, to increase collectable user behavior data.The predetermined quantity is less than allocated processing
The difference of access request number when planned number total amount and access low peak period.Specifically it can be exemplified are as follows:
Assuming that the processing planned number that server generates is 10k, and each user identifier is distributed to, access request when peak period
Number is 9k, and access request number when low peak period is 2k;
In the period of low peak period, there may be the processing planned number of 10k-2k=8k to be wasted, therefore, can be recycled less than 8k's
Planned number is handled, and assigns them to other user identifiers for not handling planned number, to increase the user behavior number of statistics available analysis
According to;
Period in peak period, then the processing planned number that low peak period distributes is withdrawn and returns to original subscriber's mark.
As it can be seen that the present embodiment is by introducing the concept of ' processing planned number ' of the access request of server process user, with
Receive the access request for carrying user identifier, and determine user identifier there is no after in pre-established logo collection, detection clothes
Being engaged in, whether there are also unappropriated processing planned numbers for device, if so, for one processing planned number of user identifier distribution and handling the user
Identify corresponding access request.Thus, it can be ensured that user identifier in logo collection and the user identifier for being assigned processing planned number
The access request of user will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With
In the prior art, the scheme of access request number to be treated is compared in the limiting server unit time, can effectively avoid by
Reach the upper limit in flow control and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then after influence
The problem of accuracy of continuous user behavior analysis.
In addition, for simple description, therefore, it is stated as a series of action groups for above method embodiment
It closes, but those skilled in the art should understand that, embodiment of the present invention is not limited by the described action sequence, because
Embodiment according to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art
It should be aware of, embodiment described in this description belongs to preferred embodiment, and related movement is not necessarily originally
Necessary to invention embodiment.
Fig. 4 is a kind of structural schematic diagram for access request processing unit that this specification provides, referring to fig. 4, device tool
Body may include: receiving module 41, determining module 42 and processing module 43, in which:
Receiving module 41, for receiving the access request of client transmission, the access request carries user identifier;
Determining module 42, if being not present in for the user identifier in pre-established logo collection, it is determined whether deposit
In unappropriated processing planned number;
Processing module 43, for handling planned number for user identifier distribution one when there are unappropriated processing planned number
And handle the access request.
Optionally, device further include:
Planned number produces module and generates the processing planned number of predetermined quantity for the data-handling capacity based on server.
Optionally, planned number produces module, is also used to:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Optionally, processing module 43 are also used to:
It adds user identifications into the pre-established logo collection.
Optionally, processing module 43 are also used to:
Unappropriated processing planned number if it does not exist, then ignore the access request.
Optionally, processing module 43 are also used to:
If the user identifier is present in the pre-established logo collection, the access request is handled.
Wherein, the logo collection includes the corresponding mark subclass of multiple client;
Optionally, described device further include:
Planned number recycling module, for it is corresponding to recycle the destination client when destination client meets predetermined condition
Identify the processing planned number of the mark in subclass.
Optionally, planned number recycling module is also used to:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre-
If the processing planned number of the recycling target identification in delay time section.
Optionally, planned number recycling module is also used to:
In the processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it
Difference.
As it can be seen that the present embodiment is by introducing the concept of ' processing planned number ' of the access request of server process user, with
Receive the access request for carrying user identifier, and determine user identifier there is no after in pre-established logo collection, detection clothes
Being engaged in, whether there are also unappropriated processing planned numbers for device, if so, for one processing planned number of user identifier distribution and handling the user
Identify corresponding access request.Thus, it can be ensured that user identifier in logo collection and the user identifier for being assigned processing planned number
The access request of user will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With
In the prior art, the scheme of access request number to be treated is compared in the limiting server unit time, can effectively avoid by
Reach the upper limit in flow control and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then after influence
The problem of accuracy of continuous user behavior analysis.
In addition, for above-mentioned apparatus embodiment, since it is substantially similar to method implementation, so description
Fairly simple, related place illustrates referring to the part of method implementation.Moreover, it should be noted that of the invention
In all parts of device, logical partitioning is carried out to component therein according to the function that it to be realized, still, the present invention is not
It is limited to this, can according to need and all parts are repartitioned or are combined.
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that this specification provides, and referring to Fig. 5, which includes place
Device, internal bus, network interface, memory and nonvolatile memory are managed, is also possible that required for other business certainly
Hardware.Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logic level
Upper formation access request processing unit.Certainly, other than software realization mode, other implementations are not precluded in the application,
Such as logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to
Each logic unit is also possible to hardware or logical device.
Network interface, processor and memory can be connected with each other by bus system.Bus can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of convenient for indicating
Bus.
Memory is for storing program.Specifically, program may include program code, and said program code includes computer
Operational order.Memory may include read-only memory and random access memory, and provide instruction and data to processor.It deposits
Reservoir may include high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile
Memory (non-volatile memory), for example, at least 1 magnetic disk storage.
Processor for executing the program of the memory storage, and specifically executes:
The access request that client is sent is received, the access request carries user identifier;
If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing names
Volume;
If so, for one processing planned number of user identifier distribution and handling the access request.
Access request processing unit or manager (Master) node disclosed in the above-mentioned embodiment illustrated in fig. 4 such as the application are held
Capable method can be applied in processor, or be realized by processor.Processor may be a kind of IC chip, have
The processing capacity of signal.During realization, each step of the above method can pass through the integration logic of the hardware in processor
The instruction of circuit or software form is completed.Above-mentioned processor can be general processor, including central processing unit
(Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be number
Signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific
Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array,
FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.May be implemented or
Person executes disclosed each method, step and logic diagram in the embodiment of the present application.General processor can be microprocessor or
Person's processor is also possible to any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be straight
Connect and be presented as that hardware decoding processor executes completion, or in decoding processor hardware and software module combination executed
At.Software module can be located at random access memory, and flash memory, read-only memory, programmable read only memory or electrically-erasable can
In the storage medium of this fields such as programmable memory, register maturation.The storage medium is located at memory, and processor reads storage
Information in device, in conjunction with the step of its hardware completion above method.
The method that access request processing unit can also carry out Fig. 2-3, and realize the method that manager's node executes.
Based on identical innovation and creation, the embodiment of the present application also provides a kind of computer readable storage medium, the meter
Calculation machine readable storage medium storing program for executing stores one or more programs, and one or more of programs are when by the electricity including multiple application programs
When sub- equipment executes, so that the electronic equipment executes the access request processing method that the corresponding embodiment of Fig. 2-3 provides.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of access request processing method characterized by comprising
The access request that client is sent is received, the access request carries user identifier;
If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;
Unappropriated processing planned number if it exists then handles planned number for user identifier distribution one and handles the access request.
2. the method according to claim 1, wherein being gone back before determining whether there is unappropriated processing planned number
Include:
Data-handling capacity based on server generates the processing planned number of predetermined quantity.
3. according to the method described in claim 2, it is characterized by further comprising:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
4. the method according to claim 1, wherein for the user identifier distribution one processing planned number synchronization or
Later, further includes:
It adds user identifications into the pre-established logo collection.
5. the method according to claim 1, wherein further include:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
6. the method according to claim 1, wherein further include:
If the user identifier is present in the pre-established logo collection, the access request is handled.
7. method according to claim 1 to 6, which is characterized in that the logo collection includes multiple client
Corresponding mark subclass, the method also includes:
When destination client meets predetermined condition, the user identifier in the corresponding mark subclass in the destination client is recycled
Processing planned number.
8. method according to claim 1 to 6, which is characterized in that further include:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and prolong default
When the period in the recycling target identification processing planned number.
9. method according to claim 1 to 6, which is characterized in that further include:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the difference of the access request number when predetermined quantity is less than allocated processing planned number total amount and accesses low peak period.
10. a kind of access request processing unit characterized by comprising
Receiving module, for receiving the access request of client transmission, the access request carries user identifier;
Determining module, if being not present in for the user identifier in pre-established logo collection, it is determined whether exist and do not divide
The processing planned number matched;
Processing module, for for one processing planned number of user identifier distribution and handling when there are unappropriated processing planned number
The access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811055683.5A CN109246216B (en) | 2018-09-11 | 2018-09-11 | Access request processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811055683.5A CN109246216B (en) | 2018-09-11 | 2018-09-11 | Access request processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109246216A true CN109246216A (en) | 2019-01-18 |
CN109246216B CN109246216B (en) | 2021-03-30 |
Family
ID=65060261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811055683.5A Active CN109246216B (en) | 2018-09-11 | 2018-09-11 | Access request processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246216B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225263A (en) * | 2021-04-20 | 2021-08-06 | 新华三半导体技术有限公司 | Flow request processing method and device and network chip |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103500177A (en) * | 2013-09-06 | 2014-01-08 | 乐视致新电子科技(天津)有限公司 | Method and device for counting activated users |
CN103605480A (en) * | 2013-10-29 | 2014-02-26 | 新浪网技术(中国)有限公司 | Web server and method for Web server disk resource access control |
US20140380488A1 (en) * | 2011-10-14 | 2014-12-25 | Albeado, Inc. | Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security |
CN105100072A (en) * | 2015-06-30 | 2015-11-25 | 东软集团股份有限公司 | Method and device for monitoring network node |
US20170026886A1 (en) * | 2013-09-04 | 2017-01-26 | At&T Intellectual Property I, L.P. | Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency |
CN106656959A (en) * | 2016-09-28 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Access request regulation and control method and device |
CN106936809A (en) * | 2016-12-05 | 2017-07-07 | 常州市善松信息科技有限公司 | A kind of right management method and system |
US20170212955A1 (en) * | 2016-01-26 | 2017-07-27 | jSonar Inc. | Hybrid storage and processing of very large databases |
-
2018
- 2018-09-11 CN CN201811055683.5A patent/CN109246216B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140380488A1 (en) * | 2011-10-14 | 2014-12-25 | Albeado, Inc. | Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security |
US20170026886A1 (en) * | 2013-09-04 | 2017-01-26 | At&T Intellectual Property I, L.P. | Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency |
CN103500177A (en) * | 2013-09-06 | 2014-01-08 | 乐视致新电子科技(天津)有限公司 | Method and device for counting activated users |
CN103605480A (en) * | 2013-10-29 | 2014-02-26 | 新浪网技术(中国)有限公司 | Web server and method for Web server disk resource access control |
CN105100072A (en) * | 2015-06-30 | 2015-11-25 | 东软集团股份有限公司 | Method and device for monitoring network node |
US20170212955A1 (en) * | 2016-01-26 | 2017-07-27 | jSonar Inc. | Hybrid storage and processing of very large databases |
CN106656959A (en) * | 2016-09-28 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Access request regulation and control method and device |
CN106936809A (en) * | 2016-12-05 | 2017-07-07 | 常州市善松信息科技有限公司 | A kind of right management method and system |
Non-Patent Citations (2)
Title |
---|
YUANCHAO SHU: "Dynamic Authentication with Sensory Information for the Access Control Systems", <IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS> * |
罗海艳: "移动用户网络行为分析与预测方法研究", <信息科技辑> * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225263A (en) * | 2021-04-20 | 2021-08-06 | 新华三半导体技术有限公司 | Flow request processing method and device and network chip |
Also Published As
Publication number | Publication date |
---|---|
CN109246216B (en) | 2021-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106355391B (en) | Service processing method and device | |
JP6425735B2 (en) | Determination of temporary trade limits | |
CN105260912A (en) | Resource allocation method and resource allocation device | |
CN110177348B (en) | Flow authorization control method and device | |
CN106293869A (en) | A kind of resource allocation methods and device | |
CN108845876A (en) | A kind of method and device of traffic assignments | |
CN109003090A (en) | risk control method and device | |
US9380126B2 (en) | Data collection and distribution management | |
CN109246216A (en) | A kind of access request treating method and apparatus | |
CN108647102A (en) | Service request processing method, device and the electronic equipment of heterogeneous system | |
CN110659296B (en) | Storage method, device, equipment and computer readable medium | |
CN110662188B (en) | Charging method and system | |
CN112884181A (en) | Quota information processing method and device | |
CN110557339B (en) | Flow planning method, device, computer equipment and storage medium | |
CN104123303A (en) | Method and device for providing data | |
CN106056329A (en) | Verification method and system of merchandise inventory | |
CN110991901A (en) | Task allocation method, computer storage medium and electronic device | |
CN107194712B (en) | Method and device for recording change information of shared account and method and system for supplementing account of internal account | |
CN109035040B (en) | Policy generation method and device and electronic equipment | |
CN110738806B (en) | Payment mode determination method, device and system and electronic equipment | |
WO2020224256A1 (en) | Identity confirmation | |
CN101815277A (en) | Method and device for statistical treatment of call bill data | |
WO2016186631A1 (en) | Price, completion time, and resource allocation determination for cloud services | |
CN111143546A (en) | Method and device for obtaining recommendation language and electronic equipment | |
CN104504600B (en) | The factor is carried out to historical data and returns the method and device surveyed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |