Network request control method, terminal and computer readable storage medium

A network request and control method technology, applied in the field of communication, can solve problems such as easy-to-access advertisements, pornography, fraud, untimely network requests, and network speed shunt effects

Inactive Publication Date: 2019-09-20
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is that the existing intelligent terminal can easily access the "packaged" websites such as advertisements, pornography, and fraud, and the impact of network speed shunting c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request control method, terminal and computer readable storage medium
  • Network request control method, terminal and computer readable storage medium
  • Network request control method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0079] In order to solve the problem that existing smart terminals are easy to access "package" websites such as advertisements, pornography, and fraud when surfing the Internet, and the influence of network speed shunt caused by website access to background services or vicious downloads, resulting in untimely network requests, this embodiment provides A network request control method such as image 3 as shown, image 3 The basic flow chart of the network request control method provided in this embodiment, the network request control method includes:

[0080] S301. Obtain a normal network request of the terminal.

[0081] It is understandable that when users need to query content, they will visit some websites through the terminal, and the access method can be a dedicated webpage, such as "browser"; it can also be a webpage accessed through a certain application, such as "micro Bo” jumps to the web page.

[0082] In this embodiment, in the network request process, the termi...

no. 2 example

[0102] For ease of understanding, this embodiment provides a network request control method, such as Figure 6 As shown, the network request control method includes:

[0103] S601. Obtain a normal network request of the terminal.

[0104] In this embodiment, the ways to obtain network requests include but are not limited to special network requests for accessing webpages and network requests for application jumps. There may be one network request or multiple network requests, and one network request corresponds to the request IP.

[0105] S602. Determine whether the requested IP in the network request belongs to the preset control IP list, if yes, go to S603, if not, go to S605.

[0106] The terminal stores a control IP list in advance, and the terminal restricts the IP network in the control IP list. The IPs in the control IP list are "junk" IPs such as fraud, pornography, advertising, and phishing, which are set by the terminal according to the user's historical network acc...

no. 3 example

[0123] In order to facilitate understanding, this embodiment uses a more specific example to describe the network request control method, such as Figure 7 As shown, the network request control method includes:

[0124] S701. Obtain a normal network request of the terminal.

[0125] S702. Determine whether the requested IP in the network request belongs to the preset control IP list, if yes, go to S703, if not, go to S705.

[0126] During the request process, the system obtains the request IP through the network data packet, and matches it with the control IP list IPList (hereinafter referred to as IPList) maintained in the system to determine whether it belongs to the IPList.

[0127] S703. Determine whether a cancel instruction to cancel the restricted IP is received within the preset time period, if not, go to S704, if yes, go to S707.

[0128] If the currently requested IP exists in the IPlist, then the user is asked whether to cancel the restriction on the current IP, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network request control method, a terminal and a computer readable storage medium. The method comprises the steps of obtaining a normal network request of the terminal; judging whether the request IP in the network request belongs to a preset control IP list or not; if yes, rejecting the network request; if not, redistributing the network resources requested by the network according to a preset network distribution strategy. The problems that 'packaging 'websites such as advertisements, pornography, fraud and the like are easy to access, the network request is not in time due to the influence of network speed distribution caused by background service access or malignant downloading of a website is solved. The invention further discloses a terminal and a computer readable storage medium, and by implementing the scheme, the security and timeliness of network access are improved, and the experience and satisfaction of a user are ensured.

Description

technical field [0001] The present invention relates to the technical field of communications, and more specifically, to a network request control method, a terminal, and a computer-readable storage medium. Background technique [0002] At present, all smart terminals have the function of surfing the Internet, and users can use the function of surfing the Internet to realize various needs of users. When users visit some websites while using their mobile phones, some websites such as advertisements, pornography, and fraud that are hidden or obscured are often not available. Pay attention and click in; for example, click on a link that seems to be the information you need, and actually jump to another phishing website with an address. It is not uncommon for the same information to be changed into a "cloak" in the process of using the network to mislead users; in addition, there are vicious background downloads and background resident network service requests during use, so whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/911
CPCH04L47/70H04L63/10H04L63/101H04L63/1441
Inventor 房小俊
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products