Supercharge Your Innovation With Domain-Expert AI Agents!

User access management method and system

An access management and user technology, applied in the computer field, can solve the problems of large storage space consumption, poor efficiency and accuracy, and high manslaughter rate, and achieve the effects of reducing data storage pressure, improving accuracy, and reducing manslaughter rate.

Active Publication Date: 2021-08-31
BEIJING WODONG TIANJUN INFORMATION TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are few anti-scraping strategies on the market. Most of them are based on access frequency and times. The manslaughter rate is high, the efficiency and accuracy are poor, and it requires a lot of storage space. cleanup, consumes too many resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access management method and system
  • User access management method and system
  • User access management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0045] According to the first aspect of the embodiments of the present invention, a user access management method applied to a server is provided.

[0046] figure 1 It is a schematic diagram of the main flow of a user access management method in an embodiment of the present invention. like figure 1 As shown, the method mainly includes:

[0047] Step S101: Determine the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user access management method and system, and relates to the field of computers. A specific embodiment of the method comprises the following steps of: determining a user ID list in a preset time period according to user access data in the preset time period; acquiring a login account list corresponding to each user ID in the user ID list, and determining an access frequency list of each login account in a preset time period according to the login account list and the user access data; and generating a blacklist according to the number of access times of each login account in a preset time period, and sending the blacklist to a client, so that the client intercepts page access requests of the login accounts in the blacklist. According to the user access management method and system, a three-dimensional memory structure is adopted, so that the stability of data storage is effectively improved, the storage space is saved, the accuracy of data analysis is further improved, and the false killing rate is reduced; and by setting the expiration time, the data storage pressure is further reduced, the storage space is further saved, and the data storage stability is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and system for user access management. Background technique [0002] With the rapid development of the Internet, Internet resources are becoming more and more abundant. Although most users access network resources normally, there are still some users who maliciously access and occupy network resources. The system running online will be subject to various malicious accesses, which not only affects the normal operation of the application website, but also endangers the security of the website. At the same time, compared with occasional hacker attacks, malicious access is persistent, which means that if you want to fight against malicious access, you need to expand the storage of the machine to resist a large amount of access traffic and prevent the system from crashing. [0003] At present, there are few anti-scraping strategies on the market. Most of them are b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10
Inventor 康韬
Owner BEIJING WODONG TIANJUN INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More