CN104980409A - Internet behavior management method and device - Google Patents

Internet behavior management method and device Download PDF

Info

Publication number
CN104980409A
CN104980409A CN201410146519.0A CN201410146519A CN104980409A CN 104980409 A CN104980409 A CN 104980409A CN 201410146519 A CN201410146519 A CN 201410146519A CN 104980409 A CN104980409 A CN 104980409A
Authority
CN
China
Prior art keywords
control strategy
network packet
application
user
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410146519.0A
Other languages
Chinese (zh)
Inventor
方新球
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410146519.0A priority Critical patent/CN104980409A/en
Priority to PCT/CN2014/088984 priority patent/WO2015154416A1/en
Publication of CN104980409A publication Critical patent/CN104980409A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an internet behavior management method and an internet behavior management device, which are used for solving the problem that the finding rate of the webpage address is slow and the internet behavior of a user cannot be controlled. The method of the application comprises the steps as follows: receiving configuration information and a strategy transmitted by the user, wherein the configuration information comprises configuration information of applications, and the strategy comprises a first control strategy of each application in the configuration information; finding a recognition identification of the corresponding application from a webpage address library according the configuration information of the application, and generating a keyword recognition identification sub-list; obtaining a keyword recognition identification in an internet message after receiving the internet message transmitted by the user, matching the obtained keyword recognition identification in the keyword recognition identification sub-list; calling the corresponding first control strategy to process the message. Compared with prior art, the method and the device of the invention could perform more reliable control to the internet behavior of the user while finding conveniently and fast.

Description

A kind of network log-in management method and device
Technical field
The present invention relates to data communication field, particularly relate to a kind of network log-in management method and device.
Background technology
The Internet, today that mobile Internet is flourish rapidly, bring and manyly also bring some negative problems easily simultaneously, these negative issues generally comprise following several respects:
(1) spreading unchecked, due to P2P software, and the increasing of a large amount of nature of leisure of providing of the Internet or recreational content, such as: online electronic game, shopping online, stock exchange, web radio and Streaming Media etc., people are made to be on duty period a large amount of time and the network broadband wasting of resources in shopping, in the content that game etc. are irrelevant with work, if be not added on restraining, can make people that the resource in more energy and broadband is wasted;
(2), internet development is now very rapid, the thing followed is taking advantage of a weak point of some lawless persons, they utilize or manufacture the dangerous programs such as virus, wooden horse, when user browses various webpage, in-company network can be corroded at any time, thus cause intra-company's secret to reveal, or internal network such as cannot to use at the situation.
The development of mobile Internet also add following problem, no matter user accesses any website, all need in the huge web page address storehouse (UniformResourceLocator URL storehouse) of data volume, to carry out matched and searched by system, a large amount of station addresses is stored in URL storehouse, when user accesses a certain website, need to search the website that can match needs through certain hour.
Known by above analysis, while how managing the internet behavior of user, strengthening the speed of URL matched and searched, is the problem urgently needing to solve.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of network log-in management method and device, can solve web page address and search the problem that speed is slow and cannot control user's internet behavior.
In order to solve the problem, this application provides a kind of network log-in management method and comprising:
The configuration messages that reception user issues and strategy, described configuration messages comprises the configuration information of application, and described strategy comprises the first control strategy that in configuration messages, each application is corresponding;
From web page address storehouse, obtain the identification marking of corresponding application according to described application configuration information, and generate application identification identification list, described application identification identification list comprises keyword recognition mark sublist;
After receiving the upper network packet that described user issues, obtain the keyword recognition mark on this in network packet, this keyword recognition is identified in described keyword recognition mark sublist and mates, if the match is successful, then call the first corresponding control strategy, and according to this first control strategy, described upper network packet is processed.
In an embodiment of the present invention, described first control strategy comprises normal process network packet or directly abandon network packet on this on this.
In an embodiment of the present invention, also can generate according to the application identification mark obtained from web page address storehouse and to identify the Address Recognition that sublist is associated with described keyword recognition and identify sublist.
In an embodiment of the present invention, described control strategy also comprises and applies the second corresponding control strategy with each in described configuration messages; If to call and described first control strategy performed is normal process on this during network packet, then described method comprises:
Obtain the Address Recognition mark in described upper network packet, the Address Recognition of acquisition is identified in described Address Recognition mark sublist and mates, after the match is successful, call described second control strategy and described upper network packet is processed.
In an embodiment of the present invention, described second control strategy is produce alarm prompt, normally E-Packet or carry out speed limit while forwarding network packet.
In order to solve the problem, present invention also offers a kind of network log-in management device, comprising: transceiver module, List Generating Module, processing module;
Described transceiver module is for the configuration messages that receives user and issue and strategy, described configuration messages comprises the configuration information of application, described strategy to comprise in configuration information the first control strategy corresponding to each application, and by the configuration messages that receives and policy distribution to processing module;
The described application configuration information that described List Generating Module is used for issuing according to transceiver module searches the identification marking of corresponding application from web page address storehouse, and generates keyword recognition mark sublist;
Described processing module comprises keyword acquiring unit, after processing module receives the upper network packet that user issues, keyword acquiring unit obtains the keyword recognition mark in described upper network packet, this keyword recognition is identified at described keyword recognition mark sublist and mates by processing module, if the match is successful, then call the first corresponding control strategy, and according to this first control strategy, described upper network packet is processed.
In an embodiment of the present invention, described first control strategy comprises normal process network packet or directly abandon network packet on this on this.
In an embodiment of the present invention, described network log-in management device also comprises the address list generation module be associated with List Generating Module, and described address list generation module is used for calculated address identification marking sublist.
In an embodiment of the present invention, described control strategy also comprises and applies the second corresponding control strategy with each in described configuration messages; Described processing module also comprises address designation acquiring unit, if processing module is called and described first control strategy performed is that normal process is on this during network packet, address designation acquiring unit then in processing module obtains the Address Recognition mark in described upper network packet, the Address Recognition of acquisition is identified in described Address Recognition mark sublist and mates, after the match is successful, call described second control strategy and described upper network packet is processed.
In an embodiment of the present invention, described second control strategy comprises and produces alarm prompt, normally E-Packets or carry out speed limit while forwarding network packet.
The invention has the beneficial effects as follows:
The invention provides a kind of network log-in management method and device, solve web page address and search the problem that speed is slow and cannot control user's internet behavior.The application comprises and receives the configuration messages that issues of user and strategy, and configuration messages comprises the configuration information of application, and strategy comprises the first control strategy of each application in configuration information; Then from web page address storehouse, search the identification marking of corresponding application according to the configuration information of this application, then generate keyword recognition mark sublist; After receiving the upper network packet that this user issues, obtain the keyword recognition mark that network packet on this is corresponding, then the keyword recognition of acquisition mark is carried out mating with the information that keyword recognition identifies in sublist, as success, then call the first corresponding control strategy and this message is controlled.Visible, the application is after receiving the upper network packet that user issues, directly the keyword recognition mark keyword recognition corresponding with this user in this message can be identified in sublist and mate, do not need in URL storehouse, carry out searching of blindness, compared with prior art, while fast and easy is searched, also the more reliable internet behavior to user controls.
Accompanying drawing explanation
Fig. 1 is the network log-in management method flow diagram that first embodiment of the invention provides;
Fig. 2 is the marking matched flow chart of keyword application identification that first embodiment of the invention provides;
Fig. 3 is the marking matched flow chart of application identification that first embodiment of the invention provides;
Fig. 4 is the network log-in management apparatus module structural representation that second embodiment of the invention provides;
Fig. 5 is the network log-in management system module structural representation that third embodiment of the invention provides.
Embodiment
The configuration messages that present system reception user issues and strategy, this configuration messages comprises application configuration information, this strategy comprises the control strategy that in configuration information, each application is corresponding, according to the configuration information received, search from URL storehouse and extract the corresponding identification marking applied, in the present embodiment, the URL storehouse of classification was carried out in described URL storehouse according to different web sites different content before being, system is according to searching and the identification marking of the correspondence extracted application, generate keyword recognition mark sublist, when the upper network packet that systems axiol-ogy issues to user, first system obtains the keyword recognition mark of network packet on this, then the keyword recognition of this acquisition mark is mated with the information that the keyword recognition generated before identifies in sublist, if the match is successful, then call the first corresponding control strategy to control this message, in the present embodiment, correspondence first control strategy called receives the strategy that user issues before being.Compared with prior art, the application is provided with configuration messages according to the demand of user to needing the application controlled, be provided with the first control strategy that each application is corresponding simultaneously, system obtains keyword recognition mark according to the configuration messages that user is arranged from URL storehouse, and generate keyword recognition mark sublist, system acceptance on after network packet, only need by extract this on keyword recognition mark in network packet identify sublist with the keyword recognition of respective user and mate, do not need to carry out searching coupling in whole URL storehouse, simultaneously, after the match is successful, also call the first corresponding control strategy further, network packet on this is controlled in real time.Therefore, present application addresses and speed while web page address searches speed, also to the problem that user's internet behavior controls.Below in conjunction with accompanying drawing and most preferred embodiment, the present invention is described in further details.
Embodiment one:
Fig. 1 network log-in management method flow diagram provided by the invention, comprising:
Step 101: the configuration messages that reception user issues and strategy, this configuration messages comprises the configuration information of application, and strategy comprises first control strategy corresponding respectively with each application in configuration information;
Step 102: the identification marking searching corresponding application according to application configuration information from URL storehouse, and generate keyword recognition mark sublist;
Step 103: after receiving the upper network packet that this user issues, obtain the keyword recognition mark that this comprises in network packet, this keyword recognition mark keyword recognition corresponding with such user is identified sublist mate, if the match is successful, then call first control strategy corresponding with this application, and according to this first control strategy, network packet on this is processed.
In the present embodiment, no matter issue the user of configuration messages and strategy or issue the user of network packet, all belong to a class user, such as, school user, enterprise customer etc., and in the present embodiment, the user issuing configuration messages and strategy belongs to same class user with the user issuing network packet, such as, all belongs to school user.
In a step 101, the configuration messages that reception user issues and strategy, this configuration messages comprises the configuration information of application, and the configuration information of described application is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified; Described strategy is the first control strategy that in configuration information, each application is corresponding; corresponding relation can be set according to address relationship between each application and the first control strategy in configuration information; also can according to specific keyword content setting corresponding relation; certainly; this corresponding relation is not limited to above-mentioned two kinds of set-up modes, as long as can realize applying within the scope that can protect in the present embodiment request with mode mutually corresponding between the first collocation strategy.
In the present embodiment, the mode that the application of user to needs control is arranged at least comprises any one in following 3 kinds of modes:
A: user, by the parametric controller of terminal, arranges the configuration messages and strategy that need to control application;
B: user signs in the website of related application, arranges configuration messages and strategy;
C: equipment such as, by identifying the keyword of user's input, time period, operational environment or action etc., generates configuration messages and strategy.
In the present embodiment, preferably adopt A mode to carry out the setting needing to control application, user by the configuration messages that configures and policy distribution to system.
In a step 102, when after the configuration messages that system acceptance issues to user, in URL storehouse, the identification marking of corresponding application is searched according to the configuration information in user's configuration messages, and generate keyword recognition mark sublist according to the identification marking found, in the present embodiment, described configuration information is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified, described identification marking comprises keyword recognition mark.
In the present embodiment, described URL storehouse can be according to site information or web page contents sorted URL storehouse, also can be the most original URL storehouse.
In the present embodiment, system obtains corresponding identification marking according to the configuration information in user's configuration messages in URL storehouse, and generates keyword recognition mark sublist and comprise with any one under type:
A: the identification marking searching corresponding application according to the configuration information in user's configuration messages in URL storehouse, generates keyword recognition mark sublist according to all identification markings found in URL storehouse;
Then all identification markings extracted are generated independently keyword recognition mark sublist by B: the identification marking extracting corresponding application according to the configuration information in user's configuration messages in URL storehouse in systems in which.
When adopting A mode pair net page address, mate in the keyword recognition list of system preferably in URL storehouse;
When adopting B mode pair net page address, system is preferably mated in independently crucial sub-recognized list, and does not need to enter url list.
In order to can fast finding to web page address, preferably adopt mode B to generate application identification identification list in the present embodiment.
Further, in the present embodiment, also can generate according to the application identification mark obtained from web page address storehouse and identify the Address Recognition that sublist is associated with keyword recognition and identify sublist, wherein, keyword recognition mark between two lists in the interrelated web page address referring to same application leaves in keyword recognition mark sublist, Address Recognition mark leaves in Address Recognition mark sublist, the keyword recognition left in two lists mark is identified interrelated with Address Recognition, searching of convenient like this system network page address simultaneously.
In step 103, after receiving the upper network packet that this user issues, when namely detecting that this user needs to access a certain application, obtain the keyword recognition mark that described upper network packet comprises, this keyword recognition is identified in keyword recognition mark sublist corresponding to this user and mates, if the match is successful, then extract from keyword recognition mark sublist and identify with the keyword recognition that this online message keyword identification marking mates mutually, one_to_one corresponding between this keyword recognition mark and the first control strategy that user sets before, therefore, after this keyword recognition of acquisition mark, then find the first corresponding control strategy according to this keyword recognition mark, and then transfer this first control strategy network packet on this is controlled.
In the present embodiment, when the upper network packet that system acceptance issues to user, first system obtains keyword recognition mark corresponding to this message, and the method obtaining the corresponding keyword recognition mark of this message at least comprises with any one under type:
A: system, according to network packet on Client-initiated, extracts the keyword recognition mark of this message;
B: while user initiates upper network packet by terminal, arranges the keyword recognition mark that it is concerned about, system only needs to extract this keyword recognition mark set.
In the present embodiment, described keyword recognition mark comprises the part representing agreement, and can be the part representing port numbers, can be the part of delegated path, can also be the combination of above-mentioned a few part.Certain described keyword recognition mark is not limited to above-mentioned several types, to plead the scope of protection as long as the content with recognition function all belongs to this present embodiment.
Further, described first control strategy comprises normal process network packet or directly abandon network packet on this on this, can also be other possible control informations certainly, be not specifically limited in the present embodiment.
As shown in Figure 2, what provide for the present embodiment identifies keyword recognition mark and keyword recognition the flow chart that information in sublist carries out mating, and comprising:
Step 201: generate keyword recognition mark sublist;
Step 202: in acquisition, the keyword recognition of network packet is identified in keyword recognition mark sublist and compares; Judge whether coupling, in this way, enter step 203; As no, enter step 204;
Step 203: call and perform the first control strategy;
Step 204: normal this message of forwarding.
In the present embodiment, described first control strategy to be user be control strategy that in configuration information, each application is arranged, one_to_one corresponding between respectively applying in this first control strategy and configuration information.
Further, above-mentioned keyword recognition mark and keyword recognition are identified mating of information in sublist, it is only the small step that network packet on this is controlled, in order to control network packet on this more accurately, in the present embodiment, after the match is successful, if the first control strategy called is that normal process is on this during network packet, Address Recognition mark in the upper network packet then obtained further, described Address Recognition mark comprise represent address information beyond, also comprise and there are concrete other information identifying a certain message function, such as message name or Resource Storage path etc.Certain described address applications identification marking is not limited to above-mentioned several types, as long as the content with recognition function all belong to the present embodiment plead protection scope.
In the present embodiment, described control strategy comprises and applies the second corresponding control strategy with each in described configuration messages; When the Address Recognition of acquisition mark is mated with the information that Address Recognition identifies in sublist, if it fails to match, then illustrate and do not need to control to network packet on this, namely normally pass on network packet on this; If the match is successful, then call the second corresponding control strategy and further control is done to network packet on this, generate URL Template Information simultaneously, in the present embodiment, the concrete mode calling the second control strategy includes but not limited to under type, and the Address Recognition of acquisition mark is mated with the information that Address Recognition identifies in sublist, if it fails to match by system, then illustrate and do not need to control to network packet on this, namely normally pass on network packet on this; If the match is successful, then obtain this Address Recognition be identified at Address Recognition mark sublist in identification marking information, second control strategy of the application corresponding with this identification marking then set according to user before this identification marking acquisition of information, then carries out respective handling according to this second control strategy to this application.
As Fig. 3, be that the application identification comprised in the upper network packet obtained mark identified with keyword recognition respectively sublist and the Address Recognition that the present embodiment provides identifies the flow chart that sublist carries out mating, comprise:
Step 301: generate keyword recognition mark sublist and Address Recognition mark sublist;
Step 302: in acquisition, the keyword recognition of network packet is identified in keyword recognition mark sublist and compares; Judge whether coupling, in this way, enter step 303; As no, enter step 306;
Step 303: to call and whether the first control strategy of the correspondence performed is normal forwarding; In this way, then enter step 304, as no, enter step 207: abandon this message;
Step 304: in acquisition, the Address Recognition mark of network packet identifies information in sublist compare with Address Recognition; Judge whether coupling, in this way, enter step 305; As no, enter step 306;
Step 305: call the second corresponding control strategy, and further control is done to this message;
Step 306: normal this message of forwarding;
Further, in the present embodiment, the second control strategy comprises: generation alarm prompt, forwarding carry out speed limit while network packet or normally E-Packets.
Described generation alarm prompt represents that this message of system identification is the message that user allows to forward, but now dangerous or this message of this message is now invalid packet;
Described forwarding is carried out speed limit while network packet and represent that this message is the message that user allows to forward, because this message needs to consume more flow, and residual flow is now not enough to support the smoothness of this message to run, and therefore, carries out speed limit to this message;
Described this message of normal forwarding, has following several possibility:
A: this message meets forwarding condition;
B: the priority of this message is higher, closes other application, for the forwarding of this application provides condition.
In the present embodiment, described first control strategy is the control strategy corresponding to identifying with keyword recognition, and described second control strategy is the control strategy corresponding to identifying with Address Recognition.Certainly, the first control strategy and the second control strategy also can be only same control strategies, when performing keyword recognition mark, only call the wherein part in this control strategy; When executive address identification marking, call the another part in this control strategy.
In the present embodiment, call corresponding control strategy to while network packet controls further on this, generate URL Template Information, described URL Template Information is that system is according to statistics Visitor Logs information, the Template Information generated, system, while regulative strategy, can resolve the URL Template Information of generation, then according to the Template Information content parsed, alarm notification or web page message propelling movement etc. is sent to the user needed; System can also upgrade URL storehouse according to the URL Template Information generated or revise; Certainly, system can also generate Visitor Logs table according to the URL Template Information generated, and is shown to user, facilitates user to check Visitor Logs by display terminal, and statistics network behaviour in service.
In the present embodiment, described URL Template Information comprises: template ID---and what represent transmission is URL information template; Template length---represent the total length of this information; RECORD_NUM---represent the quantity of the user+URL comprised in message; DURATION---represent the time interval of transmission information; Strategy---represent that allowing or refuse message passes through; Message length---represent the length of removing template head; IP address---represent the IP address of user; URL information---represent the URL information of this user extracted.Above-mentioned Template Information content is not limited to foregoing, can improve according to the demand of user.
In the present embodiment, regeneration after be not limited to URL Template Information generation or some steps after some stages complete terminate, also can be the demand according to user, formulate the corresponding time period, after this time period terminates, the URL Template Information of generation is informed user by system automatically, facilitates user to understand the behaviour in service of current network in real time or efficiently like this.
Embodiment two:
Fig. 4 is the network log-in management apparatus module schematic diagram provided in the present embodiment, comprising: transceiver module 401, List Generating Module 402, processing module 404;
Described transceiver module 401 is for the configuration messages that receives user and issue and strategy, described configuration messages comprises the configuration information of application, described strategy to comprise in configuration information the first strategy corresponding to each application, and by the configuration messages that receives and policy distribution to List Generating Module 402;
Described List Generating Module 402 searches the identification marking of corresponding application for the described application configuration information issued according to transceiver module 401 from web page address storehouse, and generates keyword recognition mark sublist;
Described processing module 404 comprises keyword acquiring unit 4041, after processing module 404 receives the upper network packet that user issues, keyword acquiring unit 4041 obtains the keyword recognition mark in described upper network packet, this keyword recognition is identified at described keyword recognition mark sublist and mates by processing module 404, if the match is successful, then call the first corresponding control strategy, and according to this first control strategy, described upper network packet is processed.
In the present embodiment, no matter issue the user of configuration messages and strategy or issue the user of network packet, all belong to a class user, such as, school user, enterprise customer etc., and in the present embodiment, the user issuing configuration messages and strategy belongs to same class user with the user issuing network packet, such as, all belongs to school user.
In the present embodiment, transceiver module 401 receives the configuration messages and strategy that user issues, this configuration messages comprises the configuration information of application, and the configuration information of described application is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified; Described strategy is user is the first control strategy that in configuration information, each application is arranged.
In the present embodiment, the mode that the application of user to needs control is arranged at least comprises any one in following 3 kinds of modes:
A: user, by the parametric controller of terminal, arranges the configuration messages and strategy that need to control application;
B: user signs in the website of related application, arranges configuration messages strategy;
C: equipment such as, by identifying the keyword of user's input, time period, operational environment or action etc., generates configuration messages and strategy.
In the present embodiment, user preferably adopts A mode to carry out the setting needing to control application, and the configuration messages configured is handed down to system by user.
In the present embodiment, after List Generating Module 402 receives the configuration messages that transceiver module 401 issues, in URL storehouse, the keyword recognition mark of corresponding application is searched according to the configuration information in user's configuration messages, and generate keyword recognition mark sublist according to the keyword recognition mark found, in the present embodiment, described configuration information is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified, described identification marking comprises keyword recognition mark.
In the present embodiment, List Generating Module 402 obtains corresponding keyword recognition mark according to the configuration information in user's configuration messages in URL storehouse, and generates keyword recognition mark sublist and comprise with any one under type:
A: the keyword recognition mark of searching corresponding application according to the configuration information in user's configuration messages in URL storehouse, is identified in URL storehouse according to all keyword recognition found and generates keyword recognition mark sublist;
Then all keyword recognition marks extracted are generated independently keyword recognition mark sublist by B: the keyword recognition mark extracting corresponding application according to the configuration information in user's configuration messages in URL storehouse.
When adopting A mode pair net page address, mate in the application identification list of system preferably in URL storehouse;
When adopting B mode pair net page address, processing module 404 is preferably mated in independently application identification list, and does not need to enter url list.
In order to can fast finding to web page address, preferably adopt mode B to generate application identification identification list in the present embodiment.
Further, described network log-in management device also comprises the address list generation module 403 be associated with List Generating Module 402, and described address list generation module 403 is for calculated address identification marking sublist.In the present embodiment, described List Generating Module 402 and the keyword recognition in the interrelated web page address referring to same application of address list generation module 403 identify and leave keyword recognition in and identify in sublist, Address Recognition mark leaves in Address Recognition mark sublist, the keyword recognition left in two lists mark is identified interrelated with Address Recognition, searching of convenient like this system network page address simultaneously.
Processing module 404 comprises keyword acquiring unit 4041, processing module 404 is after receiving the upper network packet that issues of user, when namely detecting that user needs to access a certain application, keyword acquiring unit 4041 obtains the keyword recognition mark comprised in described upper network packet, this keyword recognition mark is identified information in sublist with the keyword recognition generated mate, if the match is successful, then extract from keyword recognition mark sublist and identify mutual keyword recognition of mating with the keyword recognition comprised in network packet on this and identify, one_to_one corresponding between the first control strategy that this identification marking and before user set, therefore, after this keyword recognition of acquisition mark, then find the first corresponding control strategy according to this keyword recognition mark, and then transfer this first control strategy upper network packet is controlled.
In the present embodiment, keyword acquiring unit 4041 obtains keyword recognition mark corresponding to this message, and the method obtaining the corresponding keyword recognition mark of this message at least comprises with any one under type:
A: according to network packet on Client-initiated, extracts the keyword recognition mark of this message;
B: while user initiates upper network packet by terminal, arranges the keyword recognition mark that it is concerned about, keyword acquiring unit 4041 only needs to extract this keyword recognition mark set.
In the present embodiment, keyword acquiring unit 4041 obtains keyword recognition mark in described upper network packet, and described keyword recognition mark comprises the part representing agreement, can be the part representing port numbers, can be the part of delegated path, can also be the combination of above-mentioned a few part.Certain described keyword recognition mark is not limited to above-mentioned several types, to plead the scope of protection as long as the content with recognition function all belongs to this present embodiment.
Further, keyword recognition mark in the upper network packet that processing module 404 obtains according to keyword acquiring unit 4041, this keyword recognition mark is identified information in sublist with keyword recognition mate, as unsuccessful, show that on this, network packet is not the required control of user, then normally forward this message; If the match is successful, then control this message according to the first control strategy of calling, described first control strategy comprises normal process network packet or directly abandon network packet on this on this.
In the present embodiment, it is described that to call the first control strategy be user is the control strategy that in configuration messages, each application is arranged, one_to_one corresponding between respectively apply in this first control strategy and configuration messages, certainly, the first control strategy content of each application correspondence can be the same or different.
In order to can more accurate the application identification comprised in the upper network packet obtained mark be mated with information in application identification identification list, in the present embodiment, described first control strategy further with each application configuration information one_to_one corresponding in configuration information, described configuration information is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified;
Further, described first control strategy comprises normal process network packet or directly abandon network packet on this on this, can also be other possible control informations certainly, be not specifically limited in the present embodiment.
Further, described processing module 404 also comprises address designation acquiring unit 4042 further, described address designation acquiring unit 4042 is for after the marking matched success of keyword recognition, if to call and the first control strategy performed is that normal process is on this during network packet, the Address Recognition mark of the described upper network packet of further acquisition, described Address Recognition mark comprise represent address information beyond, also comprise other information having and identify a certain message function, such as message name or Resource Storage path etc.Certain described Address Recognition mark is not limited to above-mentioned several types, to plead the scope of protection as long as the content with recognition function all belongs to this present embodiment.
In the present embodiment, control strategy also comprises and applies the second corresponding control strategy with each in described configuration messages; When the Address Recognition mark obtained in upper network packet is mated with the information that Address Recognition identifies in sublist, if it fails to match, then illustrate and do not need to control to network packet on this, namely normally pass on network packet on this; If the match is successful, then call the second corresponding control strategy and further control is done to network packet on this, generate URL Template Information simultaneously.
Further, in the present embodiment, the second control strategy comprises: generation alarm prompt, forwarding carry out speed limit while network packet or normally E-Packets.
Described generation alarm prompt represents that this message of system identification is the message that user allows to forward, but now dangerous or this message of this message is now invalid packet;
Described forwarding is carried out speed limit while network packet and represent that this message is the message that user allows to forward, because this message needs to consume more flow, and residual flow is now not enough to support the smoothness of this message to run, and therefore, carries out speed limit to this message;
Described this message of normal forwarding, has following several possibility:
A: this message meets forwarding condition;
B: the priority of this message is higher, closes other application, for the forwarding of this application provides condition.
In the present embodiment, described first control strategy is the control strategy corresponding to identifying with keyword recognition, and described second control strategy is the control strategy corresponding to identifying with Address Recognition.Certainly, the first control strategy and the second control strategy also can be only same control strategies, when performing keyword recognition mark, only call the wherein part in this control strategy; When executive address identification marking, call the another part in this control strategy.
In the present embodiment, call corresponding control strategy to while network packet controls further on this, generate URL Template Information, described URL Template Information is that system is according to statistics Visitor Logs information, the Template Information generated, system, while regulative strategy, can resolve the URL Template Information of generation, then according to the Template Information content parsed, alarm notification or web page message propelling movement etc. is sent to the user needed; System can also upgrade URL storehouse according to the URL Template Information generated or revise; Certainly, system can also generate Visitor Logs table according to the URL Template Information generated, and is shown to user, facilitates user to check Visitor Logs by display terminal, and statistics network behaviour in service.
Embodiment three:
Fig. 5 is the network log-in management system module schematic diagram provided in the present embodiment, comprising: strategy controller 501, Behavior Manager 502 and web page address storehouse 503;
Described strategy controller 501 is for the configuration messages that receives user and issue and strategy, and the configuration messages received and strategy are sent to Behavior Manager 502, described configuration messages comprises the configuration information of application, and described strategy comprises the first control strategy and the second control strategy that in configuration messages, each application is corresponding;
The configuration messages that described Behavior Manager 502 issues according to strategy controller 501, obtains the identification marking of application, and generates application identification identification list from web page address storehouse 503, and this application identification identification list comprises keyword recognition mark sublist; When user initiates upper network packet, Behavior Manager 502 obtains the identification marking that this comprises in network packet, the identification marking of this acquisition is mated with information in the application identification identification list of generation, if the match is successful, then from strategy controller 501, call the first corresponding control strategy and this message is controlled.
In the present embodiment, no matter issue the user of configuration messages and strategy or issue the user of network packet, all belong to a class user, such as, school user, enterprise customer etc., and in the present embodiment, the user issuing configuration messages and strategy belongs to same class user with the user issuing network packet, such as, all belongs to school user.
In the present embodiment, user arranges corresponding configuration messages and the strategy of correspondence according to the demand of oneself by the application controlled needs, the configuration information of described application is the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified; Described strategy is user is the first control strategy that in configuration messages, each application is arranged.
In the present embodiment, the mode that the application of user to needs control is arranged comprises any one in following 3 kinds of modes:
A: user, by the parametric controller of terminal, arranges the configuration messages and strategy that need to control application;
B: user signs in the website of related application, arranges configuration messages strategy;
C: equipment such as, by identifying the keyword of user's input, time period, operational environment or action etc., generates configuration messages and strategy.
In the present embodiment, user preferably adopts A mode to carry out the setting needing to control application, and the configuration messages configured is handed down to system by user.
User by the configuration messages that sets and policy distribution to strategy controller 501, the configuration messages received and strategy store by strategy controller 501, simultaneously, the configuration messages received is sent to Behavior Manager 502 by strategy controller 501, Behavior Manager 502 obtains corresponding identification marking according to the configuration information in the configuration messages received from web page address storehouse 503 i.e. URL storehouse, and generate application identification identification list according to the identification marking found, in the present embodiment, described configuration information comprises the demand of user according to oneself, the identification marking of some application simultaneously arranged in order to URL storehouse can be identified, such as, keyword recognition identification information.
In the present embodiment, Behavior Manager 502 obtains corresponding identification marking according to the configuration information in user's configuration messages in URL storehouse, and generates application identification identification list and comprise with any one under type:
A: the identification marking searching corresponding application according to the configuration information in user's configuration messages in URL storehouse, all identification markings according to finding generate application identification identification list in URL storehouse;
B: then all identification markings extracted are generated independently application identification identification list by the identification marking extracting corresponding application according to the configuration information in user's configuration messages in URL storehouse in Behavior Manager 502.
When adopting A mode pair net page address, mate in the application identification list of system preferably in URL storehouse;
When adopting B mode pair net page address, preferably with the application identification list in Behavior Manager 502 mating, and not needing to enter url list.
In order to can fast finding to web page address, preferably adopt mode B to generate application identification identification list in the present embodiment.
Further, in the present embodiment, Behavior Manager 502 also generates and identifies the sublist Address Recognition that is mutually related with described keyword recognition and identify sublist, wherein, keyword recognition mark between two lists in the interrelated web page address referring to same application leaves in keyword recognition mark sublist, Address Recognition mark leaves in Address Recognition mark sublist, the keyword recognition left in two lists mark is identified interrelated with Address Recognition, searching of convenient like this system network page address simultaneously.
In the present embodiment, described Behavior Manager 502 also has message or application identification function, when user initiates upper network packet, Behavior Manager 502 obtains the keyword recognition mark of network packet on this, then this keyword recognition obtained mark is mated with the keyword recognition list generated before, if the match is successful, then Behavior Manager 502 calls the first corresponding control strategy and controls this message from strategy controller 501, and described control is comprised and being controlled by network packet on strategy controller 501 pairs of Client-initiateds; This control strategy comprises normal process network packet or directly abandon network packet on this on this; If mate unsuccessful, then Behavior Manager 502 directly will normally forward this message, carry out WEB access.
If the first control strategy called is this message of normal process, then Behavior Manager 502 obtains the Address Recognition mark in upper network packet further, then the Address Recognition of acquisition mark is identified sublist with Address Recognition to mate, if mate unsuccessful, then Behavior Manager 502 directly will normally forward this message, carry out WEB access; If the match is successful, then call the second corresponding control strategy and process this message, this second control strategy comprises and produces alarm prompt, normally E-Packets or carry out speed limit while forwarding network packet.
Described first control strategy is the control strategy corresponding to identifying with keyword recognition, and described second control strategy is the control strategy corresponding to identifying with Address Recognition.Certainly, the first control strategy and the second control strategy also can be only same control strategies, when performing keyword recognition mark, only call the wherein part in this control strategy; When executive address identification marking, call the another part in this control strategy.
The conveniently service condition of user's Real-Time Monitoring and awareness network, in the present embodiment, to in the process that processes of network packet, also can generate corresponding URL Template Information, this Template Information is that system is according to adding up Visitor Logs information, the Template Information of generation, system is while regulative strategy, the URL Template Information of generation can be resolved, then according to the Template Information content parsed, send alarm notification or web page message propelling movement etc. to the user needed; System can also upgrade URL storehouse according to the URL Template Information generated or revise; Certainly, system can also generate Visitor Logs table according to the URL Template Information generated, and is shown to user, facilitates user to check Visitor Logs by display terminal, and statistics network behaviour in service.
Above content is in conjunction with concrete execution mode further description made for the present invention, can not assert that specific embodiment of the invention is confined to these explanations.For general technical staff of the technical field of the invention, without departing from the inventive concept of the premise, some simple deduction or replace can also be made, all should be considered as belonging to protection scope of the present invention.

Claims (10)

1. a network log-in management method, is characterized in that:
The configuration messages that reception user issues and strategy, described configuration messages comprises the configuration information of application, and described strategy comprises the first control strategy that in configuration information, each application is corresponding;
From web page address storehouse, obtain the identification marking of corresponding application according to described application configuration information, and generate keyword recognition mark sublist;
After receiving the upper network packet that described user issues, obtain the keyword recognition mark on this in network packet, this keyword recognition is identified in described keyword recognition mark sublist and mates, if the match is successful, then call the first corresponding control strategy, and according to this first control strategy, described upper network packet is processed.
2. network log-in management method as claimed in claim 1, is characterized in that, described first control strategy comprises normal process network packet or directly abandon network packet on this on this.
3. network log-in management method as claimed in claim 1, is characterized in that, also can generate to identify the Address Recognition that sublist is associated with described keyword recognition and identify sublist according to the application identification mark obtained from web page address storehouse.
4. network log-in management method as claimed in claim 3, is characterized in that, described control strategy also comprises applies the second corresponding control strategy with each in described configuration messages; If to call and described first control strategy performed is normal process on this during network packet, described method also comprises:
Obtain the Address Recognition mark in described upper network packet, the Address Recognition of acquisition is identified in described Address Recognition mark sublist and mates, if the match is successful, call described second control strategy and described upper network packet is processed.
5. network log-in management method as claimed in claim 4, is characterized in that, described second control strategy is produce alarm prompt, normally E-Packet or carry out speed limit while forwarding network packet.
6. a network log-in management device, is characterized in that, comprising: transceiver module, List Generating Module, processing module;
Described transceiver module is for the configuration messages that receives user and issue and strategy, described configuration messages comprises the configuration information of application, described strategy to comprise in configuration information the first control strategy corresponding to each application, and by the configuration messages that receives and policy distribution to processing module;
The described application configuration information that described List Generating Module is used for issuing according to transceiver module searches the identification marking of corresponding application from web page address storehouse, and generates keyword recognition mark sublist;
Described processing module comprises keyword acquiring unit, after processing module receives the upper network packet that user issues, keyword acquiring unit obtains the keyword recognition mark in described upper network packet, this keyword recognition is identified at described keyword recognition mark sublist and mates by processing module, if the match is successful, then call the first corresponding control strategy, and according to this first control strategy, described upper network packet is processed.
7. network log-in management device as claimed in claim 6, is characterized in that, described first control strategy comprises normal process network packet or directly abandon network packet on this on this.
8. network log-in management device as claimed in claim 6, it is characterized in that, described network log-in management device also comprises the address list generation module be associated with List Generating Module, and described address list generation module is used for calculated address identification marking sublist.
9. network log-in management device as claimed in claim 8, is characterized in that, described control strategy also comprises applies the second corresponding control strategy with each in described configuration messages; Described processing module also comprises address designation acquiring unit, if processing module is called and described first control strategy performed is that normal process is on this during network packet, address designation acquiring unit obtains the Address Recognition mark in described upper network packet, the Address Recognition of acquisition is identified in described Address Recognition mark sublist and mates, after the match is successful, call described second control strategy and described upper network packet is processed.
10. network log-in management device as claimed in claim 9, is characterized in that, described second control strategy is produce alarm prompt, normally E-Packet or carry out speed limit while forwarding network packet.
CN201410146519.0A 2014-04-11 2014-04-11 Internet behavior management method and device Withdrawn CN104980409A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410146519.0A CN104980409A (en) 2014-04-11 2014-04-11 Internet behavior management method and device
PCT/CN2014/088984 WO2015154416A1 (en) 2014-04-11 2014-10-20 Internet access behaviour management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410146519.0A CN104980409A (en) 2014-04-11 2014-04-11 Internet behavior management method and device

Publications (1)

Publication Number Publication Date
CN104980409A true CN104980409A (en) 2015-10-14

Family

ID=54276519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410146519.0A Withdrawn CN104980409A (en) 2014-04-11 2014-04-11 Internet behavior management method and device

Country Status (2)

Country Link
CN (1) CN104980409A (en)
WO (1) WO2015154416A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376071A (en) * 2016-11-11 2018-08-07 中移(杭州)信息技术有限公司 A kind of APP recognition methods and system
CN111143743A (en) * 2019-12-26 2020-05-12 杭州迪普科技股份有限公司 Method and device for automatically expanding application identification library
CN112242981A (en) * 2019-07-19 2021-01-19 西安中兴新软件有限责任公司 Website filtering method and device
CN114338139A (en) * 2021-12-27 2022-04-12 北京安博通科技股份有限公司 Method for internet behavior management supporting terminal type control

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745305B (en) * 2022-06-15 2022-09-09 中邮消费金融有限公司 Dynamic interaction method and system based on user behavior recognition

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030947A (en) * 2007-04-29 2007-09-05 华为技术有限公司 Method and apparatus for transmitting message
CN101901245A (en) * 2010-01-15 2010-12-01 莱克斯科技(北京)有限公司 Method for auditing webpage based on cloud semantic database
CN102685215A (en) * 2012-04-18 2012-09-19 华为技术有限公司 Method, device and system for online monitoring of mobile terminal
CN102724189A (en) * 2012-06-06 2012-10-10 杭州华三通信技术有限公司 Method and device for controlling user URL (uniform resource locator) access
CN103136372A (en) * 2013-03-21 2013-06-05 陕西通信信息技术有限公司 Method of quick location, classification and filtration of universal resource locator (URL) in network credibility behavior management

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640608A (en) * 2009-04-13 2010-02-03 山石网科通信技术(北京)有限公司 Network action monitoring method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030947A (en) * 2007-04-29 2007-09-05 华为技术有限公司 Method and apparatus for transmitting message
CN101901245A (en) * 2010-01-15 2010-12-01 莱克斯科技(北京)有限公司 Method for auditing webpage based on cloud semantic database
CN102685215A (en) * 2012-04-18 2012-09-19 华为技术有限公司 Method, device and system for online monitoring of mobile terminal
CN102724189A (en) * 2012-06-06 2012-10-10 杭州华三通信技术有限公司 Method and device for controlling user URL (uniform resource locator) access
CN103136372A (en) * 2013-03-21 2013-06-05 陕西通信信息技术有限公司 Method of quick location, classification and filtration of universal resource locator (URL) in network credibility behavior management

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376071A (en) * 2016-11-11 2018-08-07 中移(杭州)信息技术有限公司 A kind of APP recognition methods and system
CN112242981A (en) * 2019-07-19 2021-01-19 西安中兴新软件有限责任公司 Website filtering method and device
CN111143743A (en) * 2019-12-26 2020-05-12 杭州迪普科技股份有限公司 Method and device for automatically expanding application identification library
CN111143743B (en) * 2019-12-26 2023-09-26 杭州迪普科技股份有限公司 Method and device for automatically expanding application identification library
CN114338139A (en) * 2021-12-27 2022-04-12 北京安博通科技股份有限公司 Method for internet behavior management supporting terminal type control
CN114338139B (en) * 2021-12-27 2023-03-24 北京安博通科技股份有限公司 Method for internet behavior management supporting terminal type control

Also Published As

Publication number Publication date
WO2015154416A1 (en) 2015-10-15

Similar Documents

Publication Publication Date Title
CN103825895B (en) A kind of information processing method and electronic equipment
CN104184832B (en) Data submission method and device in network application
CN104980409A (en) Internet behavior management method and device
CN102663105A (en) Establishing method and system of number information database
CN107784051A (en) Online customer service answering system and method
US10834105B2 (en) Method and apparatus for identifying malicious website, and computer storage medium
CN106155812A (en) Method, device, system and the electronic equipment of a kind of resource management to fictitious host computer
CN103297270A (en) Application type recognition method and network equipment
CN110609937A (en) Crawler identification method and device
CN104951544A (en) User data processing method and system and method and system for providing user data
CN104750760A (en) Application software recommending method and device
CN108712426A (en) Reptile recognition methods and system a little are buried based on user behavior
CN104219230B (en) Identify method and the device of malicious websites
CN105207881B (en) A kind of message method and equipment
WO2015021873A1 (en) Method, platform server, and system of data pushing
CN107835132B (en) Method and device for tracking flow source
CN110807085A (en) Fault information query method and device, storage medium and electronic device
US20130179421A1 (en) System and Method for Collecting URL Information Using Retrieval Service of Social Network Service
CN102315952A (en) Method and device for detecting junk posts in community network
CN103905399A (en) Account registration management method and apparatus
CN103617267A (en) Socialized extension search method, device and system
CN105657677A (en) Short message sending method, short message gateway and service platform
CN105871585A (en) Terminal association method and device
CN110020161B (en) Data processing method, log processing method and terminal
CN105718599A (en) Method and device for analyzing database access data packet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20151014