Access behavior control method and device

A control method and behavior technology, applied in the field of network information, can solve problems such as high personnel cost, large loading, and affecting nginx startup performance, and achieve the effect of simple and flexible operation and low personnel cost

Active Publication Date: 2017-03-15
BEIJING QIHOO TECH CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with this method, too much IP information needs to be written in the nginx configuration file, which will cause a large amount of data to be loaded into the memory when nginx starts, affecting the startup performance of nginx; moreover, this method depends on the IP list and cannot Realize a flexible IP control strat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access behavior control method and device
  • Access behavior control method and device
  • Access behavior control method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0024] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 It shows a schematic flowchart of an access behavior control method according to an embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0026] Step 101: Receive configuration information input by a configuration party on a configuration page.

[0027] Among them, the configuration page may be a Web page. The configuration page contains mult...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access behavior control method and device, relating to the technical field of network information. The method comprises steps as follows: receiving configuration information which is input on a configuration page by a configuration party; generating a configuration rule according to the configuration information; and synchronizing the configuration rule to a configuration agent terminal which operates in each front-end equipment so as to ensure that the configuration agent terminal controls access behaviors of the front-end equipment according to the configuration rule. By adopting the scheme, the configuration party can real-timely change the control strategy to the access behaviors of users only by operating on the configuration page, and the front-end equipment does not need to be restarted after the control strategy changes, and thus the change cost of the access behaviors can be reduced, and the change efficiency can be improved; and meanwhile, as the operation is simple and flexible, no operation of special operation and maintenance personnel is needed, and thus the personnel cost can be reduced.

Description

technical field [0001] The present invention relates to the technical field of network information, in particular to an access behavior control method and device. Background technique [0002] With the continuous development of network information technology, various network services have penetrated into people's work and life. However, when the number of visits is too large and the back-end service cannot satisfy all user access requests, in order to ensure the availability and stability of the back-end service, the control strategy for user access behavior will be adjusted in real time. [0003] For example, in order to limit the access of users in a certain area, in the existing scheme, it is necessary to record the blocked IP in the IP list, and write the IP list into the configuration file of the front-end device (such as nginx), and nginx according to the configuration file Write the IP list, filter out the user's access request corresponding to the blocked IP, and re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0263H04L63/101
Inventor 陈宗志
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products