Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User request intercepting method and device

A user request and user technology, applied in the computer field, can solve the problems of misjudgment and missed judgment of the interception method, and achieve the effect of accurately intercepting illegal user requests

Active Publication Date: 2017-10-10
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of this application is to propose a method and device for intercepting user requests for illegal requests, so as to solve the problems of misjudgment and missed judgment in the interception method of illegal requests existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User request intercepting method and device
  • User request intercepting method and device
  • User request intercepting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0031] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0032] figure 1 It shows an exemplary system architecture 100 to which embodiments of the method for intercepting user requests or the apparatus for intercepting user requests of the present application can be applied.

[0033] Such as figure 1 As shown, the system archite...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user request intercepting method and device. One specific implementation manner of the method comprises the steps of acquiring an activity ID of a user request, and determining whether a cache server has data corresponding to the activity ID; if the cache server does not have data corresponding to the activity ID, determining whether a user IP address of the user request is included in a preset IP address set; if the user IP address is included in the IP address set, marking the user request; if the user IP address is not included in the IP address set, determining whether the value of the activity ID is greater than a preset maximum activity ID value stored in the cache server; recording user requests with activity ID value greater than the maximum activity ID value; and intercepting the marked user requests. Through adoption of the user request intercepting method and device, illegal user requests are intercepted accurately and comprehensively.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of Internet technology, and in particular to a method and device for intercepting user requests. Background technique [0002] With the popularization of the Internet, some criminals take advantage of network loopholes to find program loopholes and attack network systems through various illegal activities. Mostly through the application program, within a period of time, the illegal request that can affect the normal operation of the server is continuously sent to the server. In a very short period of time, a large number of illegal requests query the database, resulting in an increase in the load on the database, making the response to requests for normal access to the website slow or inaccessible. [0003] At present, most web sites adopt the architecture of tomcat+cache+database. When users visit the website, they will first send a request to the server, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/101H04L63/1458H04L67/5682
Inventor 梅军
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products