Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data flow limiting method and device, electronic equipment and readable storage medium

A technology of data and target traffic, applied in the Internet field, to achieve the effect of ensuring accuracy

Pending Publication Date: 2021-11-12
北京高途云集教育科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the various current limiting schemes mentioned above are all for the entire server and all users participating in the access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow limiting method and device, electronic equipment and readable storage medium
  • Data flow limiting method and device, electronic equipment and readable storage medium
  • Data flow limiting method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] To facilitate the understanding of this embodiment, an electronic device that implements a method for limiting data current disclosed in this embodiment of the present application is firstly introduced in detail.

[0036] Such as figure 1 As shown, it is a schematic diagram of the operating environment of the data throttling method provided by the embodiment of the present application. Wherein, the operating environment includes: a console cluster 110 , a client cluster 120 , a server cluster 130 , a distributed coordination server 140 and a persistent data cluster 150 .

[0037] The console cluster 110 may include one or more console servers for communicating with the server cluster 130 to monitor the server cluster 130 . The console server may be a network server, a database server, or a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA) and the like. The console cluster 110 can...

Embodiment 2

[0054] see image 3 , is a flow chart of a data rate limiting method provided in an embodiment of the present application. The following will be image 3 The specific process shown will be described in detail.

[0055] Step 201, obtaining a target traffic access request.

[0056] Optionally, the target traffic access request carries a target user identity.

[0057] Optionally, the target user identity includes, but is not limited to, the target user's identity information, the target user's access data, the target user's spatial naming (such as an access record list), and the like.

[0058] Step 202, acquiring the target historical access records of the target user ID according to the target user ID.

[0059] Optionally, the target historical access record is access data within a set time window identified by the target user identity.

[0060] Optionally, a record is formed in a time period, and each visit updates the access data recorded in the corresponding time period....

Embodiment 3

[0122]Based on the same application idea, a data current limiting device corresponding to a data current limiting method is also provided in the embodiment of the present application. Since the problem-solving principle of the device in the embodiment of the present application is the same as that of the aforementioned data current limiting method The embodiments are similar, so the implementation of the device in this embodiment can refer to the description in the embodiment of the above method, and the repetition will not be repeated.

[0123] see Figure 6 , is a schematic diagram of functional modules of a data current limiting device provided in an embodiment of the present application. Each module in a data current limiting device in this embodiment is used to execute each step in the above method embodiment. A data current limiting device includes an acquisition module 301, a request module 302, and an output module 303; wherein,

[0124] Obtaining module 301: used to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data traffic limiting method and device, electronic equipment and a readable storage medium. The method comprises the steps: according to a target traffic access request, the target traffic access request carries a target user identity identifier; obtaining a target historical access record of the target user identity identifier according to the target user identity identifier, wherein the target historical access record is access data of the target user identity identifier in a set time window; and if it is determined that the number of access times of the target user identity identifier in a set time window exceeds a set threshold according to the target historical access record, rejecting the target traffic access request. According to the method, whether the access is allowed or not is determined by judging the access times of the target traffic access request of the target identity identifier in the set time window, so that a user can enjoy personal data independently, and traffic is limited for individuals at different time levels.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular, to a data current limiting method, device, electronic equipment, and readable storage medium. Background technique [0002] With the rapid development of Internet technology, online learning is more and more sought after by people. Sometimes when many users access the same course, due to the limited carrying capacity of the server, it is likely to exceed the expected maximum access limit, which will cause the server to crash. , The user experience in class is not good. Therefore, it is necessary to limit the flow of the server. At present, the commonly used current limiting schemes on the market include fixed time window, sliding time window, leaky bucket algorithm, token bucket algorithm and other current limiting schemes. However, the above-mentioned various current limiting schemes are all for the entire server and all users participating in the access to pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/1004H04L67/146H04L67/60
Inventor 窦心春陈勇
Owner 北京高途云集教育科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products