Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control method and system

A network access control and access volume technology, applied in the field of network access control methods and systems, can solve the problems of IP address error interception, large delay in analyzing log files, and inability to intercept blacklisted IP addresses in a timely and accurate manner, so as to reduce delays. Time and effect of guaranteed access

Active Publication Date: 2016-09-14
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantage of this analysis method is: the delay in analyzing log files is relatively large, the blacklist IP addresses cannot be intercepted in a timely and accurate manner, and it is easy to wrongly intercept the IP addresses exported by large groups

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method and system
  • Network access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention is described below based on examples, but the present invention is not limited to these examples. In the following detailed description of the invention, some specific details are set forth in detail. The present invention can be fully understood by those skilled in the art without the description of these detailed parts. In order to avoid obscuring the essence of the present invention, well-known methods, procedures, and flow charts are not described in detail. Additionally, the drawings are not necessarily drawn to scale.

[0039] The flow charts and block diagrams in the accompanying drawings illustrate the possible system framework, functions and operations of the methods, systems, and devices of the embodiments of the present invention, and the blocks on the flow charts and block diagrams can represent a module, program segment or just a segment Code, said modules, program segments and codes are all executable instructions for implementing p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network access control method and system. The method comprises the following steps: monitoring an access request of a user through a filter; obtaining a plurality of access parameters of the user from the access request; carrying out meta-analysis on the plurality of access parameters to obtain an analytical result; and carrying out interception according to the analytical result. According to the method, by means of the meta-analysis of the plurality of access parameters, malicious attacks can be effectively intercepted, and resource depletion is reduced.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a network access control method and system. Background technique [0002] With the development of network and information technology, especially the widespread use of the Internet, more and more people rely on the Internet to obtain information, shop, and handle payment services. Such as portals, blogs, e-commerce, payment websites and so on. With the increasing number of such websites, it is becoming more and more common to carry out shopping payment and handle other related affairs on the Internet. [0003] However, attacks against websites are also increasing. When a website receives a large number of malicious external access requests in a short period of time, system stability and user experience will deteriorate. For example, normal users cannot open webpages, download application forms, complete payments, etc., and in severe cases, the server will be paralyzed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/10H04L63/1441
Inventor 王志兴周正
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products