Method and device for processing proxy environment, terminal and storage medium
An environment and client technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as low management efficiency, thread insecurity, and unsatisfactory connection speed, so as to improve operating efficiency, improve user experience, and reduce the process of random selection Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0091] refer to figure 1 , the method includes at least the following steps:
[0092] Step S100, when acquiring an access request from a client, determine the type of the access request.
[0093] When receiving an access request from the client to the target website, determine whether the client corresponding to the access request has ever sent a request according to the header file.
[0094] Step S200. Determine the current proxy environment applicable to the access request according to the type of the access request.
[0095] If the source client corresponding to the access request has never sent a request, a proxy environment is randomly selected from the reusable proxy environment queue corresponding to the target website as the current proxy environment.
[0096] If the source client corresponding to the access request has sent a request before, the source client is assigned the proxy environment it used last time.
[0097] Step S300: Send the access request to a targe...
Embodiment 2
[0101] refer to figure 2 , on the basis of Embodiment 1, a more detailed description is made, the method includes the following steps: Step S100, when acquiring an access request from a client, determine the type of the access request.
[0102] When a client that needs to use a proxy sends an access request, it needs to first determine whether the request is a new request or an old request. The specific determination method can be determined by the header file of the request sent by the client. If it is a new request, the header file does not contain the previous proxy environment; similarly, if it is an old request, the header file contains the previous proxy environment.
[0103] Wherein, the access request is mainly an HTTP request. The header file is presented in the form of token, which contains a unique string. According to the token, the proxy environment corresponding to the last request can be identified and assigned to the client. The token generation process is ...
Embodiment 3
[0140] refer to image 3 , on the basis of embodiment one, the method also includes:
[0141] Step S400, collecting usage information of the current agent environment.
[0142] The so-called usage information includes one or more of the proxy IP address, response time, response status code of the target server, domain name of the target server, and requested url address. This information can be used to display the operating environment of all agents and to perform data analysis on the operating status of the entire method.
[0143] Step S500, generate unique identification information, and return to the client.
[0144] In this embodiment, in the form of token, it is included in the response result of the target website in the method of the response header, and returned to the client.
[0145] When the client receives the data, it will save the unique identification information, so that when the client repeatedly sends access requests to the same target website, it can conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


