Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System for intercepting access request, method, apparatus and server

An access request and server technology, applied in the Internet field, can solve problems such as inability to bypass blocking, interception effect monitoring, etc.

Active Publication Date: 2018-01-23
ALIBABA GRP HLDG LTD
View PDF4 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The embodiment of the present application provides a system, method and device for blocking access requests, and a server to at least solve the technical problem in the related art that it is impossible to monitor the blocking effect of bypass blocking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for intercepting access request, method, apparatus and server
  • System for intercepting access request, method, apparatus and server
  • System for intercepting access request, method, apparatus and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] According to an embodiment of the present application, an embodiment of a system for blocking an access request is provided. figure 1 is a schematic structural diagram of a system for blocking access requests according to an embodiment of the present application. Such as figure 1 As shown, the system can include:

[0064] The routing device 100 is configured to receive an access request from the sender and forward the access request to the receiver; the sender may be a client or server located in a different area or region from the receiver, and send the access request via the backbone network. The above receiving end is server cluster A 104 and / or server cluster B 106 .

[0065] The bypass device 102 is used to mirror the access request to obtain the mirror request; when the mirror request matches the preset blocking rule, send a fake reset request to the receiving end, and monitor whether the receiving end returns the same access request to the sending end. A corre...

Embodiment 2

[0144] According to an embodiment of the present application, an embodiment of an apparatus for implementing the above-mentioned blocking access request is also provided, Figure 8 is a structural block diagram of an apparatus for blocking access requests according to an embodiment of the present application. Such as Figure 8 As shown, the device includes: an acquisition module 10, configured to acquire a mirroring request, wherein the mirroring request is a mirroring result of an access request sent from a sending end to a receiving end; a first determining module 20, configured to determine that the mirroring request matches a preset Blocking rules; the execution module 30 is used to send a fake reset request to the receiving end to block the access request, wherein the fake reset request is used to trigger the receiving end to close the network connection between the sending end and the receiving end; the monitoring module 40 , used to monitor whether the receiving end re...

Embodiment 3

[0158] According to an embodiment of the present application, a server is also provided. The server is used to send a forged reset request to the receiving end when the obtained mirroring request matches the preset blocking rule, and monitor whether the receiving end returns an access response corresponding to the access request to the sending end, wherein the mirroring request is Obtained by mirroring the access request sent from the sender to the receiver, the fake reset request is used to trigger the receiver to close the network connection between the sender and the receiver.

[0159] Optionally, the server is also used to determine that the access request is successfully intercepted if the receiving end is not monitored to return an access response to the sending end after the receiving end's response time to the access request is reached; if it is monitored that the receiving end returns an access response to the sending end response, it is determined that the access req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a system for intercepting an access request, a method for intercepting an access request, an apparatus for intercepting an access request and a server. The method includes the following steps that: a mirroring request is acquired, wherein the mirroring request is a mirroring result of an access request sent from a sending end to a receiving end; it is determined that the mirroring request is matched with a preset blocking rule; a fake reset request is sent to the receiving end to intercept the access request, wherein the fake reset request is used for triggeringthe receiving end to close a network connection between the sending end and the receiving end; and whether the receiving end returns an access response corresponding to the access request to the sending end is monitored. With the system, method, apparatus and server of the invention adopted, the technical problem that an intercepting effect of bypass intercepting cannot be realized in the prior art can be solved.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a system, method and device for blocking access requests, and a server. Background technique [0002] The HyperText Transfer Protocol (HTTP for short) is a standard transfer protocol for request and response between a server and a client. RFC 1945 defined the HTTP / 1.0 version, and later, RFC 2616 further defined a version commonly used today—HTTP 1.1. As the main business of the Internet, WEB services provide great convenience for human life. [0003] Bypass blocking technology refers to the use of bypass interception to obtain all data packets passing through the firewall, and further restore and analyze the protocol content to identify illegal information contained in the restored content, and perform corresponding blocking operations. The advantages of this technique are the following: [0004] (1) Does not affect the normal throughput of network equipment; [0005] (2)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张柱
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products