Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for processing proxy environment, terminal and storage medium

An environment and client technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as low management efficiency, thread insecurity, and unsatisfactory connection speed, so as to improve operating efficiency, improve user experience, and reduce the process of random selection Effect

Pending Publication Date: 2022-01-11
盐城金堤科技有限公司
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing solutions, there are often a series of problems such as low management efficiency, unsatisfactory connection speed, and unsafe threads.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing proxy environment, terminal and storage medium
  • Method and device for processing proxy environment, terminal and storage medium
  • Method and device for processing proxy environment, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] refer to figure 1 , the method includes at least the following steps:

[0092] Step S100, when acquiring an access request from a client, determine the type of the access request.

[0093] When receiving an access request from the client to the target website, determine whether the client corresponding to the access request has ever sent a request according to the header file.

[0094] Step S200. Determine the current proxy environment applicable to the access request according to the type of the access request.

[0095] If the source client corresponding to the access request has never sent a request, a proxy environment is randomly selected from the reusable proxy environment queue corresponding to the target website as the current proxy environment.

[0096] If the source client corresponding to the access request has sent a request before, the source client is assigned the proxy environment it used last time.

[0097] Step S300: Send the access request to a targe...

Embodiment 2

[0101] refer to figure 2 , on the basis of Embodiment 1, a more detailed description is made, the method includes the following steps: Step S100, when acquiring an access request from a client, determine the type of the access request.

[0102] When a client that needs to use a proxy sends an access request, it needs to first determine whether the request is a new request or an old request. The specific determination method can be determined by the header file of the request sent by the client. If it is a new request, the header file does not contain the previous proxy environment; similarly, if it is an old request, the header file contains the previous proxy environment.

[0103] Wherein, the access request is mainly an HTTP request. The header file is presented in the form of token, which contains a unique string. According to the token, the proxy environment corresponding to the last request can be identified and assigned to the client. The token generation process is ...

Embodiment 3

[0140] refer to image 3 , on the basis of embodiment one, the method also includes:

[0141] Step S400, collecting usage information of the current agent environment.

[0142] The so-called usage information includes one or more of the proxy IP address, response time, response status code of the target server, domain name of the target server, and requested url address. This information can be used to display the operating environment of all agents and to perform data analysis on the operating status of the entire method.

[0143] Step S500, generate unique identification information, and return to the client.

[0144] In this embodiment, in the form of token, it is included in the response result of the target website in the method of the response header, and returned to the client.

[0145] When the client receives the data, it will save the unique identification information, so that when the client repeatedly sends access requests to the same target website, it can conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for processing a proxy environment, and discloses a device corresponding to the method, a terminal and a storage medium. The method for processing the proxy environment comprises the steps that an access request from a client side is obtained, the type of the access request is determined, if the access request is a new request, an IP is distributed from an available proxy queue, if the access request is an old request, the proxy environment used last time is directly used, and the time needed in the random selection process is shortened; and meanwhile, an available proxy queue management method and a reusable proxy environment queue management method are utilized to ensure that the obtained proxy environment has quite high reliability, and the concurrency controllability is improved through a grey list mechanism.

Description

technical field [0001] The invention relates to the field of computer application design, in particular to a method, device, terminal and storage medium for processing an agent environment. Background technique [0002] When any network is being built, protective measures are generally taken. Among these protective measures, the most common protective measure is to limit the access frequency of each IP. The information available is very limited. [0003] However, when collecting network data, the protection mechanism of the target network will lead to low information acquisition efficiency, making it difficult to comprehensively collect information on the target website. [0004] In order to solve the problems in the process of collecting network data, the prior art generally adopts the method of IP proxy pool or the method of random tunnel proxy. However, in the existing solutions, there are often a series of problems such as low management efficiency, unsatisfactory conn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L67/60H04L67/56
Inventor 吕松科程正武
Owner 盐城金堤科技有限公司