CN109246216A - A kind of access request treating method and apparatus - Google Patents

A kind of access request treating method and apparatus Download PDF

Info

Publication number
CN109246216A
CN109246216A CN201811055683.5A CN201811055683A CN109246216A CN 109246216 A CN109246216 A CN 109246216A CN 201811055683 A CN201811055683 A CN 201811055683A CN 109246216 A CN109246216 A CN 109246216A
Authority
CN
China
Prior art keywords
access request
planned number
processing
user identifier
processing planned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811055683.5A
Other languages
Chinese (zh)
Other versions
CN109246216B (en
Inventor
蒋晓海
徐明辉
刘麒赟
陈冠诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Testin Information Technology Co Ltd
Original Assignee
Beijing Testin Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Testin Information Technology Co Ltd filed Critical Beijing Testin Information Technology Co Ltd
Priority to CN201811055683.5A priority Critical patent/CN109246216B/en
Publication of CN109246216A publication Critical patent/CN109246216A/en
Application granted granted Critical
Publication of CN109246216B publication Critical patent/CN109246216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Abstract

This application discloses a kind of access request treating method and apparatus.Method includes: the access request for receiving client and sending, and the access request carries user identifier;If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;Unappropriated processing planned number if it exists then handles planned number for user identifier distribution one and handles the access request.The problem of user behavior analysis inaccuracy caused by capable of effectively avoiding the access request due to user from being rejected.

Description

A kind of access request treating method and apparatus
Technical field
This application involves field of computer technology more particularly to a kind of access request treating method and apparatus.
Background technique
Product data acquisition refers to the registration for acquiring user and triggering to the application products such as APP, webpage, logs in, clicks, purchasing It the various event datas and for statistical analysis such as buys, to determine user behavior rule and hobby, and then drives the further of product Optimization achievees the purpose that promote product income.
And since product data acquisition needs to acquire mass data, very big pressure can be brought to back-end server. Currently, mitigate the pressure of server generally by number of requests (Query Per Second, QPS) per second is arranged, such as: When server number of request is more than QPS upper threshold, then refuse user's request, and then alleviate the pressure of server.
Since product data acquisition needs the detailed record of each user's individual behavior, if will be made using above-mentioned current-limiting mode It obtains each user to be likely to be refused because flow control reaches the upper limit by server, in turn, leads to the same user's There is " tomography " in behavioral data, influences the accuracy of subsequent user behavioural analysis.
Summary of the invention
This specification embodiment provides a kind of access request processing method, exists to solve the prior art due to user's The problem of the inaccuracy of user behavior analysis caused by access denied.
This specification embodiment also provides a kind of access request processing method, comprising:
The access request that client is sent is received, the access request carries the mark of the client;
If the mark is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;
Unappropriated processing planned number if it exists then handles planned number for mark distribution one and handles the access request.
Optionally, it is determined whether there are before unappropriated processing planned number, further includes:
Data-handling capacity based on server generates the processing planned number of predetermined quantity.
Optionally, further includes:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Optionally, for the synchronization of one processing planned number of user identifier distribution or later, further includes:
It adds user identifications into the pre-established logo collection.
Optionally, further includes:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
Optionally, further includes:
If the mark is present in the pre-established logo collection, the access request is handled.
Optionally, the logo collection includes the corresponding mark subclass of multiple client, the method also includes:
When destination client meets predetermined condition, the mark in the corresponding mark subclass in the destination client is recycled Processing planned number.
Optionally, further includes:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre- If the processing planned number of the recycling target identification in delay time section.
Optionally, further includes:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it Difference.
This specification embodiment also provides a kind of access request processing unit, comprising:
Receiving module, for receiving the access request of client transmission, the access request carries user identifier;
Determining module, if being not present in for the user identifier in pre-established logo collection, it is determined whether exist Unappropriated processing planned number;
Processing module, for handling planned number simultaneously for user identifier distribution one when there are unappropriated processing planned number Handle the access request.
Optionally, further includes:
Planned number generation module generates the processing planned number of predetermined quantity for the data-handling capacity based on server.
Optionally, further includes:
Planned number adjusts module, for the fluctuation situation of the data-handling capacity based on the server, adjustment processing planned number Quantity.
Optionally, the processing module, is also used to:
It adds user identifications into the pre-established logo collection.
Optionally, the processing module, is also used to:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
Optionally, the processing module, is also used to:
If the user identifier is present in the pre-established logo collection, the access request is handled.
Optionally, the logo collection includes the corresponding mark subclass of multiple client, further includes:
Planned number recycling module, for it is corresponding to recycle the destination client when destination client meets predetermined condition Identify the processing planned number of the user identifier in subclass.
Optionally, planned number recycling module is also used to:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre- If the processing planned number of the recycling target identification in delay time section.
Optionally, planned number recycling module is also used to:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it Difference.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
By introducing the concept of ' the processing planned number ' of the access request of server process user, to receive carrying user The access request of mark, and user identifier is determined there is no after in pre-established logo collection, whether there are also not for detection service device The processing planned number of distribution, if so, for one processing planned number of user identifier distribution and handling the corresponding access of the user identifier Request.Thus, it can be ensured that the access of user identifier and the user for the user identifier for being assigned processing planned number in logo collection is asked Asking will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With in the prior art, limit The scheme of access request number to be treated is compared in the server unit time, can effectively avoid reaching due to flow control It limits and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then influence subsequent user behavioural analysis The problem of accuracy.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of schematic diagram for application scenarios that this specification provides;
Fig. 2 is a kind of flow diagram for access request processing method that this specification provides;
The process signal of planned number step is recycled in a kind of access request processing method that Fig. 3 provides for this specification Figure;
Fig. 4 is a kind of structural schematic diagram for access request processing unit that this specification provides;
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that this specification provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
As background technology part statement, each product is limited by server end QPS to subtract mostly on the market at present The pressure of light server.Specific practice includes: to enter the number of request of server by QPS control, when server number of request is more than QPS upper threshold, then refuse user's request, and then alleviates the pressure of server.
And in internet product data collecting field, each user's individual behavior requires to record in detail, control described above The mode of flow processed is carried out under the premise of not recording user, each user may be because flow control reach the upper limit and Refused by server.Cause the behavioral data of the same user " tomography " occur in this way, subsequent user behavioural analysis can be brought Inaccuracy.
Based on this, the present invention provides a kind of access request processing method, and the access by introducing server process user is asked The concept of ' the processing planned number ' asked, it can be ensured that the use of user identifier and the user identifier for being assigned processing planned number in logo collection The access request at family will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With it is existing Technology is compared, and the behavior number for reaching the upper limit and the same user caused by server refusal due to flow control can be effectively avoided According to appearance ' tomography ', and then the problem of the accuracy of influence subsequent user behavioural analysis.
Application scenarios of the invention are illustrated referring to Fig. 1.
It include: server and multiple client in the application scenarios, in which:
Client, the operation carried out for acquiring user in client end interface, and service is sent in the form of access request Device;
Server, the access request for being sent based on client is for statistical analysis to user behavior, to obtain user Behavioural analysis result.
Wherein, user behavior includes: click, collection, browsing duration, transaction channel, transaction results etc.;User terminal can Think the end PC, or mobile terminal makes mobile communication terminal refer to the computer equipment that can be used on the move, Broad sense says that including mobile phone, notebook, tablet computer, POS machine include even vehicle-mounted computer.But refer to hand in most cases Machine or smart phone and tablet computer with a variety of application functions.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Fig. 2 is a kind of flow diagram for access request processing method that this specification provides, and this method can be by Fig. 1 Server executes, and referring to fig. 2, can specifically include following steps:
Step 202 receives the access request that client is sent, and the access request carries user identifier;
Wherein, user identifier can be user account, the exclusive identification code of client etc., and access request is for requesting clothes Business device uploads the corresponding user behavior data of the user identifier.
Step 204 determines that the user identifier whether there is and pre-established logo collection;
If so, thening follow the steps 210;If it is not, thening follow the steps 206;
Step 206 determines whether there is unappropriated processing planned number;
If so, 208 are thened follow the steps, if it is not, then process terminates;
Wherein, processing planned number is used to indicate the accessible access request quantity of server, such as: total processing planned number is 10k, remaining unappropriated processing planned number are 2k, then illustrate that the access request number that server can be handled is 10k, currently allocated to give It is 8k that user, which handles planned number, and the remaining processing planned number to be allocated to user is 2k;
Step 208 handles planned number for user identifier distribution one;
Step 210, the processing access request, process terminate.
For step 204- step 210, it should be noted that a kind of its implementation can be with are as follows:
Server pre-establishes a logo collection, which can be sky, can also be prestored into a part of user's mark Know, the user identifier of the pre- nonresident portion can be not take up processing planned number;The synchronous data-handling capacity based on server generates pre- The processing planned number of fixed number amount;Wherein, the data-handling capacity of server can be obtained based on the monitoring information situation to server, this Place does not limit its specific implementation.
Then, when receiving the access request for carrying user identifier, first by the use in the user identifier and logo collection Family mark compares, if the user identifier is present in logo collection, handles the access request;If the user identifier is not In the presence of in logo collection, then detect whether there are also unappropriated processing planned number, if it is not, then illustrating that the number of request of server has reached To the predetermined upper limit, then ignore or refuse the access request;It is somebody's turn to do if so, handling planned number for user identifier distribution one and handling Access request, and selectively the user identifier is added to the pre-established logo collection, so as to subsequently received carrying When the access request of the user identifier, directly handle.
Optionally, the data-handling capacity of server may fluctuate, such as: by upgrading, optimize server Data-handling capacity is reinforced, then the quantity of its accessible access request also increases corresponding, therefore, to be adjusted flexibly The pressure state of server, method further include:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Such as: when the data-handling capacity of server increases, then increase the quantity of processing planned number;If the data of server When processing capacity reduces, it is determined whether there are also unappropriated processing planned numbers, if so, reduce the quantity of processing planned number, if it is not, Then keep the quantity of processing planned number constant.
Optionally, for processing planned number, using the processing planned number for finishing, distributing, excessive, distribution processing planned number quantity occurs Situations such as variation, for the utilization rate for improving processing planned number, the recyclable processing planned number distributed is for reassignment.Can specifically it show Example are as follows:
Situation 1, the logo collection include the corresponding mark subclass of multiple client, i.e., the client tool of each application There is an individually mark subclass;
When the destination client in multiple client meets predetermined condition, the corresponding mark in the destination client is recycled The processing planned number of user identifier in subclass.
Wherein, predetermined condition includes at least following one or more:
The user behavior analysis operation of destination client application is completed or terminated etc.;
The disposal right recurrence of destination client, processing weight refer to the ratio for occupying the processing planned number of server, can use User behavior analysis precision, the efficiency etc. certainly required with destination client, such as: it is required that time limit is longer, precision is lower, it is single The processing planned number needed in the time of position is then lower.
Situation 2, when the target identification in the logo collection meets predetermined condition, access request described in delay process, And the processing planned number of the target identification is recycled in default delay time section.Specifically it can be exemplified are as follows:
Each user identifier holds the duration of processing planned number in step 320, server record identification set;
Step 340 is selected and holds the user identifier that duration is greater than scheduled duration threshold value, and target identification is denoted as;
The corresponding access request of the target identification is put into processing queue and carries out delay process by step 360, and is being delayed Recycling is by the processing planned number of target identification in period, for being re-assigned to other users mark.
That is, situation 2 holds the access request of processing planned number, and the delay process access request by recording for a long time, with By the processing allocation of quotas of the access request to the access request of other users within the period of delay process, with further The utilization rate of processing planned number is provided.
Situation 3, the allocated processing planned number that predetermined quantity is recycled in default access low peak period;
Wherein, the access request number that presetting access low peak period can refer to that server is determined based on history access data is less than pre- Determine the period of threshold value, corresponding access peak period can refer to that access request number is higher than the period of predetermined threshold.
It is understandable to be for the fluctuation situation of this access request number, when in access low peak period, due to distribution Processing planned number out is far longer than the access request number for having processing planned number being an actually-received, and other do not handle the visit of planned number It asks that the user behavior data of request can not be collected, leads to the waste for handling planned number.
Situation 3 is by recycling the processing planned number of predetermined quantity in the access low peak period corresponding period and distributing to as a result, The access request of planned number is not handled, to increase collectable user behavior data.The predetermined quantity is less than allocated processing The difference of access request number when planned number total amount and access low peak period.Specifically it can be exemplified are as follows:
Assuming that the processing planned number that server generates is 10k, and each user identifier is distributed to, access request when peak period Number is 9k, and access request number when low peak period is 2k;
In the period of low peak period, there may be the processing planned number of 10k-2k=8k to be wasted, therefore, can be recycled less than 8k's Planned number is handled, and assigns them to other user identifiers for not handling planned number, to increase the user behavior number of statistics available analysis According to;
Period in peak period, then the processing planned number that low peak period distributes is withdrawn and returns to original subscriber's mark.
As it can be seen that the present embodiment is by introducing the concept of ' processing planned number ' of the access request of server process user, with Receive the access request for carrying user identifier, and determine user identifier there is no after in pre-established logo collection, detection clothes Being engaged in, whether there are also unappropriated processing planned numbers for device, if so, for one processing planned number of user identifier distribution and handling the user Identify corresponding access request.Thus, it can be ensured that user identifier in logo collection and the user identifier for being assigned processing planned number The access request of user will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With In the prior art, the scheme of access request number to be treated is compared in the limiting server unit time, can effectively avoid by Reach the upper limit in flow control and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then after influence The problem of accuracy of continuous user behavior analysis.
In addition, for simple description, therefore, it is stated as a series of action groups for above method embodiment It closes, but those skilled in the art should understand that, embodiment of the present invention is not limited by the described action sequence, because Embodiment according to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art It should be aware of, embodiment described in this description belongs to preferred embodiment, and related movement is not necessarily originally Necessary to invention embodiment.
Fig. 4 is a kind of structural schematic diagram for access request processing unit that this specification provides, referring to fig. 4, device tool Body may include: receiving module 41, determining module 42 and processing module 43, in which:
Receiving module 41, for receiving the access request of client transmission, the access request carries user identifier;
Determining module 42, if being not present in for the user identifier in pre-established logo collection, it is determined whether deposit In unappropriated processing planned number;
Processing module 43, for handling planned number for user identifier distribution one when there are unappropriated processing planned number And handle the access request.
Optionally, device further include:
Planned number produces module and generates the processing planned number of predetermined quantity for the data-handling capacity based on server.
Optionally, planned number produces module, is also used to:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
Optionally, processing module 43 are also used to:
It adds user identifications into the pre-established logo collection.
Optionally, processing module 43 are also used to:
Unappropriated processing planned number if it does not exist, then ignore the access request.
Optionally, processing module 43 are also used to:
If the user identifier is present in the pre-established logo collection, the access request is handled.
Wherein, the logo collection includes the corresponding mark subclass of multiple client;
Optionally, described device further include:
Planned number recycling module, for it is corresponding to recycle the destination client when destination client meets predetermined condition Identify the processing planned number of the mark in subclass.
Optionally, planned number recycling module is also used to:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and pre- If the processing planned number of the recycling target identification in delay time section.
Optionally, planned number recycling module is also used to:
In the processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the predetermined quantity be less than it is allocated processing planned number total amount and access low peak period when access request number it Difference.
As it can be seen that the present embodiment is by introducing the concept of ' processing planned number ' of the access request of server process user, with Receive the access request for carrying user identifier, and determine user identifier there is no after in pre-established logo collection, detection clothes Being engaged in, whether there are also unappropriated processing planned numbers for device, if so, for one processing planned number of user identifier distribution and handling the user Identify corresponding access request.Thus, it can be ensured that user identifier in logo collection and the user identifier for being assigned processing planned number The access request of user will not be refused by server, and then ensure the accuracy of the subsequent behavioural analysis to these users.With In the prior art, the scheme of access request number to be treated is compared in the limiting server unit time, can effectively avoid by Reach the upper limit in flow control and ' tomography ' is occurred by the behavioral data that server refuses caused same user, and then after influence The problem of accuracy of continuous user behavior analysis.
In addition, for above-mentioned apparatus embodiment, since it is substantially similar to method implementation, so description Fairly simple, related place illustrates referring to the part of method implementation.Moreover, it should be noted that of the invention In all parts of device, logical partitioning is carried out to component therein according to the function that it to be realized, still, the present invention is not It is limited to this, can according to need and all parts are repartitioned or are combined.
Fig. 5 is the structural schematic diagram for a kind of electronic equipment that this specification provides, and referring to Fig. 5, which includes place Device, internal bus, network interface, memory and nonvolatile memory are managed, is also possible that required for other business certainly Hardware.Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logic level Upper formation access request processing unit.Certainly, other than software realization mode, other implementations are not precluded in the application, Such as logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to Each logic unit is also possible to hardware or logical device.
Network interface, processor and memory can be connected with each other by bus system.Bus can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory is for storing program.Specifically, program may include program code, and said program code includes computer Operational order.Memory may include read-only memory and random access memory, and provide instruction and data to processor.It deposits Reservoir may include high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile Memory (non-volatile memory), for example, at least 1 magnetic disk storage.
Processor for executing the program of the memory storage, and specifically executes:
The access request that client is sent is received, the access request carries user identifier;
If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing names Volume;
If so, for one processing planned number of user identifier distribution and handling the access request.
Access request processing unit or manager (Master) node disclosed in the above-mentioned embodiment illustrated in fig. 4 such as the application are held Capable method can be applied in processor, or be realized by processor.Processor may be a kind of IC chip, have The processing capacity of signal.During realization, each step of the above method can pass through the integration logic of the hardware in processor The instruction of circuit or software form is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be number Signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.May be implemented or Person executes disclosed each method, step and logic diagram in the embodiment of the present application.General processor can be microprocessor or Person's processor is also possible to any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be straight Connect and be presented as that hardware decoding processor executes completion, or in decoding processor hardware and software module combination executed At.Software module can be located at random access memory, and flash memory, read-only memory, programmable read only memory or electrically-erasable can In the storage medium of this fields such as programmable memory, register maturation.The storage medium is located at memory, and processor reads storage Information in device, in conjunction with the step of its hardware completion above method.
The method that access request processing unit can also carry out Fig. 2-3, and realize the method that manager's node executes.
Based on identical innovation and creation, the embodiment of the present application also provides a kind of computer readable storage medium, the meter Calculation machine readable storage medium storing program for executing stores one or more programs, and one or more of programs are when by the electricity including multiple application programs When sub- equipment executes, so that the electronic equipment executes the access request processing method that the corresponding embodiment of Fig. 2-3 provides.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of access request processing method characterized by comprising
The access request that client is sent is received, the access request carries user identifier;
If the user identifier is not present in pre-established logo collection, it is determined whether there are unappropriated processing planned numbers;
Unappropriated processing planned number if it exists then handles planned number for user identifier distribution one and handles the access request.
2. the method according to claim 1, wherein being gone back before determining whether there is unappropriated processing planned number Include:
Data-handling capacity based on server generates the processing planned number of predetermined quantity.
3. according to the method described in claim 2, it is characterized by further comprising:
The fluctuation situation of data-handling capacity based on the server, the quantity of adjustment processing planned number.
4. the method according to claim 1, wherein for the user identifier distribution one processing planned number synchronization or Later, further includes:
It adds user identifications into the pre-established logo collection.
5. the method according to claim 1, wherein further include:
The access request is then ignored or refused to unappropriated processing planned number if it does not exist.
6. the method according to claim 1, wherein further include:
If the user identifier is present in the pre-established logo collection, the access request is handled.
7. method according to claim 1 to 6, which is characterized in that the logo collection includes multiple client Corresponding mark subclass, the method also includes:
When destination client meets predetermined condition, the user identifier in the corresponding mark subclass in the destination client is recycled Processing planned number.
8. method according to claim 1 to 6, which is characterized in that further include:
When the target identification in the logo collection meets predetermined condition, access request described in delay process, and prolong default When the period in the recycling target identification processing planned number.
9. method according to claim 1 to 6, which is characterized in that further include:
In the allocated processing planned number of default access low peak period recycling predetermined quantity;
Wherein, the difference of the access request number when predetermined quantity is less than allocated processing planned number total amount and accesses low peak period.
10. a kind of access request processing unit characterized by comprising
Receiving module, for receiving the access request of client transmission, the access request carries user identifier;
Determining module, if being not present in for the user identifier in pre-established logo collection, it is determined whether exist and do not divide The processing planned number matched;
Processing module, for for one processing planned number of user identifier distribution and handling when there are unappropriated processing planned number The access request.
CN201811055683.5A 2018-09-11 2018-09-11 Access request processing method and device Active CN109246216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811055683.5A CN109246216B (en) 2018-09-11 2018-09-11 Access request processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811055683.5A CN109246216B (en) 2018-09-11 2018-09-11 Access request processing method and device

Publications (2)

Publication Number Publication Date
CN109246216A true CN109246216A (en) 2019-01-18
CN109246216B CN109246216B (en) 2021-03-30

Family

ID=65060261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811055683.5A Active CN109246216B (en) 2018-09-11 2018-09-11 Access request processing method and device

Country Status (1)

Country Link
CN (1) CN109246216B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225263A (en) * 2021-04-20 2021-08-06 新华三半导体技术有限公司 Flow request processing method and device and network chip

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500177A (en) * 2013-09-06 2014-01-08 乐视致新电子科技(天津)有限公司 Method and device for counting activated users
CN103605480A (en) * 2013-10-29 2014-02-26 新浪网技术(中国)有限公司 Web server and method for Web server disk resource access control
US20140380488A1 (en) * 2011-10-14 2014-12-25 Albeado, Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
CN105100072A (en) * 2015-06-30 2015-11-25 东软集团股份有限公司 Method and device for monitoring network node
US20170026886A1 (en) * 2013-09-04 2017-01-26 At&T Intellectual Property I, L.P. Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device
CN106936809A (en) * 2016-12-05 2017-07-07 常州市善松信息科技有限公司 A kind of right management method and system
US20170212955A1 (en) * 2016-01-26 2017-07-27 jSonar Inc. Hybrid storage and processing of very large databases

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140380488A1 (en) * 2011-10-14 2014-12-25 Albeado, Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security
US20170026886A1 (en) * 2013-09-04 2017-01-26 At&T Intellectual Property I, L.P. Cell broadcast for smart traffic steering across radio technologies with improved radio efficiency
CN103500177A (en) * 2013-09-06 2014-01-08 乐视致新电子科技(天津)有限公司 Method and device for counting activated users
CN103605480A (en) * 2013-10-29 2014-02-26 新浪网技术(中国)有限公司 Web server and method for Web server disk resource access control
CN105100072A (en) * 2015-06-30 2015-11-25 东软集团股份有限公司 Method and device for monitoring network node
US20170212955A1 (en) * 2016-01-26 2017-07-27 jSonar Inc. Hybrid storage and processing of very large databases
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device
CN106936809A (en) * 2016-12-05 2017-07-07 常州市善松信息科技有限公司 A kind of right management method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YUANCHAO SHU: "Dynamic Authentication with Sensory Information for the Access Control Systems", <IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS> *
罗海艳: "移动用户网络行为分析与预测方法研究", <信息科技辑> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225263A (en) * 2021-04-20 2021-08-06 新华三半导体技术有限公司 Flow request processing method and device and network chip

Also Published As

Publication number Publication date
CN109246216B (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN106355391B (en) Service processing method and device
JP6425735B2 (en) Determination of temporary trade limits
CN105260912A (en) Resource allocation method and resource allocation device
CN110177348B (en) Flow authorization control method and device
CN106293869A (en) A kind of resource allocation methods and device
CN108845876A (en) A kind of method and device of traffic assignments
CN109003090A (en) risk control method and device
US9380126B2 (en) Data collection and distribution management
CN109246216A (en) A kind of access request treating method and apparatus
CN108647102A (en) Service request processing method, device and the electronic equipment of heterogeneous system
CN110659296B (en) Storage method, device, equipment and computer readable medium
CN110662188B (en) Charging method and system
CN112884181A (en) Quota information processing method and device
CN110557339B (en) Flow planning method, device, computer equipment and storage medium
CN104123303A (en) Method and device for providing data
CN106056329A (en) Verification method and system of merchandise inventory
CN110991901A (en) Task allocation method, computer storage medium and electronic device
CN107194712B (en) Method and device for recording change information of shared account and method and system for supplementing account of internal account
CN109035040B (en) Policy generation method and device and electronic equipment
CN110738806B (en) Payment mode determination method, device and system and electronic equipment
WO2020224256A1 (en) Identity confirmation
CN101815277A (en) Method and device for statistical treatment of call bill data
WO2016186631A1 (en) Price, completion time, and resource allocation determination for cloud services
CN111143546A (en) Method and device for obtaining recommendation language and electronic equipment
CN104504600B (en) The factor is carried out to historical data and returns the method and device surveyed

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant