Unlock instant, AI-driven research and patent intelligence for your innovation.

An information access control method, server and computer-readable storage medium

A control method and information access technology, applied in the field of information access control methods and servers, can solve problems such as poor service performance and stability of information transmission systems, no effective solutions, and inability to relieve server load pressure, and improve services. Effects of performance and stability

Active Publication Date: 2020-01-10
TENCENT TECH (BEIJING) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the server treats all requests equally, it will bring huge pressure to the server itself. Even if the distributed system architecture of the server cluster is mostly used now, with the large increase in user access demand, it will also Still can't alleviate the problem of server load pressure
At present, in order to alleviate the load pressure on the server, some access requests are discarded. Usually, when the server is found to be overloaded, new access requests are discarded. This kind of rigid processing strategy of discarding all overloaded requests is not advisable. If the new access request is a request that must be processed in a timely manner, this processing will lead to poor service performance and stability of the entire information transmission system, and a more flexible processing strategy is required to distinguish access requests and access processing control
However, in related technologies, there is no effective solution to this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information access control method, server and computer-readable storage medium
  • An information access control method, server and computer-readable storage medium
  • An information access control method, server and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0052] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, the use of suffixes such as "module", "component" or "unit" used to represent elements is only to facilitate the description of the embodiments of the present invention, and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0053] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been disclose...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an information access control method and server, wherein the method includes: receiving an access control policy, the access control policy is a request response priority processing policy generated by dividing the request source; detecting that the current When in an overload state, extract characteristic parameters from at least one first request received, the characteristic parameters are used to characterize the source of the request or are related to the source of the request, and classify the information of the request according to the source of the request bit and the user information to which the request belongs; query whether the characteristic parameter matches the access control strategy; if the characteristic parameter can be found in the access control strategy, select the request response priority corresponding to the characteristic parameter , perform phased discard processing on the at least one first request according to the request-response priority; otherwise, directly perform discard processing.

Description

technical field [0001] The invention relates to information control technology, in particular to an information access control method and server. Background technique [0002] Information transmission is a process in which one end transmits commands or status information to the other end through a channel and is received by the other end. In the process of information transmission, except for point-to-point transmission, most of the transmission methods need to be carried out with the help of servers in the Internet. Transit or Information Processing. If the server treats all requests equally, it will bring huge pressure to the server itself. Even if the distributed system architecture of the server cluster is mostly used now, with the large increase in user access demand, it will also Still can't alleviate the problem of server load pressure. At present, in order to alleviate the load pressure on the server, some access requests are discarded. Usually, when the server is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/1074H04L67/1001
Inventor 凌飞赵磊
Owner TENCENT TECH (BEIJING) CO LTD