A malicious request interception method and system for improving access response speed

A response speed and malicious technology, applied in transmission systems, electrical components, etc., can solve the problems affecting user experience, access requests cannot be answered, and access request response speed is slowed down, to achieve the effect of improving access response speed.

Active Publication Date: 2019-05-31
BEIJING SHU AN XINYUN TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, when the firewall fails, the link through which the access request passes cannot be forwarded to the web server due to the interruption at the firewall, so that the access request cannot be answered
In addition, since the firewall is serially deployed on the link of the access request, the user's access request must pass through the firewall before being forwarded to the network server, which slows down the response speed of the access request and affects the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious request interception method and system for improving access response speed
  • A malicious request interception method and system for improving access response speed

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0044] The invention provides a malicious request interception method that improves access response speed. The method includes the following steps:

[0045] Step 101...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious request intercepting method and system for improving access response speed. The method comprises the following steps that a distribution server receives a network access request; an interception processor acquires the information of the network access request from the distribution server, determines an interception target according to the information of the network access request, and informs the distribution server of the interception target; the distribution server intercepts the network access request corresponding to the interception target and sends thenetwork access request which is not corresponding to the interception target to a network server. By adoption of the method and the system, the forwarding link of the network access request cannot beinfluenced even if the interception processor breaks down; and the network access request can be ensured to be normally forwarded to the network server.

Description

technical field [0001] The invention relates to the field of wireless network communication, in particular to a malicious request interception method and system for improving access response speed. Background technique [0002] At present, the interception of malicious access requests is usually implemented by serially deploying firewalls on the links of the access requests. In this case, when the firewall fails, the link through which the access request passes cannot be forwarded to the network server due to the interruption at the firewall, so that the access request cannot be answered. In addition, since the firewall is serially deployed on the link of the access request, the user's access request must pass through the firewall before being forwarded to the web server, which slows down the response speed of the access request and affects the user experience. [0003] Therefore, there is a need for a method that can intercept malicious access requests more safely and effe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0236H04L63/1416H04L63/1441
Inventor 李圣佳丛磊
Owner BEIJING SHU AN XINYUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products