Unlock instant, AI-driven research and patent intelligence for your innovation.

HTTP request handling method and device

A path and character technology, applied in the computer field, can solve the problems of low verification efficiency, and achieve the effect of improving the verification efficiency and solving the low verification efficiency.

Active Publication Date: 2016-04-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Embodiments of the present invention provide a method and device for processing HTTP requests, so as to at least solve the technical problem of low efficiency of verifying HTTP requests when processing HTTP requests in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • HTTP request handling method and device
  • HTTP request handling method and device
  • HTTP request handling method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The steps shown in the flow diagrams of the figures may be implemented in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, may be executed differently from this The steps shown or described are performed in the order shown or described.

[0030] Optionally, in this embodiment, the above method for processing HTTP requests can be applied to, but not limited to, such as figure 1 In the network environment shown, the client sending the HTTP request can be, but not limited to, located at figure 1 As shown in terminal 102, figure 1 The server 104 shown will receive the HTTP request through the network, wherein the server 104 can also be replaced by a terminal. Optionally, in this embodiment, the foregoing network may include but not limited to: a wide area network, a metropolitan area network, and a local area network. The server 104 will obtain the access path represented by ...

Embodiment 2

[0112] According to an embodiment of the present invention, there is also provided a device for processing HTTP requests that can be located, but not limited to, such as figure 1 In the network environment shown, the client sending the HTTP request can be, but not limited to, located at figure 1 As shown in terminal 102, figure 1 The server 104 shown will receive the HTTP request through the network, wherein the server 104 can also be replaced by a terminal. Optionally, in this embodiment, the foregoing network may include but not limited to: a wide area network, a metropolitan area network, and a local area network. The server 104 will obtain the access path represented by the character string from the HTTP request, search for a target path matching the access path, and execute the requested operation indicated by the HTTP request after finding the target path. Optionally, in this embodiment, the foregoing terminals may include, but are not limited to: mobile phones, tablet...

Embodiment 3

[0192] Embodiments of the present invention also provide a server for implementing the method for processing HTTP requests, such as figure 1 Server 104 is shown. Optionally, in this embodiment, the above server may be as figure 1 The server in the network environment shown, wherein, the client sending the HTTP request can be but not limited to be located at figure 1 As shown in terminal 102, figure 1 The server 104 shown will receive the HTTP request through the network, wherein the server 104 can also be replaced by a terminal. Optionally, in this embodiment, the foregoing network may include but not limited to: a wide area network, a metropolitan area network, and a local area network. The server 104 will obtain the access path represented by the character string from the HTTP request, search for a target path matching the access path, and execute the requested operation indicated by the HTTP request after finding the target path. Optionally, in this embodiment, the fore...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an HTTP request handling method and device. The HTTP request handling method comprises the following steps: receiving an HTTP request sent by a client; acquiring a character string signified access path from the HTTP request; searching a target path matched with the access path in a preset dendriform path node set, wherein the subsidiary path node sets from the root node to all leaf nodes in the path node set signify paths allowed to be accessed, and the same continuous character string in the different paths is signified by a plurality of connected path nodes (including the root node) in one of the subsidiary path node sets; if the target path matched with the access path is searched in the path node set, using a calibration condition corresponding to the target path to calibrate the HTTP request; and if the HTTP request meets the calibration condition, executing a request operation indicated by the HTTP request. The invention solves the technical problem in the prior art that the efficiency in calibrating the HTTP request is relatively low during handling of the HTTP request.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method and device for processing HTTP requests. Background technique [0002] At present, a "white list" is often used in many application scenarios, where the "white list" corresponds to the "black list". For example, if a blacklist is set and enabled in the computer system, users (or IP addresses, IP packets, emails, viruses, etc.) that are included in the blacklist will not pass the verification. Similarly, if a white list is set and enabled in the computer system, the users (or IP addresses, IP packets, emails, etc.) in the white list can pass the verification, or even pass the verification first, and will not be regarded as Illegal users (or illegal IP addresses, illegal IP packets, spam, viruses, etc.) cannot pass the verification, so that the security and quickness are greatly improved. [0003] In the traditional technology, the matching of the "white list" mainly use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
Inventor 彭贵春张海清苗军马杰董昭郑兴
Owner TENCENT TECH (SHENZHEN) CO LTD