CN109117609A - A kind of request hold-up interception method and device - Google Patents
A kind of request hold-up interception method and device Download PDFInfo
- Publication number
- CN109117609A CN109117609A CN201811009902.6A CN201811009902A CN109117609A CN 109117609 A CN109117609 A CN 109117609A CN 201811009902 A CN201811009902 A CN 201811009902A CN 109117609 A CN109117609 A CN 109117609A
- Authority
- CN
- China
- Prior art keywords
- user
- failure cause
- module
- request
- uniformly processed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Debugging And Monitoring (AREA)
Abstract
This application discloses a kind of request hold-up interception method and devices, this method comprises: receiving user's request;Corresponding Verification Project is requested successively to be verified the user;When the authentication failed of any Verification Project, failure cause corresponding with the Verification Project is obtained, and store to the failure cause;Module is uniformly processed in calling, so that the module that is uniformly processed obtains the failure cause of storage and generates the return information comprising the failure cause.This method stores the failure cause of any Verification Project, and using the reason of module obtains storage is uniformly processed and generates the return message comprising failure cause, reduces the complexity of exploitation design method, it is at high cost to reduce software development and maintenance.
Description
Technical field
This application involves information data processing technology fields, more specifically to a kind of request hold-up interception method and device.
Background technique
Relevant request is had sent to server when user operates some control in operation interface, as inquiry is asked
It asks, modification data request etc..Server can carry out each verifying to the request that user sends after the request for receiving user's transmission
The verifying of project, such as subscriber authentication, user right verifying, time-out verifying, this is asked when only each Verification Project all passes through
Ask just legal, which can just be performed;Otherwise it intercepts the request to refuse to execute the request, and returns to a certain verifying to user
The corresponding failure cause of project.
Currently, the method that server returns to failure cause are as follows: when the authentication failed of some Verification Project, server can be adjusted
With the processing module of processing authentication failed situation corresponding with the Verification Project, which will be corresponding with the Verification Project
Failure cause, which is added to, to be returned in message, to will include that the return message of failure cause returns to user.
For above-mentioned request hold-up interception method, in software development and design, one need to be separately configured for each Verification Project
The processing module of authentication failed situation is handled, namely configures corresponding processing module for each interception reason, and to every
A processing module carries out specifically defining to guarantee that each processing module can be realized the corresponding failure cause of addition respectively
To returning in message, the exploitation design method is complex, causes software development and maintenance at high cost.
Summary of the invention
In view of this, the application provides a kind of request hold-up interception method and device, to solve prior art exploitation design method
It is complex, cause the problem that software development and maintenance is at high cost.
To achieve the goals above, it is proposed that scheme it is as follows:
A kind of request hold-up interception method, which comprises
Receive user's request;
Corresponding Verification Project is requested successively to be verified the user;
When the authentication failed of any Verification Project, failure cause corresponding with the Verification Project is obtained, and to described
Failure cause is stored;
Module is uniformly processed in calling so that it is described be uniformly processed module obtain storage the failure cause and generate include
The return information of the failure cause.
A kind of request blocking apparatus, described device include:
Receiving module, for receiving user's request;
Authentication module is successively verified for the Verification Project corresponding to user request, and works as any verifying
When the authentication failed of project, failure cause corresponding with the Verification Project is obtained, and store to the failure cause;
Module is uniformly processed, believes for obtaining the failure cause of storage and generating the return comprising the failure cause
Breath.
In application scheme, the user that receives is requested, each Verification Project corresponding to user's request successively into
Row verifying obtains failure cause corresponding with the Verification Project, and to the mistake when the authentication failed of any Verification Project
It loses reason to be stored, and then calls failure cause and generation the returning comprising failure cause for being uniformly processed that module goes acquisition to store
Return message.As it can be seen that storing in the authentication failed of a certain Verification Project to failure cause in the application, subsequent calls are unified
One processing module uniformly goes to execute the operation for obtaining storage failure cause and generating return message according to failure cause.It corresponds to
For software development and design, due to storing failure cause, module is uniformly processed so need to only be arranged and define one, can go
The corresponding failure cause of any Verification Project of storage is obtained, and can generate according to failure cause includes returning for failure cause
Return message;Compared with traditional request hold-up interception method, the program no longer needs to configure corresponding place for each failure cause
Module is managed, and each processing module is specifically defined, the exploitation design method is simple, reduces software development and maintenance
Cost, while improving the quality of software.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart for requesting hold-up interception method disclosed in the embodiment of the present application;
Fig. 2, which is that another embodiment of the application is disclosed, calls the flow chart that modular approach is uniformly processed;
Fig. 3 is the flow chart of the disclosed verification method to Verification Project of the embodiment of the present application;
Fig. 4 is a kind of composition block diagram for requesting blocking apparatus disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
The embodiment of the present application provides a kind of request hold-up interception method, as shown in Figure 1, this method comprises:
S100, user's request is received.
Specifically, server checks that configuration file Struts.xml is to determine server after receiving user's request
It is no to be configured with interception mechanism, that is, determine in server whether be configured with blocker, after determining configured with blocker, according to interception
The blocker defined in device stack executes sequence, and blocker is called to execute verifying and intercept process.In general, being provided with two in server
A blocker, including customized blocker and system default blocker, request hold-up interception method provided by the embodiments of the present application can be
It is arranged for customized blocker.
S101, corresponding Verification Project is requested successively to be verified the user.
Wherein, according to each Verification Project verifying sequence each Verification Project is successively verified, Verification Project include but
It is not limited to: user right Verification Project, token information Token Verification Project, overtime Verification Project etc., when all Verification Projects
When verifying all passes through, user request of letting pass returns to the implementing result for being directed to the specific request content of user to user.
S102, when the authentication failed of any Verification Project, obtain corresponding with Verification Project failure cause, and right
The failure cause is stored.
Wherein, when the authentication failed of any Verification Project, then user request is intercepted, first has to obtain the Verification Project
The reason of authentication failed, and store the failure cause.Wherein, each Verification Project has its corresponding failure cause.
Preferably, the failure cause is stored specifically: by failure cause storage into preset multiplex interface,
For Struts2 Open Framework, in ActionContext corresponding with user's request, i.e., which is
By failure cause storage into Action context corresponding with user's request.Since ActionContext is based on user
Request and in the thread that creates effectively, as server denied access (or let pass execute request), return interception Reason For Denial (or
Return to the implementing result of request) after, it will cease to be in force automatically.
Module is uniformly processed in S103, calling, so that the failure cause and the life that module is uniformly processed and obtains storage
At the return information comprising the failure cause.
Wherein, module is uniformly processed in order to call, in the embodiment of the present application preferably, in such a way that chain chain jumps
It jumps to and module is uniformly processed, that is, call and module is uniformly processed, detailed process is as indicated with 2, comprising:
S1031, unified interception mark is obtained.
Specifically, by taking the corresponding overtime Verification Project of user's request as an example, as shown in code segment one.
Wherein, the 2nd row indicate obtain token information Token expired time, the 4th row expression judge token time whether mistake
Phase executes interception if time-out.The reason of obtaining authentication failed first, and by failure cause storage into multiplex interface, such as
Shown in 5th row, Map class members is added in Action Context corresponding with user's request, the Key of Map is
The Value of " DataResult ", Map are that " time-out connection, please logs in again!", " time-out connection, please logs in again!" it is super
When the corresponding failure cause of Verification Project.It is appreciated that the corresponding interception reason of other Verification Projects is also deposited using aforesaid way
It stores up in Action Context corresponding with user's request, so realizes the multiplexing to the same interface.6th row indicates
It obtains unified intercept and identifies " APPResult ", different interception reasons all employs the unification and intercepts mark.
S1032, determination unified intercept that mark is corresponding to be uniformly processed module with described.
Mode is jumped specifically, configuring unified interception in configuration file Struts.xml and being identified as chain chain, and is configured
The processing module jumped to is that module is uniformly processed, as shown in code segment two.It is appreciated that request hold-up interception method of the invention is
Server executes the method that code segment in each program module is realized, by code segment one as being testing of verifying to Verification Project
A part of module is demonstrate,proved, server had invoked authentication module before this and was executed, and in the authentication failed of a certain Verification Project,
Another program module is jumped to by the unified interception mark of acquisition and executes another program module, is had invoked at unified herein
Module is managed to execute.
Wherein, the expression of the 2nd row jumps unified interception mark " APPResult " progress Action chain using " chain " and matches
It sets.It is " AuthProcessingAction " that the 3rd row indicated to jump to, which is uniformly processed module,.
Module is uniformly processed described in S1033, calling, so that the interception reason and root that module is uniformly processed and obtains storage
Return information is generated according to the interception reason and preset return message format, the return information includes the interception reason.
Wherein, it includes following code segment three that module, which is uniformly processed,.
Wherein, the first row to the 7th row indicates statement variable " jsonDataResult ", and the tenth row is indicated from multiplex interface
" DataResult " is obtained in ActionContext, it comprises failure cause, the tenth a line indicates to assign " DataResult "
It is worth and gives the variable of aforementioned statement " jsonDataResult ", it is subsequent, failure cause is returned by variable " jsonDataResult "
Back to user.Specifically, being generated according to preset return message format when generating return information and returning to message.Wherein, the 12nd
Capable " logjson " mark indicates to start to execute the processing for generating and returning to message, and the configuration of preset return message format exists
In configuration file Struts-common.xml, " Struts-common.xml " configuration file is to the return format for returning to message
Configuration is as shown in code segment four.
Wherein, the format that fourth line is expressed as returning to message arrangement is JSON format, and the return of the JSON format of generation disappears
The set for the content that breath includes in " jsonDataResult " for fifth line configuration.Finally, server returning JSON format
It returns message and returns to user, complete to intercept, so far, the concrete reason of interception has also returned to user.
In above-described embodiment, multiplexing corresponding with user's request has been arrived into the corresponding failure cause storage of any Verification Project
It in interface, and is jumped in such a way that chain jumps, calling is uniformly processed module and goes to obtain the failure original stored in multiplex interface
Cause and generation include that the return message of failure cause returns to user, it is seen then that are multiplexed same interface for different failure causes
Information is transmitted, it is not necessary that processing module is separately configured for the case where every kind of authentication failed, the cost of exploitation and maintenance is reduced, makes
Procedure system is apparent, improves software quality, has higher application value.
In another embodiment of the application, after receiving user's request, the source of user's request is judged with determination
The source of user's request is mobile terminal or webpage.Wherein it is determined that the source of user's request is mobile terminal, user is requested
The corresponding verifying intercept process of mobile terminal is carried out, when the source for determining user's request is webpage, user is requested to carry out webpage
Corresponding verifying intercept process.It is appreciated that mobile terminal and computer based on hardware environment be different, such as bank is come
It says, the bank client of operation in the terminal and the program development framework of the Web bank based on computer browser are not
With, so server needs to develop a set of verifying corresponding with each program architecture respectively for mobile terminal and webpage
Hook procedure, but from essence processing mode on for, two sets verifying hook procedures verifyings interception processes be identical.
Wherein, judged that the source of user's request, with the source for determining user's request be mobile terminal or webpage packet
It includes: obtaining the movement class of user's request, specifically, being obtained by code invocation.getAction () .getClass ()
The movement class of user's request, and judge whether the movement class is the corresponding movement class of mobile terminal, if so, determining user's request
Source is mobile terminal, if not, it is determined that it is webpage that user, which requests source,.
Specifically, the source for determining user's request is mobile terminal, the calling is uniformly processed module and obtains storage
The interception reason include:
It obtains corresponding unified intercept of mobile terminal to identify, determines that the corresponding unified mark that intercepts of the mobile terminal corresponds to
Module is uniformly processed, call the mobile terminal it is corresponding it is unified intercept that mark is corresponding to be uniformly processed module so that described
The corresponding unified corresponding module that is uniformly processed of mark that intercepts of mobile terminal obtains the interception reason stored, is blocked according to described
It cuts reason and the corresponding return message format of preset mobile terminal generates return information.
Wherein, the corresponding unified mark that intercepts of mobile terminal is " APPResult " recorded in above-described embodiment, is preset
The corresponding return message format of mobile terminal be the JSON format recorded in above-described embodiment.
The source for determining user's request is webpage, and the interception that module acquisition storage is uniformly processed in the calling is former
Because including:
The corresponding unified interception mark of webpage is obtained, determines that the corresponding unification of the webpage intercepts at the corresponding unification of mark
Module is managed, calls the corresponding unified interception mark of the webpage is corresponding module is uniformly processed, so that the corresponding system of the webpage
One intercepts the corresponding interception reason that module is uniformly processed and obtains storage of mark, according to the interception reason and preset net
The corresponding return message format of page, which generates, returns to message.
Wherein, the corresponding unified mark that intercepts of webpage is for example set as " ComputerResult ", and preset webpage is corresponding
Return message format may be configured as the format of the page.
In above-described embodiment, the judgement for carrying out source is requested the user received, with user's request to separate sources
Differentiation processing is carried out, so realizes and user's request of separate sources is handled on the same server, realize
Multiplexing to server improves the utilization rate of server.
In another embodiment of the application, come by the way of server buffer and database combination to Verification Project into
Row verification, wherein Verification Project includes token information Verification Project and overtime Verification Project, as shown in figure 3, believing the token
Breath Verification Project and overtime Verification Project carry out verifying and include:
S300, judge the corresponding token information of the user whether is stored in server buffer, if in server buffer not
The corresponding token information of the user is stored, S301 is thened follow the steps, if storing the corresponding order of the user in server buffer
Board information, thens follow the steps S302.
The corresponding token information of the user whether is stored in S301, inquiry database, if not stored described in database
The corresponding token information of user, it is determined that the authentication failed of the token information Verification Project, if storing the use in database
The corresponding token information in family, thens follow the steps S303.
S302, according to the expired time of the corresponding token information of the user stored in server buffer, judge to service
Whether the corresponding token information of the user stored in device caching is expired, if expired, thens follow the steps S303, if not out of date,
Then follow the steps S304.
The expired time of the corresponding token information of the user stored in S303, inquiry database, judges in database
Whether the corresponding token information of the user of storage is expired, if the corresponding token information mistake of the user stored in database
Phase, it is determined that the authentication failed of the time-out Verification Project, if the corresponding token information of the user stored in database is not
It is expired, then follow the steps S307.
The number for user's request that S304, the statistics user send, and judge whether the number is less than preset times.
Wherein, the number of statistics is the statistics that the request sent for the same user carries out.
If S305, the number are less than preset times, the corresponding token of the user that will be stored in server buffer
The expired time of information extends preset time.
It is if S306, the number are equal to preset times, the newest user stored in server buffer is corresponding
Token information expired time update into the database, and by the user of the statistics send user request
Number is reset.
S307, the expired time of the corresponding token information of the user stored in the database is extended into described preset
Time, and the expired time after extension is updated into server buffer.
In above-described embodiment, the corresponding verification information of each Verification Project is stored in server buffer and database, wherein
Token information token, token including user is exceeded the time limit the time.When being verified, first query service device caching in whether
There are the token of the user, if token is not present in caching, then inquire in database the token that whether there is the user,
The speed of verification information inquiry is so improved, while reducing data base querying rate, reduces IO number of database.
After inquiring the token for storing the user, further verify whether the token fails, since user requests
It may be from the mobile terminals such as mobile phone, so user may walk about when using application program, thus may cause as user
The mobile communication signal base station for providing signal changes, and the change of mobile communication signal base station, and it is corresponding to may result in background server cluster
Service node generate variation, as user provide service server changed, in the current server after change
The expired time of the token of the user stored in caching may not be newest expired time, so in order to ensure the conjunction of user
Method request be not intercepted, judgement cache in token it is expired after, further judge user database Nei token whether mistake
Phase is just determined as the authentication failed of overtime Verification Project if the token in database is also expired, blocks to user's request
It cuts, otherwise lets pass and execute user's request.The dual expired time authentication mechanism of above-mentioned binding cache and database, further decreases
A possibility that mistake intercepts occurs, improves the recognition accuracy of verifying.
Further, it after each user request is authenticated to be legitimate request by verification, is made requests for the user
Counting how many times, when the request number of times of user is less than preset times such as 5 times, when will cache the token failure of the interior user every time
Between extend preset time backward such as 15 minutes;And when the request number of times of user is accumulated to 5 times, the newest of the interior user will be cached
The token out-of-service time update into database, while will be reset for the request number of times of the user, when receiving the user again
Request when, restart to count, so further improve the consistency of caching and database, make verification identification it is more quasi-
Really.
The embodiment of the present application also provides a kind of request blocking apparatus, as shown in figure 4, the device includes:
Receiving module 400, for receiving user's request;
Authentication module 401 is successively verified for the Verification Project corresponding to user request, and any ought be tested
When the authentication failed of card project, failure cause corresponding with the Verification Project is obtained, and store to the failure cause;
Module 402 is uniformly processed, for obtaining the failure cause of storage and generating returning comprising the failure cause
It writes in reply and ceases.
Wherein, the authentication module 401 store to the failure cause and be specifically included: the failure cause is stored
Into preset multiplex interface.For Struts2 Open Framework, which is corresponding with the request
ActionContext。
Wherein, authentication module 401 can obtain unified intercepts corresponding with authentication failed in authentication failed and identify, clothes
Business device by query configuration file determine it is unified intercept that label is corresponding to jump mode, and what is jumped to be uniformly processed module,
What such server calls determined is uniformly processed module 402, so that the failure that module 402 is uniformly processed and obtains storage
Reason simultaneously generates return information according to the failure cause and preset return message format, and the return information includes the mistake
Lose reason.
Optionally, the embodiment of the present application further includes request source determination unit, for determining the source of user's request.When
Determine user request source be mobile terminal when, call it is corresponding with mobile terminal verify, processing module to user request into
Row verifying.When determine user request source be webpage when, call it is corresponding with webpage verify, processing module to user request into
Row verifying.
Wherein, authentication module 401 verifies Verification Project in the way of server buffer and database combination
Principle it is same as the previously described embodiments, details are not described herein.
Finally, it is to be noted that, herein, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting
Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in the process, method, article or apparatus that includes the element.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.
The foregoing description of the disclosed embodiments makes professional and technical personnel in the field can be realized or use the application.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of request hold-up interception method, which is characterized in that the described method includes:
Receive user's request;
Corresponding Verification Project is requested successively to be verified the user;
When the authentication failed of any Verification Project, failure cause corresponding with the Verification Project is obtained, and to the failure
Reason is stored;
Module is uniformly processed in calling, so that the module that is uniformly processed obtains the failure cause of storage and generates comprising described
The return information of failure cause.
2. method as described in claim 1, which is characterized in that it is described to the failure cause carry out storage include: by the mistake
Reason storage is lost into preset multiplex interface.
3. method as claimed in claim 2, which is characterized in that the preset multiplex interface is corresponding with the request
ActionContext。
4. such as any one of claim 1-3 the method, which is characterized in that the institute that module obtains storage is uniformly processed in the calling
Stating failure cause includes:
Unified intercept is obtained to identify;
It is determining that mark is corresponding with the unified interception that module is uniformly processed;
Module is uniformly processed described in calling, so that the module that is uniformly processed obtains the failure cause of storage and according to described
Failure cause and preset return message format generate return information, and the return information includes the failure cause.
5. such as any one of claim 1-3 the method, which is characterized in that request corresponding verification item to the user described
Before mesh is successively verified, the method also includes: the source for determining user's request is mobile terminal;
The failure cause that module acquisition stores is uniformly processed in the calling
It obtains corresponding unified intercept of mobile terminal to identify, determines that corresponding unified intercept of the mobile terminal identifies corresponding system
One processing module calls the corresponding unified interception mark of the mobile terminal is corresponding module is uniformly processed, so that the movement
The corresponding unified corresponding module that is uniformly processed of mark that intercepts of terminal obtains the failure cause of storage and according to the failure
Reason and the corresponding return message format of preset mobile terminal generate return information.
6. such as any one of claim 1-3 the method, which is characterized in that request corresponding verification item to the user described
Before mesh is successively verified, the method also includes: the source for determining user's request is webpage;
The failure cause that module acquisition stores is uniformly processed in the calling
Corresponding unified intercept of acquisition webpage identifies, and determines that the corresponding unified interception mark of the webpage is corresponding and mould is uniformly processed
Block calls the corresponding unified interception mark of the webpage is corresponding module is uniformly processed, uniformly blocks so that the webpage is corresponding
Deadline for accepting bid knows the corresponding module that is uniformly processed and obtains the failure cause of storage and according to the failure cause and preset webpage
Corresponding return message format, which generates, returns to message.
7. method as described in claim 1, which is characterized in that the Verification Project includes that token information Verification Project and time-out are tested
Card project;
Successively carrying out verifying to the token information Verification Project and overtime Verification Project includes:
Judge the corresponding token information of the user whether is stored in server buffer;
If the corresponding token information of the not stored user in the server buffer, inquire in database whether store it is described
The corresponding token information of user;
If the corresponding token information of the not stored user in the database, it is determined that the token information Verification Project is tested
Card failure;
If the corresponding token information of the user is stored in the server buffer, according to what is stored in the server buffer
The expired time of the corresponding token information of the user, judges the corresponding token of the user stored in the server buffer
Whether information is expired;
If the corresponding token information of the user stored in the server buffer is expired, inquires in the database and store
The corresponding token information of the user expired time, judge the user stored in the database corresponding token letter
It whether expired ceases;
If the corresponding token information of the user stored in the database is expired, it is determined that the time-out Verification Project is tested
Card failure.
8. method as claimed in claim 7, which is characterized in that the method also includes:
If the corresponding token information of the user stored in the server buffer is not out of date, count what the user sent
The number of user's request, and judge whether the number is less than preset times;
If the number is less than preset times, by the corresponding token information of the user stored in the server buffer
Expired time extends preset time;
If the number is equal to preset times, the corresponding token of the newest user that will be stored in the server buffer
The expired time of information is updated into the database, and the number for user's request that the user of the statistics is sent is clear
Zero;
If the corresponding token information of the user stored in the database is not out of date, the institute that will be stored in the database
The expired time for stating the corresponding token information of user extends the preset time, and the expired time after extension is updated to described
In server buffer.
9. a kind of request blocking apparatus, which is characterized in that described device includes:
Receiving module, for receiving user's request;
Authentication module is successively verified for the Verification Project corresponding to user request, and works as any Verification Project
Authentication failed when, obtain corresponding with Verification Project failure cause, and store to the failure cause;
Module is uniformly processed, for obtaining the failure cause of storage and generating the return information comprising the failure cause.
10. device as claimed in claim 9, which is characterized in that the authentication module store to the failure cause specific
It include: to store the failure cause into preset multiplex interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811009902.6A CN109117609B (en) | 2018-08-31 | 2018-08-31 | Request intercepting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811009902.6A CN109117609B (en) | 2018-08-31 | 2018-08-31 | Request intercepting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109117609A true CN109117609A (en) | 2019-01-01 |
CN109117609B CN109117609B (en) | 2021-01-29 |
Family
ID=64860376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811009902.6A Active CN109117609B (en) | 2018-08-31 | 2018-08-31 | Request intercepting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109117609B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110855672A (en) * | 2019-11-15 | 2020-02-28 | 无锡家校邦网络科技有限公司 | JWT-based authorization method capable of being manually cancelled |
CN112511316A (en) * | 2020-12-08 | 2021-03-16 | 深圳依时货拉拉科技有限公司 | Single sign-on access method and device, computer equipment and readable storage medium |
CN113610539A (en) * | 2021-08-24 | 2021-11-05 | 上海点融信息科技有限责任公司 | Information notification method, device, system, equipment and storage medium |
CN114301862A (en) * | 2021-12-31 | 2022-04-08 | 北京字跳网络技术有限公司 | Message urgent method, device, system and storage medium |
CN116112558A (en) * | 2022-11-21 | 2023-05-12 | 上海浦东发展银行股份有限公司 | Interface interception method and system based on axios |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754127A (en) * | 2009-12-22 | 2010-06-23 | 中兴通讯股份有限公司 | Message acquiring and processing method, client, server and communication system |
CN102812665A (en) * | 2010-03-18 | 2012-12-05 | 微软公司 | Pluggable token provider model to implement authentication across multiple web services |
CN103744680A (en) * | 2014-01-16 | 2014-04-23 | 北京邮电大学 | Method and device for business process processing |
CN104519069A (en) * | 2014-12-27 | 2015-04-15 | 广州华多网络科技有限公司 | Method and device for intercepting resource requests |
US20150213241A1 (en) * | 2014-01-29 | 2015-07-30 | Dspace Digital Signal Processing And Control Engineering Gmbh | Computer-implemented method for managing at least one data element in control unit development |
US20160342803A1 (en) * | 2015-05-19 | 2016-11-24 | Avecto Limited | Computer device and method for controlling access to a resource via a security system |
CN106899969A (en) * | 2017-01-18 | 2017-06-27 | 东南大学常州研究院 | Specific secrecy terminal system implementation method based on iOS system |
CN107426181A (en) * | 2017-06-20 | 2017-12-01 | 竞技世界(北京)网络技术有限公司 | The hold-up interception method and device of malice web access request |
CN108038213A (en) * | 2017-12-21 | 2018-05-15 | 中国农业银行股份有限公司 | A kind of method of data processing, client, server and system |
-
2018
- 2018-08-31 CN CN201811009902.6A patent/CN109117609B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101754127A (en) * | 2009-12-22 | 2010-06-23 | 中兴通讯股份有限公司 | Message acquiring and processing method, client, server and communication system |
CN102812665A (en) * | 2010-03-18 | 2012-12-05 | 微软公司 | Pluggable token provider model to implement authentication across multiple web services |
CN103744680A (en) * | 2014-01-16 | 2014-04-23 | 北京邮电大学 | Method and device for business process processing |
US20150213241A1 (en) * | 2014-01-29 | 2015-07-30 | Dspace Digital Signal Processing And Control Engineering Gmbh | Computer-implemented method for managing at least one data element in control unit development |
CN104519069A (en) * | 2014-12-27 | 2015-04-15 | 广州华多网络科技有限公司 | Method and device for intercepting resource requests |
US20160342803A1 (en) * | 2015-05-19 | 2016-11-24 | Avecto Limited | Computer device and method for controlling access to a resource via a security system |
CN106899969A (en) * | 2017-01-18 | 2017-06-27 | 东南大学常州研究院 | Specific secrecy terminal system implementation method based on iOS system |
CN107426181A (en) * | 2017-06-20 | 2017-12-01 | 竞技世界(北京)网络技术有限公司 | The hold-up interception method and device of malice web access request |
CN108038213A (en) * | 2017-12-21 | 2018-05-15 | 中国农业银行股份有限公司 | A kind of method of data processing, client, server and system |
Non-Patent Citations (4)
Title |
---|
ANDERSON, DC 等: "interposed request routing for scalable network storage", 《ACM TRANSACTIONS ON COMPUTER SYSTEMS》 * |
S.O.UWAGBOLE 等: "Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention", 《2017 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM)》 * |
余银山 等: "基于Struts2框架的Web应用开发研究", 《软件开发设计》 * |
刘高军 等: "嗅探技术研究及在统一登录中的应用", 《现代计算机(专业版)》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110855672A (en) * | 2019-11-15 | 2020-02-28 | 无锡家校邦网络科技有限公司 | JWT-based authorization method capable of being manually cancelled |
CN112511316A (en) * | 2020-12-08 | 2021-03-16 | 深圳依时货拉拉科技有限公司 | Single sign-on access method and device, computer equipment and readable storage medium |
CN113610539A (en) * | 2021-08-24 | 2021-11-05 | 上海点融信息科技有限责任公司 | Information notification method, device, system, equipment and storage medium |
CN114301862A (en) * | 2021-12-31 | 2022-04-08 | 北京字跳网络技术有限公司 | Message urgent method, device, system and storage medium |
WO2023124964A1 (en) * | 2021-12-31 | 2023-07-06 | 北京字跳网络技术有限公司 | Method for urgently sending message, apparatus, and storage medium |
CN114301862B (en) * | 2021-12-31 | 2023-08-22 | 北京字跳网络技术有限公司 | Message urgent method, device, system and storage medium |
US20240171668A1 (en) * | 2021-12-31 | 2024-05-23 | Beijing Zitiao Network Technology Co., Ltd. | Method for urgently sending message, apparatus, and storage medium |
JP7512540B1 (en) | 2021-12-31 | 2024-07-08 | 北京字跳▲網▼絡技▲術▼有限公司 | Message Urgent Method, Apparatus, System and Storage Medium |
US12052382B2 (en) * | 2021-12-31 | 2024-07-30 | Beijing Zitiao Network Technology Co., Ltd. | Method for urgently sending message, apparatus, and storage medium |
CN116112558A (en) * | 2022-11-21 | 2023-05-12 | 上海浦东发展银行股份有限公司 | Interface interception method and system based on axios |
Also Published As
Publication number | Publication date |
---|---|
CN109117609B (en) | 2021-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109117609A (en) | A kind of request hold-up interception method and device | |
CN103329113B (en) | Configuration is accelerated and custom object and relevant method for proxy server and the Dynamic Website of hierarchical cache | |
US7436816B2 (en) | Method and system for transmission-based billing of applications | |
CN106547578A (en) | The loading method and device of terminal applies APP | |
US20070189514A1 (en) | Method and System for Transmission-Based Billing Applications | |
US20050177635A1 (en) | System and method for allocating server resources | |
US20080301710A1 (en) | Class Loader for Managing a Network | |
CN103108320A (en) | Method and system for monitoring application program of mobile device | |
CN101888320A (en) | Enhanced network adapter framework | |
WO2008000501A2 (en) | System and method for object state management | |
CN107894920A (en) | Resource allocation method and Related product | |
CN108399331A (en) | Application process trial method and system | |
CN115934202A (en) | Data management method, system, data service gateway and storage medium | |
CN111190637B (en) | Version file release management method, device and system | |
CN108900482A (en) | Execution method, server management system and the storage medium of script | |
CN112910947A (en) | Lua-based high-concurrency current-limiting second killing technology | |
CN112565340A (en) | Service scheduling method, device, computer system and medium for distributed application | |
CN112463266A (en) | Execution policy generation method and device, electronic equipment and storage medium | |
CN113747506B (en) | Resource scheduling method, device and network system | |
CN106533718A (en) | Data processing method and device | |
CN114884964A (en) | Service wind control method and system based on Tuxedo architecture | |
CN109033877A (en) | A kind of distributed user permission processing method and system | |
JP2021140781A (en) | Method, device, equipment, program and computer memory medium for source channel determination | |
CN115550425B (en) | Business process arrangement method for micro-service | |
CN117041353B (en) | Task processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221110 Address after: 100005 No. 69, inner main street, Dongcheng District, Beijing, Jianguomen Patentee after: AGRICULTURAL BANK OF CHINA Patentee after: Agricultural Bank of China Financial Technology Co.,Ltd. Address before: 100005 No. 69, inner main street, Dongcheng District, Beijing, Jianguomen Patentee before: AGRICULTURAL BANK OF CHINA |