Unlock instant, AI-driven research and patent intelligence for your innovation.

Resource push method and resource push device

A resource and resource sub-technology, applied in the field of resource push methods and devices, can solve problems such as high pressure on resource servers, and achieve the effect of solving excessive pressure and reducing processing pressure

Active Publication Date: 2015-05-13
TENCENT TECH (BEIJING) CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a resource push method and device, to at least solve the technical problem of excessive resource server pressure caused by decentralized resource subscription and push methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource push method and resource push device
  • Resource push method and resource push device
  • Resource push method and resource push device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] It should be clear that one of the problems to be solved by the technical solution of the present invention is to provide a method for pushing resources to subscribers who subscribe to the resources. Among them, generally speaking, for a network security system that performs relevant policy analysis based on log messages, the above-mentioned push is in response to the received log messages, or in other words, each time a log message is received, it needs to be preset to match the One or more subscribers associated with the log message or the log type to which the log message belongs pushes related resources, so that the subscribers can perform further policy-related processing operations according to the pushed resources.

[0042]In the above scenario, the related resource that needs to be sent to the subscriber in each push process represents the resource related to the received log message or the log type to which the log message belongs, and the subscriber receives th...

Embodiment 2

[0099] It should be clear that one of the problems to be solved by the technical solution of the present invention is to provide a device for pushing resources to subscribers who subscribe to the resources. Among them, generally speaking, for a network security system that performs relevant policy analysis based on log messages, the above-mentioned push is in response to the received log messages, or in other words, each time a log message is received, it needs to be preset to match the One or more subscribers associated with the log message or the log type to which the log message belongs pushes related resources, so that the subscribers can perform further policy-related processing operations according to the pushed resources.

[0100] In the above scenario, the related resource that needs to be sent to the subscriber in each push process represents the resource related to the received log message or the log type to which the log message belongs, and the subscriber receives t...

Embodiment 3

[0156] In an embodiment of the present invention, a resource service system is also provided, wherein the system may include the device for pushing resources as described in Embodiment 2 and a plurality of subscribers.

[0157] The following will be combined with Figures 24 to 26 A more specific implementation manner of the present invention is given as a reference for the resource pushing method, device and resource server system provided according to the above embodiments of the present invention.

[0158] Optionally, as in Figure 24 As shown, in the embodiment of the present invention, the overall architecture of the resource service system may include: a resource center foreground, a resource center background, and a policy unit, wherein the policy unit is used to generate and execute security policies according to received resources.

[0159] Such as Figure 24 As shown, the resource center can be divided into the front end of the resource center and the background of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a resource push method and a resource push device. The method comprises the steps of acquiring a subscription identification (ID) set and a resource ID set which are corresponding to a log type, wherein the subscription ID set comprises a plurality of subscription IDs for identifying a plurality of subscribers, the resource ID set comprises a plurality of resource IDs for identifying a plurality of different resources, and the plurality of different resources form a union set of the resources subscribed by the plurality of subscribers and related to the log type; acquiring all the resources indicated by the resource ID set from a resource server; and finding out each subscribed resource of each subscriber from all the acquired resources, and sending each found subscribed resource of each subscriber to the corresponding subscriber among the subscribers according to the subscription ID set. Through adoption of the method and device, overlarge pressure on the resource server caused by dispersed resource subscription and push methods is reduced.

Description

technical field [0001] The present invention relates to the field of Internet applications, in particular to a method and device for pushing resources. Background technique [0002] Due to the complexity of Internet applications, operators usually need to build a management system for security operations in addition to the products they operate, so as to analyze and combat operational security threats such as user malicious behaviors that occur during operations. [0003] The traditional security attack method is to use the log receiver to receive the transit log of the production system, and analyze the log message, such as parsing out the URL in the log message content or the account information input by the user, etc., and pass the parsed content to the Policy processes for analysis and strikes. However, in addition to the information content carried in the log, the policy process usually requires other resources, such as the accumulated data of user behavior, and these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/24
CPCH04L41/0293H04L41/28H04L67/146H04L67/56
Inventor 周小会
Owner TENCENT TECH (BEIJING) CO LTD