CN110933068B - Black and white list real-time optimization method and device, server and storage medium - Google Patents

Black and white list real-time optimization method and device, server and storage medium Download PDF

Info

Publication number
CN110933068B
CN110933068B CN201911179265.1A CN201911179265A CN110933068B CN 110933068 B CN110933068 B CN 110933068B CN 201911179265 A CN201911179265 A CN 201911179265A CN 110933068 B CN110933068 B CN 110933068B
Authority
CN
China
Prior art keywords
item
verification
list
entry
strength
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911179265.1A
Other languages
Chinese (zh)
Other versions
CN110933068A (en
Inventor
雷森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Information Technology Co Ltd
Original Assignee
Miaozhen Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Information Technology Co Ltd filed Critical Miaozhen Information Technology Co Ltd
Priority to CN201911179265.1A priority Critical patent/CN110933068B/en
Publication of CN110933068A publication Critical patent/CN110933068A/en
Application granted granted Critical
Publication of CN110933068B publication Critical patent/CN110933068B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Abstract

The invention provides a black and white list real-time optimization method, a black and white list real-time optimization device, a server and a storage medium, and relates to the technical field of data processing. The method comprises the following steps: initiating a verification request of the items according to the entrance list probability of the items in the list, and acquiring a verification result of the items; the list of lists includes: a black list and/or a white list; updating the verification strength of the item according to the verification result of the item; and if the verification strength of the entries meets the preset condition, removing the entries from the list and updating the entrance list probability of the entries. The server sends the verification request according to the entrance list probability, and updates the blacklist and/or the white list and the corresponding entrance list probability according to the verification result, so that the server can count the access amount of the user according to the black and white list, and the accuracy of counting the access amount is improved.

Description

Black and white list real-time optimization method and device, server and storage medium
Technical Field
The invention relates to the technical field of data processing, in particular to a black and white list real-time optimization method, a black and white list real-time optimization device, a server and a storage medium.
Background
With the continuous development of network technology, more and more advertisements are delivered through internet technology, and when a user accesses the advertisements, the statistics server can count the access amount of the user to the advertisements, so that the accurate statistics of the access amount becomes more and more important.
In the related technology, the server determines whether the user is a white list user or a black list according to the user access data, periodically updates the user list, and counts the access amount of the white list user.
However, in the related art, the manner of periodically updating the black-and-white list of the user is adopted, which may cause inaccurate determination for the black-and-white list user, resulting in an inaccurate final statistical visit amount.
Disclosure of Invention
The present invention aims to provide a black and white list real-time method, apparatus, server and storage medium to solve the problem in the related art that the periodic update of the user list causes inaccurate determination of the white list user and inaccurate final statistical access.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides a method for optimizing a black and white list in real time, where the method includes:
initiating a verification request of the item according to the entrance list probability of the item in the list, and acquiring a verification result of the item; the list includes: a black list and/or a white list;
updating the verification strength of the item according to the verification result of the item;
and if the verification strength of the item meets a preset condition, removing the item from the list.
Further, before initiating the verification request of the item according to the listing probability of the item in the listing, the method further includes:
adding an access device identifier with the access times larger than or equal to a preset threshold value in a preset time period to the entries in the blacklist; and/or adding the access equipment identifier with the access times smaller than the preset threshold value in the preset time period to the items in the white list.
Further, the method further comprises:
and generating a list entry probability of each item according to the access times and the preset threshold, and adding the list entry probability of each item to the item corresponding to the list.
Further, the initiating a verification request of the entry according to the entry probability of the entry in the list includes:
and randomly initiating a verification request of the item according to a difference value between a preset probability and the entrance list probability, wherein the preset probability is a preset maximum probability value.
Further, the updating the verification strength of the entry according to the verification result of the entry includes:
if the item is an item in a blacklist and the item passes the verification, reducing the verification strength of the item;
and if the item is an item in a blacklist and the item verification fails, increasing the verification strength of the item.
Further, the updating the verification strength of the entry according to the verification result of the entry includes:
if the item is an item in a white list and the item passes the verification, increasing the verification strength of the item;
and if the item is an item in a white list and the item verification fails, reducing the verification strength of the item.
Further, the removing the entry from the list if the verification strength of the entry meets a preset condition includes:
removing the entry from the list if the verification strength of the entry is below a preset strength.
Further, the method further comprises:
adding one to the number of times of initiating verification of the entry;
if the verification strength of the entry meets a preset condition, removing the entry from the list, including:
and if the verification strength of the item is lower than the preset strength and the verification initiating times after one addition is lower than the preset times, removing the item from the list.
Further, after removing the entry from the shortlist, the method further comprises:
updating the entrance list probability of the item.
In a second aspect, an embodiment of the present invention provides a device for real-time optimizing a black and white list, where the device includes:
the acquisition module is used for initiating a verification request of the item according to the entrance list probability of the item in the list and acquiring the verification result of the item; the list includes: a black list and/or a white list;
the updating module is used for updating the verification strength of the item according to the verification result of the item;
and the removing module is used for removing the item from the list and updating the entrance list probability of the item if the verification strength of the item meets a preset condition.
Further, the apparatus further comprises:
the adding module is used for adding the access equipment identifier of which the access times are greater than or equal to a preset threshold value in a preset time period to the items in the blacklist; and/or adding the access equipment identifier with the access times smaller than the preset threshold value in the preset time period to the items in the white list.
Further, the apparatus further comprises:
and the adding module is used for generating the list entry probability of each item according to the access times and the preset threshold value, and adding the list entry probability of each item to the item corresponding to the list.
Further, the obtaining module is specifically configured to randomly initiate a verification request for the entry according to a difference between a preset probability and the entrance list probability, where the preset probability is a preset maximum probability value.
Further, the update module is specifically configured to, if the entry is an entry in a blacklist and the entry passes verification, reduce the verification strength of the entry; and if the item is an item in a blacklist and the item verification fails, increasing the verification strength of the item.
Further, the update module is specifically configured to, if the entry is an entry in a white list and the entry passes verification, perform an increase process on the verification strength of the entry; and if the item is an item in a white list and the item verification fails, reducing the verification strength of the item.
Further, the removing module is specifically configured to remove the entry from the list if the verification strength of the entry is lower than a preset strength.
Further, the apparatus further comprises:
the processing module is used for adding one to the number of times of initiating verification of the item;
the removing module is further specifically configured to remove the entry from the list if the verification strength of the entry is lower than a preset strength and the verification initiation number after one addition is lower than a preset number.
Further, the apparatus further comprises:
and the updating module is used for updating the entrance list probability of the entry.
In a third aspect, an embodiment of the present invention provides a server, including a memory and a processor, where the memory stores a computer program operable on the processor, and the processor implements the steps of the method according to any one of the first aspect when executing the computer program.
In a fourth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method according to any one of the first aspect.
The invention has the beneficial effects that: the embodiment of the invention provides a real-time black and white list optimization method, which comprises the steps of initiating a verification request of an item according to the list entry probability of the item in a list and acquiring a verification result of the item; the list of lists includes: a black list and/or a white list; updating the verification strength of the item according to the verification result of the item; and if the verification strength of the entries meets the preset condition, removing the entries from the list and updating the entrance list probability of the entries. The server sends the verification request according to the entrance list probability, and updates the blacklist and/or the white list and the corresponding entrance list probability according to the verification result, so that the server can count the access amount of the user according to the black and white list, and the accuracy of counting the access amount is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of a black-and-white list real-time optimization method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a black-and-white list real-time optimization method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a black-and-white list real-time optimization method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a black-and-white list real-time optimization apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a device for real-time black and white list optimization according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a black-and-white list real-time optimization apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention.
Fig. 1 is a schematic flowchart of a black-and-white list real-time optimization method according to an embodiment of the present invention, and as shown in fig. 1, an execution subject according to an embodiment of the present invention may be a server, where the method includes:
s101, initiating a verification request of the items according to the list entering probability of the items in the list, and acquiring a verification result of the items.
Wherein, the list includes: the present invention relates to a system and a method for displaying a content item, and more particularly, to a system and a method for displaying a content item, and a content item.
In some embodiments, a user may browse, click an advertisement, and the like on a terminal, generate a user request in response to the operation of the user, and send the request to a server, and the server may receive the request, trigger a preset program to determine a preset webpage, and send an authentication request for an item to the terminal. The terminal can receive the verification request and display a verification interface to the user, the user can perform verification operation on the verification interface, and the terminal can respond to the verification operation of the user to determine a verification result and send the verification result to the server.
In addition, the verification request may include a verification code, which may be a picture, a character, or a number, and the embodiment of the present invention does not specifically limit the type of the verification code.
It should be noted that the list may include a black list and a white list, where the black list may include at least one invalid access device identifier and a corresponding entry probability; the white list may include at least one valid access device identification and a corresponding ranking probability. Wherein, one device identifier and one corresponding ranking probability are an entry.
And S102, updating the verification strength of the item according to the verification result of the item.
Wherein, the verification result may include: verification passed and verification failed.
In a possible implementation manner, the verification result has a corresponding user equipment identifier, and the server may perform an increase or decrease process on the verification strength of the corresponding user equipment identifier according to the verification result, so as to update the verification strength.
S103, if the verification strength of the items meets the preset condition, removing the items from the list.
The verification strength of the entry may have a corresponding preset parameter, and the preset condition may be a magnitude relationship between the verification strength of the entry and the preset parameter, and of course, may also be other preset conditions, which is not specifically limited in the embodiment of the present invention.
In a possible implementation manner, when preset parameters corresponding to the entries may be preset in the server, the server may compare the preset parameters with preset conditions, and when the comparison result satisfies the preset conditions, the server may move the corresponding ue identifier out of the black list or the white list.
In the embodiment of the invention, when the server needs to count the effective flow, the effective access equipment identifier can be determined according to the white list, and the corresponding access quantity determined by the effective access equipment identifier is obtained to obtain the counted effective flow; when the server needs to count the invalid traffic, the server can determine the identity of the invalid access device according to the blacklist, acquire the identity of the invalid access device to determine the corresponding access amount, and obtain the counted invalid traffic.
Of course, the server may also update the ranking probability by using other formulas, which is not specifically limited in the embodiment of the present invention.
It should be noted that the server in the embodiment of the present invention may be a server of an internet advertisement transaction Platform, may be a server of a Data Management Platform (DMP), and may also be another server capable of updating a black-and-white list, which is not limited in the embodiment of the present invention.
In summary, the embodiment of the present invention provides a method for optimizing a black and white list in real time, where a verification request of an entry is initiated according to an entry probability of the entry in a list, and a verification result of the entry is obtained; the list of lists includes: a black list and/or a white list; updating the verification strength of the item according to the verification result of the item; and if the verification strength of the item meets the preset condition, removing the item from the list. The server sends the verification request according to the entrance list probability, and updates the blacklist and/or the white list and the corresponding entrance list probability according to the verification result, so that the server can count the access amount of the user according to the black and white list, and the accuracy of counting the access amount is improved.
Optionally, before S101, the method may further include: adding an access device identifier of which the access times are greater than or equal to a preset threshold value in a preset time period to an entry in a blacklist; and/or adding the access equipment identifier with the access times smaller than the preset threshold value in the preset time period to the items in the white list.
The access device identifier may be an IP (Internet Protocol) address of the access device, an ID (Identity Document), or other identification information of the access device, which is not limited in the embodiments of the present invention.
In a possible implementation manner, the server may record, within a preset time period, access times of the access device identifier according to an access operation of the access device at the terminal, and when the access times are greater than or equal to a preset threshold, the access device identifier is a suspicious access device identifier, and add the access device identifier to the blacklist, otherwise, add the access device identifier to the whitelist.
It should be noted that the above process of adding the access device identifier to the black list or the white list according to the number of access times is only an example, and the server may also add the access device identifier to the black list or the white list according to other access information of the access device identifier.
Optionally, the method provided in the embodiment of the present invention may further include: and generating the list entry probability of each item according to the access times and a preset threshold value, and adding the list entry probability of each item to the item corresponding to the list.
And each access equipment identifier in the list has a corresponding entrance list probability.
In a possible implementation manner, a plurality of times intervals may be preset in the server, and the server may determine, according to the access times, the time interval in which the access times are located, and convert the access times in the time interval to obtain the entry probability corresponding to the access times, that is, the entry probability corresponding to the access device identifier.
Of course, when the server converts the access times in the time interval to obtain the entry probability corresponding to the access times, the server may adopt a uniform distribution mode, a gaussian distribution mode, or other modes, which is not specifically limited in the embodiment of the present invention.
Optionally, the S101 may include: and randomly initiating a verification request of the item according to the difference value between the preset probability and the entrance list probability, wherein the preset probability is the preset maximum probability value.
In the embodiment of the present invention, the maximum probability value may be 1, and the difference between the preset probability and the ranking list probability may be 1-ranking list probability.
Optionally, fig. 2 is a schematic flowchart of a method for real-time optimizing a black-and-white list according to an embodiment of the present invention, as shown in fig. 2, the updating the verification strength of the entry according to the verification result of the entry in S102 may include:
s201, if the item is the item in the blacklist and the item passes the verification, reducing the verification strength of the item.
S202, if the item is the item in the blacklist and the item verification fails, increasing the verification strength of the item.
The initial value of the verification strength of the entry may be a preset integer, where the preset integer may be 0, may also be 1, and may also be 2, which is not specifically limited in the embodiment of the present invention.
In a possible implementation manner, the entry is an entry in a blacklist, and the entry passes verification, the verification strength corresponding to the entry can be reduced by 1; when an entry fails to verify, 1 may be added to the verification strength corresponding to the entry.
Optionally, fig. 3 is a schematic flowchart of a method for real-time optimizing a black-and-white list according to an embodiment of the present invention, as shown in fig. 3, S102 may further include:
s301, if the entry is in the white list and the entry passes the verification, increasing the verification strength of the entry.
S301, if the item is in the white list and the item verification fails, reducing the verification strength of the item.
The initial value of the verification strength of the entry may be a preset integer, where the preset integer may be 0, may also be 1, and may also be 2, which is not specifically limited in the embodiment of the present invention.
In a possible implementation manner, the entry is an entry in a blacklist, and the entry passes verification, the verification strength corresponding to the entry may be increased by 1; when the item fails to verify, the verification strength corresponding to the item can be reduced by 1.
Optionally, the step S103 may include: and if the verification strength of the item is lower than the preset strength, removing the item from the list.
If the item is in the blacklist, removing the item from the blacklist when the verification strength of the item is lower than the preset strength; if the entry is in the white list, the verification strength of the entry is lower than the preset strength, and the entry is removed from the white list.
For example, the preset strength may be a negative value, the preset strength may be-6, and the verification strength is-9, the entry and the entry probability corresponding to the entry may be removed from the blacklist or the whitelist.
Optionally, the method provided in the embodiment of the present invention may further include: and adding one to the number of times of initiating verification of the item.
In one possible embodiment, the server may update the number of verifications based on the results of the verification of the item. Optionally, when the entry is an entry in the blacklist, whether the entry verification is passed or not is processed by adding one to the verification times; when the item is the item in the white list, whether the item verification is passed or not is processed by adding one to the verification times.
Optionally, in step S103, if the verification strength of the entry meets a preset condition, removing the entry from the list may include: and if the verification strength of the item is lower than the preset strength and the verification initiating times after one addition are lower than the preset times, removing the item from the list.
In this embodiment of the present invention, the server may compare the verification strength of the entry with the preset strength, and add a processed number of the initiated verification times to the preset times to obtain a comparison result, and when the comparison result indicates that the verification strength of the entry is lower than the preset strength and the added number of the initiated verification times is lower than the preset times, remove the entry from the list.
For example, the preset strength may be a negative value, the preset strength may be-6, the preset number of times may be 8, the verification strength is-9, and when the number of times of initiating verification is 6, the entry and the entry probability corresponding to the entry may be removed from the blacklist or the white list.
Optionally, after S103, the method may include: and updating the entrance list probability of the items.
In a possible implementation manner, the server may update the ranking list probability corresponding to the user equipment identifier according to the verification strength, where the updated ranking list probability may be
Figure GDA0003386008280000091
Wherein k is<0, k is the proof strength, PoldFor the probability of entrance before update, PnewThe updated entrance list probability.
In the embodiment of the invention, the entrance list probability of the entry is updated, so that the black and white list can be conveniently and accurately determined, the probability of the verification request of the entry is initiated, and the determination of the valid user and the invalid user in the black and white list is more reliable.
An embodiment of the present invention provides a real-time black and white list optimizing apparatus, and fig. 4 is a schematic structural diagram of the real-time black and white list optimizing apparatus provided in the embodiment of the present invention, as shown in fig. 4, the apparatus includes:
the obtaining module 401 is configured to initiate a verification request for an entry according to the entry probability of the entry in the list, and obtain a verification result of the entry; the list of lists includes: a black list and/or a white list;
an updating module 402, configured to update the verification strength of the entry according to the verification result of the entry;
a removing module 403, configured to remove an entry from the list if the verification strength of the entry meets a preset condition, and update the ranking probability of the entry.
Optionally, as shown in fig. 5, the apparatus further includes:
an adding module 404, configured to add an access device identifier, in a preset time period, of which the access time is greater than or equal to a preset threshold to an entry in a blacklist; and/or adding the access equipment identifier with the access times smaller than the preset threshold value in the preset time period to the items in the white list.
Optionally, as shown in fig. 6, the apparatus further includes:
the adding module 405 is configured to generate a list entry probability of each entry according to the access times and a preset threshold, and add the list entry probability of each entry to an entry corresponding to the list.
Optionally, the obtaining module 401 is specifically configured to randomly initiate a verification request for an entry according to a difference between a preset probability and the entrance list probability, where the preset probability is a preset maximum probability value.
Optionally, the updating module 402 is specifically configured to reduce the verification strength of the entry if the entry is an entry in the blacklist and the entry passes verification; and if the item is the item in the blacklist and the item verification fails, increasing the verification strength of the item.
Optionally, the updating module 402 is specifically configured to, if the entry is an entry in the white list and the entry passes verification, increase the verification strength of the entry; and if the item is an item in the white list and the item verification fails, reducing the verification strength of the item.
Optionally, the removing module 403 is specifically configured to remove the entry from the list if the verification strength of the entry is lower than the preset strength and the number of times of initiating verification is lower than the preset number of times.
Optionally, the apparatus further comprises:
the processing module is used for adding one to the number of times of initiating verification of the item;
the removing module is further specifically configured to remove the entry from the list if the verification strength of the entry is lower than the preset strength and the number of times of initiating verification after adding one is lower than the preset number of times.
Further, the apparatus further comprises:
and the updating module is used for updating the entrance list probability of the items.
The above-mentioned apparatus is used for executing the method provided by the foregoing embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
These above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when one of the above modules is implemented in the form of a Processing element scheduler code, the Processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling program code. For another example, these modules may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention, where the server includes: a processor 701, a memory 702.
The memory 702 is used for storing programs, and the processor 701 calls the programs stored in the memory 702 to execute the above method embodiments. The specific implementation and technical effects are similar, and are not described herein again.
Optionally, the invention also provides a program product, for example a computer-readable storage medium, comprising a program which, when being executed by a processor, is adapted to carry out the above-mentioned method embodiments.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Claims (9)

1. A real-time black and white list optimization method is characterized by comprising the following steps:
initiating a verification request of the item according to the entrance list probability of the item in the list, and acquiring a verification result of the item; the list includes: a black list and/or a white list;
updating the verification strength of the item according to the verification result of the item;
if the verification strength of the item meets a preset condition, removing the item from the list;
after removing the entry from the shortlist, the method further comprises:
updating the entrance list probability of the item.
2. The method recited in claim 1, wherein the initiating a verification request for an item based on a probability of entry for the item in the roster comprises:
and randomly initiating a verification request of the item according to a difference value between a preset probability and the entrance list probability, wherein the preset probability is a preset maximum probability value.
3. The method of claim 1, wherein said updating the validation strength of the entry based on the validation result of the entry comprises:
if the item is an item in a blacklist and the item passes the verification, reducing the verification strength of the item;
and if the item is an item in a blacklist and the item verification fails, increasing the verification strength of the item.
4. The method of claim 1, wherein said updating the validation strength of the entry based on the validation result of the entry comprises:
if the item is an item in a white list and the item passes the verification, increasing the verification strength of the item;
and if the item is an item in a white list and the item verification fails, reducing the verification strength of the item.
5. The method of any of claims 1-4, wherein removing the entry from the list if the validation strength of the entry satisfies a preset condition comprises:
removing the entry from the list if the verification strength of the entry is below a preset strength.
6. The method of any one of claims 1-4, further comprising:
adding one to the number of times of initiating verification of the entry;
if the verification strength of the entry meets a preset condition, removing the entry from the list, including:
and if the verification strength of the item is lower than the preset strength and the verification initiating times after one addition is lower than the preset times, removing the item from the list.
7. An apparatus for real-time black and white list optimization, the apparatus comprising:
the acquisition module is used for initiating a verification request of the item according to the entrance list probability of the item in the list and acquiring the verification result of the item; the list includes: a black list and/or a white list;
the updating module is used for updating the verification strength of the item according to the verification result of the item;
a removing module, configured to remove the entry from the list if the verification strength of the entry meets a preset condition;
the updating module is further configured to update the ranking list probability of the entry.
8. A server, characterized by comprising a memory, a processor, a computer program being stored in the memory and being executable on the processor, the processor implementing the steps of the method of any of the preceding claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201911179265.1A 2019-11-26 2019-11-26 Black and white list real-time optimization method and device, server and storage medium Active CN110933068B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911179265.1A CN110933068B (en) 2019-11-26 2019-11-26 Black and white list real-time optimization method and device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911179265.1A CN110933068B (en) 2019-11-26 2019-11-26 Black and white list real-time optimization method and device, server and storage medium

Publications (2)

Publication Number Publication Date
CN110933068A CN110933068A (en) 2020-03-27
CN110933068B true CN110933068B (en) 2022-03-01

Family

ID=69852172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911179265.1A Active CN110933068B (en) 2019-11-26 2019-11-26 Black and white list real-time optimization method and device, server and storage medium

Country Status (1)

Country Link
CN (1) CN110933068B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395277B (en) * 2021-06-10 2023-04-07 工银科技有限公司 Method, device, system and medium for dynamically adjusting quasi-blacklist and blacklist

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN106506559A (en) * 2016-12-29 2017-03-15 北京奇虎科技有限公司 Access Behavior- Based control method and device
CN106778260A (en) * 2016-12-31 2017-05-31 网易无尾熊(杭州)科技有限公司 Attack detection method and device
CN107528861A (en) * 2017-10-12 2017-12-29 山东浪潮云服务信息科技有限公司 A kind of method and device for determining IP user's access rights
CN109842858A (en) * 2017-11-24 2019-06-04 中移(苏州)软件技术有限公司 A kind of service exception order detection method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9848005B2 (en) * 2014-07-29 2017-12-19 Aruba Networks, Inc. Client reputation driven role-based access control
US10530776B2 (en) * 2016-06-29 2020-01-07 International Business Machines Corporation Dynamic cognitive access control list management

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104519018A (en) * 2013-09-29 2015-04-15 阿里巴巴集团控股有限公司 Method, device and system for preventing malicious requests for server
CN106506559A (en) * 2016-12-29 2017-03-15 北京奇虎科技有限公司 Access Behavior- Based control method and device
CN106778260A (en) * 2016-12-31 2017-05-31 网易无尾熊(杭州)科技有限公司 Attack detection method and device
CN107528861A (en) * 2017-10-12 2017-12-29 山东浪潮云服务信息科技有限公司 A kind of method and device for determining IP user's access rights
CN109842858A (en) * 2017-11-24 2019-06-04 中移(苏州)软件技术有限公司 A kind of service exception order detection method and device

Also Published As

Publication number Publication date
CN110933068A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN107566358B (en) Risk early warning prompting method, device, medium and equipment
AU2010314292C1 (en) Method and system for adapting a session timeout period
US20180046724A1 (en) Information recommendation method and apparatus, and server
US9313226B2 (en) Method and system for network validation of information
WO2018103622A1 (en) Method and device for controlling information delivery, and storage medium
CN110033302B (en) Malicious account identification method and device
CN109495467B (en) Method and device for updating interception rule and computer readable storage medium
CN109218390B (en) User screening method and device
CN111435507A (en) Advertisement anti-cheating method and device, electronic equipment and readable storage medium
CN108876464B (en) Cheating behavior detection method and device, service equipment and storage medium
TW201931156A (en) Location information processing method and apparatus
CN109842858B (en) Service abnormal order detection method and device
CN111459783B (en) Application program optimization method and device, electronic equipment and storage medium
CN104980421B (en) Batch request processing method and system
CN106571933B (en) Service processing method and device
CN109034867B (en) Click traffic detection method and device and storage medium
CN110781153B (en) Cross-application information sharing method and system based on block chain
CN110933068B (en) Black and white list real-time optimization method and device, server and storage medium
CN109688109B (en) Verification method and device of verification code based on client information identification
CN106817296B (en) Information recommendation test method and device and electronic equipment
CN108804501A (en) A kind of method and device of detection effective information
US11334908B2 (en) Advertisement detection method, advertisement detection apparatus, and storage medium
CN109246083B (en) DGA domain name detection method and device
CN113918776B (en) Data caching method and device, electronic equipment and data query method
CN114218577A (en) API risk determination method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant