Website access method and device and filter form downloading and updating method and system

A website access and filtering table technology, applied in the computer field, can solve the problems of poor scalability and high price, and achieve the effect of low expansion cost

Inactive Publication Date: 2014-05-28
云宏信息科技股份有限公司
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to propose a method for website access, which can solve the problems of high price and poor scalability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website access method and device and filter form downloading and updating method and system
  • Website access method and device and filter form downloading and updating method and system
  • Website access method and device and filter form downloading and updating method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] Such as figure 1 As shown, a website access method, which is applied to the routing component, includes the following steps:

[0052] Step S101 , loading a filter form into memory, the filter form records the correspondence between domain names and whitelists, and the whitelist includes at least one IP address. The content of the filter form is shown in the table below:

[0053]

[0054] Step S102, receiving an access request from the load balancer, that is, an http protocol request.

[0055] Step S103, parsing out the requesting domain name and requesting client IP of the access request.

[0056] Step S104, judging according to the filtering form whether there is the requesting client IP in the whitelist corresponding to the domain name of the filtering form matching the domain name of the access request, if so, performing step S105, otherwise, performing step S105. S016.

[0057] Step S105, allowing the requesting client IP to access the domain name of the filt...

Embodiment 2

[0065] Such as figure 2 As shown, a website access method, which is applied to the routing component, includes the following steps:

[0066] Step S201 , loading a filter form into memory, the filter form records the correspondence between domain names and blacklists, and the blacklist includes at least one IP address.

[0067] Step S202, receiving an access request from the load balancer;

[0068] Step S203, parsing out the requesting domain name and requesting client IP of the access request;

[0069] Step S204. According to the filtering form, it is judged whether there is the requesting client IP in the blacklist corresponding to the domain name of the filtering form matching the requesting domain name of the access request. If so, perform step S205; otherwise, perform step S206 .

[0070] Step S205, blocking the requesting client IP from accessing the domain name of the filtering form.

[0071] Step S206, allowing the requesting client IP to access the domain name of ...

Embodiment 3

[0078] The method of downloading the filter form of Embodiment 1 or Embodiment 2 is as follows: image 3 As shown, it includes the following steps:

[0079] Step S301, the routing component sends an acquisition instruction to the message middleware.

[0080] Step S302, the cloud controller (CLC, Cloud Controller) receives the acquisition instruction from the message middleware (AM, Active Messenger), fetches the filter form from the database, and sends the filter form to the message middleware.

[0081] Step S303, the routing component downloads the filter form from the message middleware, and saves the filter form to its memory, the filter form records the corresponding relationship between domain names and whitelists or blacklists, and the whitelist or blacklist Include at least one IP address.

[0082] This embodiment also discloses an implementation such as image 3 The filtering form downloading system of the shown method, it comprises the following devices:

[0083] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a website access method and device and a filter form downloading and updating method and system. The website access method is used for a route assembly, and comprises the steps that a filter form is loaded in internal storage, the corresponding relation of a domain name and a white list is recorded in the filter form, and the white list comprises at least one IP address; an access request from a load balancer is received; a request access domain name and a request client side IP of the access request are analyzed; whether the request client side IP exits in the white list corresponding to the domain name of the filter form matched with the request access domain name of the access request or not is judged according to the filter form, if the request client side IP exits, the request client side IP is allowed to have the access to the domain name of the filter form, and if the request client side IP does not exist, the request client side IP is stopped from having the access to the domain name of the filter form. A black list and the white list are moved to a route layer from a firewall or the load balancer, and the restrict access to seven layers of network protocols (http) is achieved.

Description

technical field [0001] The present invention relates to computer technology. Background technique [0002] The traditional black-and-white list technology is mainly used in firewalls to control access to the Internet through the second and third layers of the network. White list, white list filtering rules are defined in the firewall, when the IP or MAC address of the external access request matches these rules, these requests are considered as legitimate requests. Blacklist, blacklist filtering rules are defined in the firewall. When the IP or MAC address of the external access request conforms to these rules, these requests are identified as illegal requests. [0003] The current technology has the following problems: [0004] 1. The black and white list technology is aimed at network 2 and 3 layer protocols (link layer, network layer), and cannot handle application layer rules, such as http protocol; [0005] 2. Although some firewalls have load balancing capabilities ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李毅张国强谢浩安
Owner 云宏信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products