CN115913646A - Method and device for intercepting blacklist object, electronic equipment and storage medium - Google Patents

Method and device for intercepting blacklist object, electronic equipment and storage medium Download PDF

Info

Publication number
CN115913646A
CN115913646A CN202211292696.0A CN202211292696A CN115913646A CN 115913646 A CN115913646 A CN 115913646A CN 202211292696 A CN202211292696 A CN 202211292696A CN 115913646 A CN115913646 A CN 115913646A
Authority
CN
China
Prior art keywords
structured
blacklist
blacklist data
data
cache
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211292696.0A
Other languages
Chinese (zh)
Other versions
CN115913646B (en
Inventor
李镇明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN202211292696.0A priority Critical patent/CN115913646B/en
Publication of CN115913646A publication Critical patent/CN115913646A/en
Application granted granted Critical
Publication of CN115913646B publication Critical patent/CN115913646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method and a device for intercepting blacklist objects, electronic equipment and a storage medium; wherein, the method comprises the following steps: responding to a blacklist object query request sent by a terminal, and carrying out timeliness judgment on first structured blacklist data, wherein the first structured blacklist data indicates structured blacklist data in a local cache of a target application server, and the structured blacklist data indicates a finite state set of original blacklist data; if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data indicates structured blacklist data in the distributed cache; if the first structured blacklist data is consistent with the second structured blacklist data, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be inquired.

Description

Method and device for intercepting blacklist object, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and an apparatus for intercepting a blacklist object, an electronic device, and a storage medium.
Background
When the data volume of the blacklist data becomes large and the interception efficiency is required to be improved, how to ensure the blacklist interception efficiency in the distributed system and reduce the occupation of resources is a technical problem to be solved urgently in the blacklist interception.
In the prior art, generally, blacklist marking or classification is directly performed on all the data of the namelists in the database, and when a request needing to be intercepted corresponds to the request, whether a corresponding object is a blacklist object is inquired from all the data of the blacklists.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for intercepting a blacklist object, an electronic device and a storage medium, so as to improve the efficiency of intercepting mass blacklist data and reduce the occupation of system resources.
In a first aspect, an embodiment of the present invention provides a method for intercepting a blacklist object, where the method is applied to a target application server in a distributed system, where the target application server is an application server indicated by a blacklist query request sent by a terminal, and the distributed system includes multiple application servers, and the method includes: responding to a blacklist object query request sent by a terminal, and performing timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data; if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed caches of the distributed system; if the first structured blacklist data and the second structured blacklist data are consistent, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be inquired.
In a second aspect, an embodiment of the present invention provides an intercepting apparatus for a blacklist object, which is applied to a target application server in a distributed system, where the target application server is an application server indicated by a blacklist query request sent by a terminal, the distributed system includes a plurality of application servers, and the apparatus includes: a response module, configured to respond to a blacklist object query request sent by a terminal, and perform timeliness judgment on first structured blacklist data, where the first structured blacklist data is used to indicate structured blacklist data in a local cache of the target application server, and the structured blacklist data is used to indicate a finite state set of original blacklist data; a judging module, configured to perform consistency judgment on the first structured blacklist data and second structured blacklist data if the first structured blacklist data fails, where the second structured blacklist data is used to indicate structured blacklist data in a distributed cache of the distributed system; the matching module is used for carrying out state matching on the blacklist object to be inquired indicated by the blacklist object inquiry request through the first structured blacklist data if the first structured blacklist data is not invalid; and the intercepting module is used for intercepting the blacklist object to be inquired if the matching is successful.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a processor and a memory, where the memory stores machine executable instructions that can be executed by the processor, and the processor executes the machine executable instructions to implement the method for intercepting a blacklist object.
In a fourth aspect, embodiments of the present invention provide a machine-readable storage medium storing machine-executable instructions, which when invoked and executed by a processor, cause the processor to implement the above-mentioned method for intercepting blacklist objects.
The embodiment of the invention brings the following beneficial effects:
according to the method, the device, the electronic equipment and the storage medium for intercepting the blacklist object, in response to a blacklist object query request sent by a terminal, timeliness judgment is carried out on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data; if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed caches of the distributed system; if the first structured blacklist data is consistent with the second structured blacklist data, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be inquired. In the method, when the blacklist object is queried in the distributed system, whether structured blacklist data in the local cache is invalid or not is judged, if the structured blacklist data in the distributed cache is invalid, whether the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache or not is judged, if the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, the original blacklist data is not changed, state matching of the blacklist object to be queried can still be conducted through the structured blacklist data in the local cache, and if the matching is successful, the blacklist object to be queried can be quickly intercepted without repeatedly querying a database, so that occupation of system resources is reduced. The structured blacklist data is a finite state set, and matching efficiency can still be guaranteed when massive blacklist data is processed.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart illustrating an embodiment of a method for intercepting a blacklist object according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an intercepting method of a blacklist object according to another embodiment of the present invention;
fig. 3 is a schematic diagram of an intercepting apparatus for a blacklist object according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The distributed system is a loosely coupled system constructed by a plurality of servers interconnected through a network, is a software system built on the network, and has software characteristics rather than hardware. One or more layers of Application service programs between the Server and the client are called as "Application servers", the target Application Server refers to one or more layers of Application service programs between the terminal sending the blacklist object query request and the Server, the local cache of the target Application Server refers to the memory of the target Application Server, and the data of the local cache of the Application Server is separately stored by taking the Application Server as a unit.
A warehouse for organizing, storing and managing data in the distributed system is a database, the target database is a database which is corresponding to the target application server and stores original blacklist data, and if the original blacklist data of the target application server a is stored in the database 1, the database 1 is the target database. The distributed cache is managed and controlled by a server side in the distributed system, and data is stored by a plurality of nodes.
It should be understood that the execution subject of the present invention may be an intercepting apparatus of a blacklist object, and may also be a terminal or a server, which is not limited herein. The embodiment of the present invention is described by taking a server as an execution subject.
It should be noted that the present invention is applied to a target application server in a distributed system, where the target application server is an application server indicated by a blacklist query request sent by a terminal, and the distributed system includes a plurality of application servers.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and referring to fig. 1, an embodiment of the method for intercepting a blacklist object in the embodiment of the present invention includes:
step S10, responding to a blacklist object query request sent by a terminal, and carrying out timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data;
it will be appreciated that a distributed system is a loosely coupled system of interconnected processors via communication lines, and that for any processor in the distributed system, the resources of the other processors are remote resources, and only their own resources are local resources. In one embodiment, the distributed system is composed of a plurality of servers, and the target application server refers to a server to which the blacklist object query request is directed in the distributed system, and may be any server in the distributed system. Since the query request for the blacklist object is usually sent by an application program of the user terminal, the target application server is further used for indicating a server on which the target application program runs in the distributed system, where the target application program refers to a sending program of the query request for the blacklist object.
In one embodiment, a blacklist object query request sent by a terminal includes an application server identifier and a blacklist object to be queried, and when the blacklist object query request sent by the terminal is responded, the blacklist object query request is analyzed to obtain the application server identifier and the blacklist object to be queried, wherein the application server identifier is used for indicating a target application server.
It should be noted that the original blacklist data refers to at least one blacklist object data stored in the database, including all blacklist data in the search range of the blacklist object to be queried, for example, if the blacklist object to be queried is a registered user of a certain application, the original blacklist data includes blacklist user data in all registered users of the application, and if the blacklist object to be queried is a merchant in a certain area, the original blacklist data includes blacklist merchants in all merchants in the area, which is not limited herein.
In this embodiment, the first structured blacklist data is pre-stored data in a local cache of the target application server, and includes a finite state set of the original blacklist data. In an embodiment, the first structured blacklist data may be data obtained by performing finite state data structure conversion on the original blacklist data, or may be data directly obtained from a distributed system, which is not limited herein.
It can be understood that the finite state set includes character states of all blacklist objects in the original blacklist data, the character states include a start state, a death state and an end state, and for each character in the blacklist object to be queried, the character states of each character can be matched through the finite state set, so that whether the blacklist object to be queried is contained in the original blacklist data is quickly determined, a remote database or a local database is prevented from being accessed for each query, occupation of system resources is reduced, and meanwhile interception efficiency of the blacklist data is improved.
In this embodiment, in order to ensure freshness of the local cache data, the first structured blacklist data has a certain timeliness, and when the first structured blacklist data is stored in the local cache of the target application server, the timeliness parameter is determined according to the storage time, and is used to indicate whether the first structured blacklist data is invalid.
Step S20, if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed cache of a distributed system;
it should be noted that the distributed cache of the distributed system supports multi-process sharing, and when the cache of any process is changed, the changed data can be synchronized into the caches of other processes. Based on this, the distributed cache of the distributed system stores the structured blacklist data, i.e. the second structured blacklist data in advance, for performing data synchronization with each application server. By judging the data consistency of the distributed cache and the local cache, the system resources required for directly reading data from a database by the local cache can be reduced, and the interception efficiency of blacklist data is improved.
In an embodiment, if the timeliness parameter corresponding to the first structured blacklist data indicates that the first structured blacklist data is expired, that is, the first structured blacklist data is invalid, then consistency determination is performed on the first structured blacklist data and the second structured blacklist data to verify whether the invalid structured blacklist data in the local cache is synchronized with the structured blacklist data in the distributed cache, and further, whether the invalid structured blacklist data in the local cache can be used for blacklist query is determined.
In one embodiment, the information abstract calculation is performed on first structured blacklist data and second structured blacklist data respectively through an information abstract algorithm to obtain a first information abstract and a second information abstract, consistency judgment is performed on the first information abstract and the second information abstract to determine whether the first structured blacklist data and the second structured blacklist data are consistent, if the first information abstract and the second information abstract are consistent, the first structured blacklist data and the second structured blacklist data are consistent, and if the first information abstract and the second information abstract are inconsistent, the first structured blacklist data and the second structured blacklist data are inconsistent. Since the same data can only obtain the same information abstract through the same information abstract algorithm, whether the first structured blacklist data and the second structured blacklist data are consistent or not can be quickly determined through the information abstract algorithm, and therefore the interception efficiency of the blacklist data is improved.
In one embodiment, the distributed cache marker is also used to indicate the timeliness of structured blacklist data in the distributed cache. The step S20 includes: if the first structured blacklist data is invalid, performing timeliness judgment on the second structured blacklist data; and if the second structured blacklist data is not invalid, performing consistency judgment on the first structured blacklist data and the second structured blacklist data, wherein the second structured blacklist data is used for indicating the structured blacklist data in the distributed cache of the distributed system. If the second structured blacklist data is invalid, emptying structured blacklist data in the distributed cache and the local cache, and performing finite state data structure conversion and serialization processing on the latest blacklist data in the target database to obtain the latest structured blacklist data; and storing the latest structured blacklist data to a distributed cache, and synchronizing the structured blacklist data in the distributed cache to all application servers or the local cache of a target application server to obtain the latest first structured blacklist data.
Step S30, if the first structured blacklist data is consistent with the second structured blacklist data, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data;
in this embodiment, if the first structured blacklist data and the second structured blacklist data are consistent, it indicates that the structured blacklist data in the distributed cache is the same as the structured blacklist data in the local cache, and since the structured blacklist data in the distributed cache is always consistent with the original blacklist data (content is consistent, data structure is different), it indirectly indicates that the structured blacklist data in the local cache is also consistent with the original blacklist data (content is consistent, data structure is different), at this time, it is not necessary to obtain the latest blacklist data from the distributed cache or the database again, but directly through the structured blacklist data in the local cache, the state matching of the blacklist object to be queried can be performed, thereby greatly improving the efficiency of intercepting the blacklist data.
In one embodiment, the finite state set includes character fragments and corresponding character states of the character fragments, for example, assuming that a blacklist object is "Shenzhen corporation", the character fragments of the blacklist object in the finite state set include: and each character fragment corresponds to one character state and is used for indicating whether the character fragment is in an ending state, for example, the character states respectively corresponding to the "deep" fragment, the "deep zhen" fragment and the "deep zhen public" fragment are both in a non-ending state, and the character state corresponding to the "deep zhen company" fragment is in an ending state, which is not limited herein. Based on the above, through the character state in the finite state set corresponding to the first structured blacklist data, the character states of the character segments in the blacklist object to be queried are sequentially matched one by one, if the character state of any character segment in the blacklist object to be queried corresponding to the finite state set is an end state, the matching is successful, and if the character state of any character segment in the blacklist object to be queried does not exist in the finite state set or the character state of the last character segment in the blacklist object to be queried corresponding to the finite state set is a non-end state, the matching is failed. According to the embodiment, the blacklist object to be queried can be quickly matched through the finite state set, so that the interception efficiency of the blacklist data is improved.
And S40, if the matching is successful, intercepting the blacklist object to be inquired.
It can be understood that, if the matching is successful, it indicates that the blacklist object to be queried is a blacklist object, and then the blacklist object to be queried needs to be intercepted. Specifically, if the matching is successful, the operation restriction corresponding to the blacklist object to be queried is performed. For example, assuming that the object a to be queried is successfully matched, the login operation, comment operation, purchase operation, and the like of the object a in the target application may be limited, and the specific details are not limited herein.
In the method for intercepting a blacklist object provided in the above embodiment, when querying a blacklist object in a distributed system, it is first determined whether structured blacklist data in a local cache is invalid, and if the structured blacklist data in the distributed cache is invalid, it is determined whether the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, and if the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, it is indicated that original blacklist data is not changed, and state matching of the blacklist object to be queried can still be performed through the structured blacklist data in the local cache. The structured blacklist data is a finite state set, and matching efficiency can still be guaranteed when massive blacklist data is processed.
Referring to fig. 2, another embodiment of the method for intercepting a blacklisted object according to the embodiment of the present invention includes:
step S201, responding to the change of original blacklist data in a target database, and performing finite state data structure conversion and serialization processing on the changed original blacklist data through a preset finite automata determining algorithm to obtain original structured blacklist data;
in this embodiment, in order to ensure the freshness of the queried data when querying the blacklist object, when the original blacklist data in the target database is changed, data structure conversion and serialization processing are performed on the changed original blacklist data to generate original structured blacklist data for synchronization to the distributed cache. In this step, a preset Deterministic Finite Automaton (DFA) algorithm can be converted from one state to another state through a series of events, the DFA algorithm is used to perform Finite state data structure conversion on the changed original blacklist data to obtain a Finite state set, and then the Finite state set is subjected to serialization processing to obtain the original structured blacklist data.
Step S202, storing the original structured blacklist data into a distributed cache to obtain second structured blacklist data, marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest second structured blacklist data in the distributed cache;
in this step, after the original structured blacklist data is obtained, the original structured blacklist data is stored in the distributed cache to obtain second structured blacklist data, wherein when the original structured blacklist data is stored in the distributed cache, the original structured blacklist data in the distributed cache can be directly covered, so that only one latest structured blacklist data is stored in the distributed cache, version collision between the structured blacklist data stored at different times is avoided, and the cost of version management is reduced. And then, marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest structured blacklist data in the distributed cache. By way of example and not limitation, the distributed cache marker may be a time marker, such as a storage time when the original structured blacklist data is stored into the distributed cache, which may be in a time format: 20221013-17, and may be in timestamp format: 1665652584664, and other formats are also possible, and are not limited herein. The distributed cache marker may also be a unique identifier in any other form, which is not limited herein.
In one embodiment, after step S202, the method further includes: acquiring second structured blacklist data and distributed cache marks in the distributed cache through all application servers in the distributed system; all application servers respectively perform deserialization processing on the acquired structured blacklist data, and store the deserialized structured blacklist data and the acquired distributed cache marks into local caches corresponding to the application servers; and generating timeliness marks of the structured blacklist data in the local caches of all the application servers to obtain the local cache marks corresponding to all the application servers respectively.
In this embodiment, in order to ensure data synchronization of all application servers in the distributed system, after the original structured blacklist data is stored in the distributed cache (first synchronization between the distributed cache and the local cache), or when the structured blacklist data in the local cache needs to be updated (non-first synchronization between the distributed cache and the local cache), the second structured blacklist data and the distributed cache tag in the distributed cache are obtained by all application servers in the distributed system, then, in order to improve data processing efficiency of the local cache, all application servers perform deserialization processing on the obtained structured blacklist data, the deserialized structured blacklist data can be directly used for blacklist object query, the deserialized structured blacklist data and the obtained distributed cache tag are stored in the local cache corresponding to the application server, the structured blacklist data and the distributed cache tag in the local cache are obtained, and then the structured blacklist data in the local cache is subjected to timeliness tag generation, and the local tags in the local caches corresponding to all the cache application servers are obtained. As can be seen, the local cache stores structured blacklist data, distributed cache tags and local cache tags.
Step S203, responding to a blacklist object query request sent by a terminal, and performing timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data;
in one embodiment, the time effectiveness judgment of the first structured blacklist data includes: acquiring a local cache mark of a target application server, wherein the local cache mark is used for indicating the storage time when the latest structured blacklist data is stored in the local cache of the target application server; judging whether the first structured blacklist data is invalid or not according to preset cache invalidation duration and storage time; in this embodiment, the timeliness determination is performed on the first structured blacklist data through the local cache mark, specifically, the local cache mark of the target application server is obtained, and then whether the first structured blacklist data is expired is determined according to the local cache mark and the cache expiration time, if so, the first structured blacklist data is expired, and if not, the first structured blacklist data is not expired. In one embodiment, the local cache mark is overlapped with a preset cache invalidation time length to obtain an invalidation time of the first structured blacklist data, and whether the first structured blacklist data is invalidated or not is judged according to the invalidation time. For example, assuming that the local cache is labeled 1665652584664 and the preset cache expiration time is 60000 (1 minute), then the expiration time is 1665652584664+60000=1665652644664, which is not limited herein. And if the current time is greater than the failure time, determining that the first structured blacklist data is failed, otherwise, determining that the first structured blacklist data is not failed.
In an embodiment, if the first structured blacklist data is not invalid, subsequent determination is not required, and the blacklist object to be queried indicated by the blacklist object query request can be directly subjected to state matching through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be inquired.
Step S204, if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in the distributed cache of the distributed system;
in an embodiment, the performing consistency determination on the first structured blacklist data and the second structured blacklist data if the first structured blacklist data fails includes: if the first structured blacklist data is invalid, obtaining a distributed cache mark in the distributed cache, and performing consistency comparison on the distributed cache mark in the distributed cache and a distributed cache mark in a local cache to judge whether the first structured blacklist data and the second structured blacklist data are consistent or not, wherein the distributed cache mark in the local cache and the first structured blacklist are stored at the same time. In this embodiment, if the first structured blacklist data is invalid, the distributed cache tag in the distributed cache is obtained, and then the distributed cache tag in the distributed cache and the distributed cache tag in the local cache are compared in a consistency manner, so as to determine whether the first structured blacklist data and the second structured blacklist data are consistent. And if the distributed cache marks in the distributed cache are consistent with the distributed cache marks in the local cache, determining that the first structured blacklist data and the second structured blacklist data are consistent, otherwise, determining that the first structured blacklist data and the second structured blacklist data are inconsistent.
In one embodiment, if the first structured blacklist data is invalid and the first structured blacklist data is inconsistent with the second structured blacklist data, the structured blacklist data in the local cache is cleared; acquiring latest structured blacklist data and a latest distributed cache mark in a distributed cache, and storing the acquired structured blacklist data and the acquired distributed cache mark in a local cache to obtain latest first structured blacklist data and the latest distributed cache mark in the local cache; and generating a time-efficiency mark of the latest first structured blacklist data to obtain the latest local cache mark.
In this embodiment, if the first structured blacklist data is invalid and the first structured blacklist data is inconsistent with the second structured blacklist data, it indicates that the original blacklist data has been changed, and therefore, the structured blacklist data in the local cache needs to be updated. Specifically, the structured blacklist data in the local cache is deleted, the latest structured blacklist data and the latest distributed cache marks are obtained from the distributed cache and stored in the local cache, so that the latest first structured blacklist data and the latest distributed cache marks in the local cache are obtained, the timeliness marks corresponding to the latest first structured blacklist data are regenerated, and the latest local cache marks are obtained. It can be understood that, since the structured blacklist data in the distributed cache is updated immediately when the original blacklist data is changed, the structured blacklist data obtained from the distributed cache can ensure that the structured blacklist data corresponds to the changed original blacklist data, which is an advantage of the hierarchical cache mechanism.
In an embodiment, if the first structured blacklist data is invalid and the first structured blacklist data and the second structured blacklist data are consistent, the timeliness of the local cache tag in the local cache is extended to obtain the latest local cache tag. In this embodiment, if the first structured blacklist data is invalid, and the first structured blacklist data and the second structured blacklist data are consistent, which indicates that the original blacklist data is not changed, but the structured blacklist data of the local cache reaches the update period, it is necessary to perform a time-efficient extension on the local cache mark in the local cache in addition to performing state matching on the blacklist object to be queried indicated by the blacklist object query request directly through the first structured blacklist data, specifically, the local cache mark in the local cache is superimposed with a preset update period duration to obtain a latest local cache mark. For example, assuming that the local cache is labeled as 1665652584664 and the preset update cycle duration is 120000 (2 minutes), the latest local cache is labeled as 1665652584664+120000=1665652704664, which is not limited herein.
Step S205, if the first structured blacklist data is consistent with the second structured blacklist data, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data;
in one embodiment, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data includes: dividing characters of a blacklist object to be queried, and performing character-by-character state matching from first structured blacklist data, wherein the states comprise an initial state, a fading state and an ending state; and if the matched state of the last character in the blacklist object to be queried in the first structured blacklist data is an end state, the matching is successful. In this embodiment, when the blacklist object to be queried indicated by the blacklist object query request is state-matched through the first structured blacklist data, first, character division and state determination are performed on the blacklist object to be queried to obtain at least one target character and a target state corresponding to each target character, then, character and state matching is performed on the blacklist object to be queried one by one according to a character sequence from the first structured blacklist data, whether a first target character in the blacklist object to be queried exists in the first structured blacklist data is judged, and a state of the first target character in the first structured blacklist data and a target state corresponding to the blacklist object to be queried are both initial states, if yes, it is judged whether a target character in an intermediate position in the blacklist object to be queried exists in the first structured blacklist data, and a state of the target character in the intermediate position in the first structured blacklist data and a target state corresponding to the blacklist object to be queried are both extinction states, wherein the target character in the intermediate position is a state other than the first character and the last character, if the first structured blacklist object to be successfully matched with the target state of the blacklist object to be queried in the first structured blacklist object, it is judged that the first structured blacklist object to be successfully matched with the target character, and the target state corresponding to be successfully, and the target object to be successfully.
And step S206, if the matching is successful, intercepting the blacklist object to be queried.
The execution process of step S206 is similar to the execution process of step S104, and detailed description thereof is omitted here.
In correspondence to the above method embodiment, referring to fig. 3, a schematic diagram of an intercepting apparatus for a blacklist object is shown, where the intercepting apparatus is applied to a target application server in a distributed system, where the target application server is an application server indicated by a request for querying a blacklist sent by a terminal, the distributed system includes multiple application servers, and the apparatus includes:
a response module 30, configured to respond to a blacklist object query request sent by a terminal, and perform timeliness judgment on first structured blacklist data, where the first structured blacklist data is used to indicate structured blacklist data in a local cache of a target application server, and the structured blacklist data is used to indicate a finite state set of original blacklist data;
the judging module 32 is configured to, if the first structured blacklist data is invalid, perform consistency judgment on the first structured blacklist data and second structured blacklist data, where the second structured blacklist data is used to indicate structured blacklist data in a distributed cache of a distributed system;
the matching module 34 is configured to perform state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data if the first structured blacklist data is not invalid;
and the intercepting module 36 is configured to intercept the blacklist object to be queried if the matching is successful.
According to the intercepting device of the blacklist object, when the blacklist object is inquired in a distributed system, whether structured blacklist data in a local cache is invalid or not is judged, if the structured blacklist data in the distributed cache is invalid, whether the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache or not is judged, if the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, the original blacklist data is not changed, state matching of the blacklist object to be inquired can still be conducted through the structured blacklist data in the local cache, and if the matching is successful, the blacklist object to be inquired can be quickly intercepted without repeatedly inquiring a database, so that occupation of system resources is reduced. The structured blacklist data is a finite state set, and matching efficiency can still be guaranteed when massive blacklist data is processed.
The above-mentioned device still includes: the change module is used for responding to the change of the original blacklist data in the target database, and performing finite state data structure conversion and serialization processing on the changed original blacklist data through a preset finite automata determining algorithm to obtain original structured blacklist data; and storing the original structured blacklist data into a distributed cache to obtain second structured blacklist data, and marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest second structured blacklist data in the distributed cache.
The above-mentioned device still includes: the first storage module is used for acquiring second structured blacklist data and distributed cache marks in the distributed cache through all application servers in the distributed system; all the application servers respectively perform deserialization processing on the acquired structured blacklist data, and store the deserialized structured blacklist data and the acquired distributed cache marks into local caches corresponding to the application servers; and generating timeliness marks of the structured blacklist data in the local caches of all the application servers to obtain the local cache marks corresponding to all the application servers respectively.
The above-mentioned device still includes: the second storage module is used for emptying the structured blacklist data in the local cache if the first structured blacklist data is invalid and the first structured blacklist data is inconsistent with the second structured blacklist data; acquiring latest structured blacklist data and a latest distributed cache mark in a distributed cache, and storing the acquired structured blacklist data and the acquired distributed cache mark in a local cache to obtain latest first structured blacklist data and the latest distributed cache mark in the local cache; and generating a time-efficiency mark of the latest first structured blacklist data to obtain the latest local cache mark.
The above-mentioned device still includes: and the time delay module is used for prolonging the timeliness of the local cache mark in the local cache of the target application server to obtain the latest local cache mark if the first structured blacklist data is invalid and the first structured blacklist data is consistent with the second structured blacklist data.
The response module is further configured to: acquiring a local cache mark of a target application server, wherein the local cache mark is used for indicating the storage time when the latest structured blacklist data is stored in the local cache of the target application server; and judging whether the first structured blacklist data is invalid or not according to the preset cache invalidation time length and the storage time.
The judging module is further configured to: if the first structured blacklist data is invalid, obtaining a distributed cache mark in the distributed cache, and performing consistency comparison on the distributed cache mark in the distributed cache and a distributed cache mark in a local cache to judge whether the first structured blacklist data and the second structured blacklist data are consistent or not, wherein the distributed cache mark in the local cache and the first structured blacklist are stored at the same time.
The matching module is further configured to: dividing characters of the blacklist object to be queried, and performing state matching of the characters one by one from the first structured blacklist data; and if the state of the last character in the blacklist object to be inquired matched in the first structured blacklist data is the end state, the matching is successful.
The embodiment also provides an electronic device, which comprises a processor and a memory, wherein the memory stores machine executable instructions capable of being executed by the processor, and the processor executes the machine executable instructions to implement the method for intercepting the blacklist object. The electronic device may be a server or a terminal device.
Referring to fig. 4, the electronic device includes a processor 100 and a memory 101, where the memory 101 stores machine executable instructions capable of being executed by the processor 100, and the processor 100 executes the machine executable instructions to implement the above-mentioned method for intercepting blacklist objects.
Further, the electronic device shown in fig. 4 further includes a bus 102 and a communication interface 103, and the processor 100, the communication interface 103, and the memory 101 are connected through the bus 102.
The Memory 101 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 103 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used. The bus 102 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
Processor 100 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 100. The Processor 100 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 101, and the processor 100 reads the information in the memory 101 and, in conjunction with the hardware thereof, performs the steps of the method of the foregoing embodiment, such as:
responding to a blacklist object query request sent by a terminal, and carrying out timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data; if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed caches of the distributed system; if the first structured blacklist data and the second structured blacklist data are consistent, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be queried.
In the method, when the blacklist object is queried in the distributed system, whether structured blacklist data in a local cache is invalid or not is judged, if the structured blacklist data in the distributed cache is invalid, whether the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache or not is judged, if the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, the original blacklist data is not changed, state matching of the blacklist object to be queried can still be carried out through the structured blacklist data in the local cache, and if the matching is successful, the blacklist object to be queried can be rapidly intercepted without repeatedly querying a database, so that the occupation of system resources is reduced. The structured blacklist data is a finite state set, and matching efficiency can still be guaranteed when massive blacklist data is processed.
The method further comprises the following steps: responding to the change of the original blacklist data in the target database, and performing finite state data structure conversion and serialization processing on the changed original blacklist data through a preset finite automata algorithm to obtain original structured blacklist data; and storing the original structured blacklist data into a distributed cache to obtain second structured blacklist data, and marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest second structured blacklist data in the distributed cache.
The method further comprises the following steps: acquiring second structured blacklist data and distributed cache marks in the distributed cache through all application servers in the distributed system; all the application servers respectively perform deserialization processing on the acquired structured blacklist data, and store the deserialized structured blacklist data and the acquired distributed cache marks into local caches corresponding to the application servers; and generating timeliness marks of the structured blacklist data in the local caches of all the application servers to obtain the local cache marks corresponding to all the application servers respectively.
The method further comprises the following steps: if the first structured blacklist data is invalid and the first structured blacklist data is inconsistent with the second structured blacklist data, clearing the structured blacklist data in the local cache; acquiring latest structured blacklist data and distributed cache marks in the distributed cache, and storing the acquired structured blacklist data and distributed cache marks in a local cache to obtain latest first structured blacklist data and distributed cache marks in the local cache; and generating a time-efficiency mark of the latest first structured blacklist data to obtain the latest local cache mark.
The method further comprises the following steps: and if the first structured blacklist data is invalid and the first structured blacklist data is consistent with the second structured blacklist data, performing timeliness extension on the local cache mark in the local cache of the target application server to obtain the latest local cache mark.
The above time effectiveness judgment on the first structured blacklist data includes: acquiring a local cache mark of a target application server, wherein the local cache mark is used for indicating the storage time when the latest structured blacklist data is stored in the local cache of the target application server; and judging whether the first structured blacklist data is invalid or not according to the preset cache invalidation time and the storage time.
If the first structured blacklist data is invalid, the consistency judgment of the first structured blacklist data and the second structured blacklist data includes: if the first structured blacklist data is invalid, obtaining a distributed cache mark in the distributed cache, and performing consistency comparison on the distributed cache mark in the distributed cache and a distributed cache mark in a local cache to judge whether the first structured blacklist data and the second structured blacklist data are consistent or not, wherein the distributed cache mark in the local cache and the first structured blacklist are simultaneously stored.
The performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data includes: dividing characters of the blacklist object to be queried, and performing state matching of the characters one by one from the first structured blacklist data; and if the state of the last character in the blacklist object to be inquired matched in the first structured blacklist data is the end state, the matching is successful.
The present embodiments also provide a machine-readable storage medium storing machine-executable instructions, which when invoked and executed by a processor, cause the processor to implement the above-mentioned method for intercepting blacklisted objects, for example:
responding to a blacklist object query request sent by a terminal, and carrying out timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data; if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed caches of the distributed system; if the first structured blacklist data is consistent with the second structured blacklist data, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data; and if the matching is successful, intercepting the blacklist object to be inquired.
In the method, when the blacklist object is queried in the distributed system, whether structured blacklist data in the local cache is invalid or not is judged, if the structured blacklist data in the distributed cache is invalid, whether the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache or not is judged, if the structured blacklist data in the distributed cache is consistent with the structured blacklist data in the local cache, the original blacklist data is not changed, state matching of the blacklist object to be queried can still be conducted through the structured blacklist data in the local cache, and if the matching is successful, the blacklist object to be queried can be quickly intercepted without repeatedly querying a database, so that occupation of system resources is reduced. The structured blacklist data is a finite state set, and matching efficiency can still be guaranteed when massive blacklist data is processed.
The method further comprises the following steps: responding to the change of the original blacklist data in the target database, and performing finite state data structure conversion and serialization processing on the changed original blacklist data through a preset finite automata algorithm to obtain original structured blacklist data; and storing the original structured blacklist data into a distributed cache to obtain second structured blacklist data, and marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest second structured blacklist data in the distributed cache.
The method further comprises the following steps: acquiring second structured blacklist data and distributed cache marks in the distributed cache through all application servers in the distributed system; all the application servers respectively perform deserialization processing on the acquired structured blacklist data, and store the deserialized structured blacklist data and the acquired distributed cache marks into local caches corresponding to the application servers; and generating timeliness marks of the structured blacklist data in the local caches of all the application servers to obtain the local cache marks corresponding to all the application servers respectively.
The method further comprises the following steps: if the first structured blacklist data is invalid and the first structured blacklist data is inconsistent with the second structured blacklist data, clearing the structured blacklist data in the local cache; acquiring latest structured blacklist data and a latest distributed cache mark in a distributed cache, and storing the acquired structured blacklist data and the acquired distributed cache mark in a local cache to obtain latest first structured blacklist data and the latest distributed cache mark in the local cache; and generating a time-efficiency mark of the latest first structured blacklist data to obtain the latest local cache mark.
The method further comprises the following steps: and if the first structured blacklist data is invalid and the first structured blacklist data is consistent with the second structured blacklist data, performing timeliness extension on a local cache mark in a local cache of the target application server to obtain a latest local cache mark.
The above time effectiveness judgment on the first structured blacklist data includes: acquiring a local cache mark of a target application server, wherein the local cache mark is used for indicating the storage time when the latest structured blacklist data is stored to the local cache of the target application server; and judging whether the first structured blacklist data is invalid or not according to the preset cache invalidation time length and the storage time.
If the first structured blacklist data is invalid, the consistency judgment of the first structured blacklist data and the second structured blacklist data includes: if the first structured blacklist data is invalid, obtaining a distributed cache mark in the distributed cache, and performing consistency comparison on the distributed cache mark in the distributed cache and a distributed cache mark in a local cache to judge whether the first structured blacklist data and the second structured blacklist data are consistent or not, wherein the distributed cache mark in the local cache and the first structured blacklist are simultaneously stored.
The performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data includes: dividing characters of the blacklist object to be queried, and performing state matching of the characters one by one from the first structured blacklist data; and if the state of the last character in the blacklist object to be inquired matched in the first structured blacklist data is the end state, the matching is successful.
The method, the apparatus, the electronic device, and the computer program product of the storage medium for intercepting a blacklist object provided in the embodiments of the present invention include a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementations may refer to the method embodiments and are not described herein again.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working process of the system and the apparatus described above may refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases for those skilled in the art.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that the following embodiments are merely illustrative of the present invention, and not restrictive, and the scope of the present invention is not limited thereto: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (11)

1. A method for intercepting blacklist objects is applied to a target application server in a distributed system, and is characterized in that the target application server is an application server indicated by a blacklist query request sent by a terminal, the distributed system comprises a plurality of application servers, and the method comprises the following steps:
responding to a blacklist object query request sent by a terminal, and performing timeliness judgment on first structured blacklist data, wherein the first structured blacklist data is used for indicating structured blacklist data in a local cache of a target application server, and the structured blacklist data is used for indicating a finite state set of original blacklist data;
if the first structured blacklist data is invalid, consistency judgment is carried out on the first structured blacklist data and second structured blacklist data, and the second structured blacklist data is used for indicating the structured blacklist data in distributed caches of the distributed system;
if the first structured blacklist data and the second structured blacklist data are consistent, performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data;
and if the matching is successful, intercepting the blacklist object to be inquired.
2. The method of claim 1, further comprising:
responding to the change of the original blacklist data in the target database, and performing finite state data structure conversion and serialization processing on the changed original blacklist data through a preset finite automata algorithm to obtain original structured blacklist data;
and storing the original structured blacklist data into a distributed cache to obtain second structured blacklist data, and marking the second structured blacklist data to obtain a distributed cache mark, wherein the distributed cache mark is used for indicating the latest second structured blacklist data in the distributed cache.
3. The method of claim 1, further comprising:
acquiring second structured blacklist data and distributed cache marks in the distributed cache through all application servers in the distributed system;
all the application servers respectively perform deserialization processing on the acquired structured blacklist data, and store the deserialized structured blacklist data and the acquired distributed cache marks into local caches corresponding to the application servers;
and generating timeliness marks of the structured blacklist data in the local caches of all the application servers to obtain the local cache marks corresponding to all the application servers respectively.
4. The method of claim 1, further comprising:
if the first structured blacklist data is invalid and the first structured blacklist data and the second structured blacklist data are inconsistent, clearing the structured blacklist data in the local cache;
acquiring latest structured blacklist data and a latest distributed cache mark in a distributed cache, and storing the acquired structured blacklist data and the acquired distributed cache mark in a local cache to obtain latest first structured blacklist data and the latest distributed cache mark in the local cache;
and generating a timeliness mark of the latest first structured blacklist data to obtain a latest local cache mark.
5. The method of claim 1, further comprising:
and if the first structured blacklist data is invalid and the first structured blacklist data and the second structured blacklist data are consistent, performing timeliness extension on a local cache mark in a local cache of the target application server to obtain a latest local cache mark.
6. The method of claim 1, wherein the determining the timeliness of the first structured blacklist data includes:
obtaining a local cache mark of the target application server, wherein the local cache mark is used for indicating the storage time when the latest structured blacklist data is stored to the local cache of the target application server;
and judging whether the first structured blacklist data is invalid or not according to preset cache invalidation duration and the storage time.
7. The method of claim 1, wherein the determining consistency of the first structured blacklist data and the second structured blacklist data if the first structured blacklist data is invalid comprises:
if the first structured blacklist data is invalid, obtaining a distributed cache mark in a distributed cache, and performing consistency comparison on the distributed cache mark in the distributed cache and a distributed cache mark in a local cache to judge whether the first structured blacklist data and the second structured blacklist data are consistent or not, wherein the distributed cache mark in the local cache and the first structured blacklist are stored simultaneously.
8. The method of claim 1, wherein the performing state matching on the blacklist object to be queried indicated by the blacklist object query request through the first structured blacklist data includes:
dividing characters of the blacklist object to be queried, and performing state matching of the characters one by one from the first structured blacklist data;
and if the state of the last character in the blacklist object to be queried matched in the first structured blacklist data is an end state, the matching is successful.
9. An intercepting device of a blacklist object, applied to a target application server in a distributed system, wherein the target application server is an application server indicated by a blacklist query request sent by a terminal, the distributed system includes a plurality of application servers, the device includes:
a response module, configured to respond to a blacklist object query request sent by a terminal, and perform timeliness judgment on first structured blacklist data, where the first structured blacklist data is used to indicate structured blacklist data in a local cache of the target application server, and the structured blacklist data is used to indicate a finite state set of original blacklist data;
a judging module, configured to perform consistency judgment on the first structured blacklist data and second structured blacklist data if the first structured blacklist data fails, where the second structured blacklist data is used to indicate structured blacklist data in a distributed cache of the distributed system;
the matching module is used for carrying out state matching on the blacklist object to be inquired indicated by the blacklist object inquiry request through the first structured blacklist data if the first structured blacklist data is not invalid;
and the intercepting module is used for intercepting the blacklist object to be inquired if the matching is successful.
10. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor, the processor executing the machine executable instructions to implement the method of intercepting blacklisted objects of any one of claims 1-8.
11. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of intercepting blacklisted objects of any one of claims 1-8.
CN202211292696.0A 2022-10-21 2022-10-21 Method and device for intercepting blacklist object, electronic equipment and storage medium Active CN115913646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211292696.0A CN115913646B (en) 2022-10-21 2022-10-21 Method and device for intercepting blacklist object, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211292696.0A CN115913646B (en) 2022-10-21 2022-10-21 Method and device for intercepting blacklist object, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115913646A true CN115913646A (en) 2023-04-04
CN115913646B CN115913646B (en) 2024-06-04

Family

ID=86486273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211292696.0A Active CN115913646B (en) 2022-10-21 2022-10-21 Method and device for intercepting blacklist object, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115913646B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160110284A1 (en) * 2014-10-21 2016-04-21 Pranav ATHALYE Distributed cache framework
CN106021468A (en) * 2016-05-17 2016-10-12 上海携程商务有限公司 Updating method and system for distributed caches and local caches
CN107231395A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Date storage method, device and system
US20170346915A1 (en) * 2016-05-27 2017-11-30 Home Box Office, Inc. Cached data repurposing
CN108429777A (en) * 2017-02-15 2018-08-21 腾讯科技(北京)有限公司 Data updating method based on cache and server
CN110909025A (en) * 2018-09-17 2020-03-24 深圳市优必选科技有限公司 Database query method, query device and terminal
CN111221862A (en) * 2019-12-31 2020-06-02 五八有限公司 Request processing method and device
CN111241134A (en) * 2019-12-31 2020-06-05 五八有限公司 Data processing method and device
CN111414383A (en) * 2020-02-21 2020-07-14 车智互联(北京)科技有限公司 Data request method, data processing system and computing device
CN111464615A (en) * 2020-03-30 2020-07-28 北京达佳互联信息技术有限公司 Request processing method, device, server and storage medium
CN112040429A (en) * 2020-07-28 2020-12-04 南京云中云信息技术有限公司 Short message management system and method based on distributed storage
CN112749198A (en) * 2021-01-21 2021-05-04 中信银行股份有限公司 Multi-level data caching method and device based on version number
CN113010552A (en) * 2021-03-02 2021-06-22 腾讯科技(深圳)有限公司 Data processing method, system, computer readable medium and electronic device
EP3869345A1 (en) * 2020-02-21 2021-08-25 NXP USA, Inc. Data processing system implemented having a distributed cache
CN113360528A (en) * 2020-03-06 2021-09-07 北京沃东天骏信息技术有限公司 Data query method and device based on multi-level cache
CN113986921A (en) * 2021-10-27 2022-01-28 中国工商银行股份有限公司 Blacklist query method, system, electronic equipment and storage medium
CN114048234A (en) * 2021-10-19 2022-02-15 车主邦(北京)科技有限公司 Data processing method and device, electronic equipment and storage medium
CN114398381A (en) * 2021-12-22 2022-04-26 北京京东拓先科技有限公司 Diagnosis and treatment data processing method and device
CN114706890A (en) * 2022-04-11 2022-07-05 曙光网络科技有限公司 Multi-stage data query method and device, electronic equipment and storage medium

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160110284A1 (en) * 2014-10-21 2016-04-21 Pranav ATHALYE Distributed cache framework
CN107231395A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Date storage method, device and system
CN106021468A (en) * 2016-05-17 2016-10-12 上海携程商务有限公司 Updating method and system for distributed caches and local caches
US20170346915A1 (en) * 2016-05-27 2017-11-30 Home Box Office, Inc. Cached data repurposing
CN108429777A (en) * 2017-02-15 2018-08-21 腾讯科技(北京)有限公司 Data updating method based on cache and server
CN110909025A (en) * 2018-09-17 2020-03-24 深圳市优必选科技有限公司 Database query method, query device and terminal
CN111221862A (en) * 2019-12-31 2020-06-02 五八有限公司 Request processing method and device
CN111241134A (en) * 2019-12-31 2020-06-05 五八有限公司 Data processing method and device
CN111414383A (en) * 2020-02-21 2020-07-14 车智互联(北京)科技有限公司 Data request method, data processing system and computing device
EP3869345A1 (en) * 2020-02-21 2021-08-25 NXP USA, Inc. Data processing system implemented having a distributed cache
CN113360528A (en) * 2020-03-06 2021-09-07 北京沃东天骏信息技术有限公司 Data query method and device based on multi-level cache
CN111464615A (en) * 2020-03-30 2020-07-28 北京达佳互联信息技术有限公司 Request processing method, device, server and storage medium
CN112040429A (en) * 2020-07-28 2020-12-04 南京云中云信息技术有限公司 Short message management system and method based on distributed storage
CN112749198A (en) * 2021-01-21 2021-05-04 中信银行股份有限公司 Multi-level data caching method and device based on version number
CN113010552A (en) * 2021-03-02 2021-06-22 腾讯科技(深圳)有限公司 Data processing method, system, computer readable medium and electronic device
CN114048234A (en) * 2021-10-19 2022-02-15 车主邦(北京)科技有限公司 Data processing method and device, electronic equipment and storage medium
CN113986921A (en) * 2021-10-27 2022-01-28 中国工商银行股份有限公司 Blacklist query method, system, electronic equipment and storage medium
CN114398381A (en) * 2021-12-22 2022-04-26 北京京东拓先科技有限公司 Diagnosis and treatment data processing method and device
CN114706890A (en) * 2022-04-11 2022-07-05 曙光网络科技有限公司 Multi-stage data query method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115913646B (en) 2024-06-04

Similar Documents

Publication Publication Date Title
CN111580884B (en) Configuration updating method, device, server and electronic equipment
CN107633016B (en) Data processing method and device and electronic equipment
CN111563216B (en) Local data caching method and device and related equipment
CN108491715B (en) Terminal fingerprint database generation method and device and server
CN108959384B (en) Webpage data acquisition method and device, computer equipment and storage medium
CN111159233B (en) Distributed caching method, system, computer equipment and storage medium
WO2020037753A1 (en) Log printing method and system, server
CN111104594A (en) Market quotation pushing method and device
CN110674427B (en) Method, device, equipment and storage medium for responding to webpage access request
CN108111346B (en) Method and device for determining frequent item set in alarm correlation analysis and storage medium
CN111628878A (en) Fault positioning method, device and system based on multi-stage network nodes
CN110784482B (en) Message storage method and device of industrial audit system
CN106959975B (en) Transcoding resource cache processing method, device and equipment
CN110503504B (en) Information identification method, device and equipment of network product
CN115913646A (en) Method and device for intercepting blacklist object, electronic equipment and storage medium
CN111399890A (en) Game hot updating method, device and system and electronic equipment
CN108733828B (en) Method and device for extracting company name and computer readable medium
CN114422576B (en) Session cleaning method and device, computer equipment and readable storage medium
CN110061864B (en) Method and system for automatically verifying domain name configuration
CN113411364B (en) Resource acquisition method and device and server
CN114172980A (en) Method, system, device, equipment and medium for identifying type of operating system
CN114816219A (en) Data writing and reading method and device and data reading and writing system
CN112328922A (en) Processing method and device
CN112333206A (en) Safety test method and device and electronic equipment
CN112000618A (en) File change management method, device, equipment and storage medium for cluster nodes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant