Use method and use device of network exhaustible resource

A resource and network technology, which is applied in the field of the use method and device of network exhaustive resources, can solve the problems of normal use process limitation, affecting network users, user name and password being locked, etc.

Active Publication Date: 2016-03-02
ADVANCED NEW TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on the above characteristics of exhaustive resources, there may be malicious use of the resources on the network, and once the exhaustive resources are exhausted due to malicious use, the normal use process will be restricted
For example, for the number of wrong passwords entered, the network service provider usually provides

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use method and use device of network exhaustible resource
  • Use method and use device of network exhaustible resource
  • Use method and use device of network exhaustible resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0046] see figure 1 , the figure shows a flow of an embodiment of the method for using network exhaustion resources of the present application, and the flow includes:

[0047] Step S11: Determine the category of the current business operation environment, the category includes a trusted environment and an untrusted environment, and the curr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a use method of a network exhaustible resource. The use method comprises the steps of determining the type of a current service operation environment, wherein the types comprises trusted environment and a non-trusted environment, and the current service operation can affect the resource number of the network exhaustible resource; if the type of the current service operation environment is the non-trusted environment, limiting the resource number of the network exhaustible resource which is operated by the current service in a first-grade resource number; and/or if the type of the current service operation environment is the trusted environment, limiting the resource number of the network exhaustible resource which is operated by the current service in a second-grade resource number, wherein the second-grade resource number is larger than the first-grade resource number. The embodiment of the invention further discloses a use device of the network exhaustible resource. The use method and the use device of the invention facilitate reduction of an effect of malicious consumption of the network exhaustible resource to normal service completion.

Description

technical field [0001] The present application relates to the use of network resources, in particular to a method and device for using network exhaustive resources. Background technique [0002] There are various resources on the network. Usually, only those who own these resources are allowed to perform certain specific operations, so as to achieve specific purposes through these specific operations. For example, the number of downloads of a document with important value can be regarded as a resource. When the number of downloads is within the download limit, network users can download the document freely. When the number of downloads reaches the predetermined limit of downloads, Internet users will not have permission to download. Like natural resources, these resources on the network can also be divided into renewable resources and non-renewable resources by analogy. For non-renewable resources, they will not be regenerated repeatedly within a certain period of time (or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L47/80
CPCH04L63/14G06F21/31H04L63/02H04L63/083G06F2221/2131G06F2221/2111H04L63/0876H04L67/51H04L47/80
Inventor 王进邓玉良
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products