CN101079042A - System and method for quickly inquiring about black and white name list - Google Patents
System and method for quickly inquiring about black and white name list Download PDFInfo
- Publication number
- CN101079042A CN101079042A CN 200610064555 CN200610064555A CN101079042A CN 101079042 A CN101079042 A CN 101079042A CN 200610064555 CN200610064555 CN 200610064555 CN 200610064555 A CN200610064555 A CN 200610064555A CN 101079042 A CN101079042 A CN 101079042A
- Authority
- CN
- China
- Prior art keywords
- key word
- black
- tested
- array
- split
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a system of quickly inquiring black-and-white list, which comprises the following parts: an inquiring unit for inquiring the exist of the detecting keyword in the black-and-white list, a digit group creating unit for creating the digit group according to the calculated value after calculating all the key words separately in the black-and-white list, a digit group saving unit for saving the digit group created by the digit group creating unit, a matching unit for comparing the calculating value of the detecting key word to the digit group in the digit group saving unit after calculating the detecting key word and making inquiring unit inquire the exist of the detecting key word in the black-and-white list when the calculating value of the detecting key word matches to the digit group. The invention also provides a corresponding method. The invention reduces the access of the black-and-white list in the data base in the inquiring process, which decides the black-and-white list state of the detecting key word quickly.
Description
Technical field
The present invention relates to field of computer technology, more particularly, relate to a kind of system and method for quickly inquiring about black and white name list.
Background technology
Black and white lists is to be used to write down the tables of data whether some content can be passed through, and the item in white list is the item that can pass through, and the item in blacklist is the item that needs prevention.Usually when specific implementation, black and white lists is recorded in same the tables of data, and represent that with an attribute field (flag) this still is item in the white list (such as flag=0 is item in the blacklist, and flag=1 is the item in the white list) for the item in the blacklist.
For example filter for the network address in the web page browsing, i.e. the key word (KEY) of URL as database used in url filtering usually, and the service marking field is distinguished black and white lists.In network address was filtered, black and white lists generally needed classification of support region name and asterisk wildcard (*).
As shown in Figure 1, network address is filtered typical filter method and is:
At first do complete trails URL (for example http://a.b.c.d/dir/file.html) test,, stop visit from database this URL if the flag=0 that inquires about then represents this URL at blacklist; If flag=1 represents that then this URL at white list, directly passes through the visit of this URL.
If this URL no record then test this domain name (http://a.b.c.d) again in database if inquire flag=0 from database, then stops the visit to URL; If flag=1 then directly passes through the visit of URL.
If domain name (http://a.b.c.d) also no record in database, (http: test // * .b.c.d) if inquire about the flag=0 that obtains from database, then stops the visit to URL then to begin to do asterisk wildcard; If flag=1 then directly passes through for the visit of URL.If in database, there is not record, then continue to split domain name do asterisk wildcard (http: test // * .c.d), if also not in database then continue to split and do the asterisk wildcard test, up to remaining afterbody only.If also not in black and white lists, then according to predetermined filtering policy, determine whether to stop the visit to URL this moment.
Above-mentioned direct Query Database is realized the method for black and white lists, and every test once all will be inquired about one time database.Because in actual applications, seldom complete trails URL is write in the black and white lists, under extreme case, for example support domain name to do the two-stage asterisk wildcard and replace, need inquiry 4 secondary data storehouses (a complete trails URL, a universe name, one time the one-level asterisk is replaced, and one time the secondary asterisk is replaced).And frequent data base querying will cause the significant wastage to computer resource.
If the black and white lists item all is cached in the internal memory, certainly will take more internal memory, be not suitable for the bigger situation of black and white lists.
Summary of the invention
The technical problem to be solved in the present invention is, at taking more resource and the lower problem of efficient in the above-mentioned black and white lists inquiry, provides a kind of system and method for quickly inquiring about black and white name list.
The technical scheme that the present invention solves the problems of the technologies described above is, a kind of system of quickly inquiring about black and white name list is provided, and comprises being used for the query unit whether inquiring about black and white name list comprises key word to be detected, also comprises:
The array creating unit is used for all key words of black and white lists are done respectively to generate array according to operation values after the computing;
The storage of array unit is used to store the array that described array creating unit is created;
Matching unit, be used for key word to be tested is done after the computing operation values of described key word to be tested and the array of described storage of array unit are compared, and when the operation values of key word to be tested and described array coupling, make whether there is key word to be tested in the query unit inquiring about black and white name list.
In the system of a kind of quickly inquiring about black and white name list of the present invention, described array creating unit further comprises:
The array generation unit is used to generate array, and each of the array of described generation all is 0;
First arithmetic element is used for successively computing being done in each key word of black and white lists;
First split cells is used for a plurality of bytes of described computing gained operation values are split as many group numerical value;
The array maintenance unit is used for that described array and described first split cells are split the corresponding position of many groups numerical value that obtains and is set to 1 respectively.
In the system of a kind of quickly inquiring about black and white name list of the present invention, described matching unit further comprises:
Second arithmetic element is used for computing done in key word to be tested;
Second split cells is used for a plurality of bytes of key word operation values to be tested are split as many group numerical value;
Comparing unit, inquire about respectively and judge in the described array whether the position corresponding with splitting many groups numerical value that key word operation values to be tested obtains is 1, if the position of all correspondences all is 1 in the described array, then determine the operation values and the described array coupling of key word to be tested, make whether there is key word to be tested in the query unit inquiring about black and white name list.
In the system of a kind of quickly inquiring about black and white name list of the present invention, also comprise the key word split cells, be used for judging and comprise 0 and key to be tested when detachable in the corresponding position of array at described comparing unit, perhaps confirm that in query unit described key word to be tested is not present in the black and white lists and key to be tested when detachable, split described key word to be tested, and key word to be tested and array after described matching unit will be split are mated.
In the system of a kind of quickly inquiring about black and white name list of the present invention, described array creating unit and matching unit are Hash operation to key word institute do computing, described operation values is a cryptographic hash, and the quantity of the array meta that described array generation unit generates is not less than 2 times of key word quantity in the black and white lists.
The present invention also provides a kind of method of quickly inquiring about black and white name list, may further comprise the steps:
(a) all key words in the black and white lists are done respectively generate array according to operation values after the computing;
(b) computing done in key word to be tested, and the operation values and the described array of described key word to be tested are compared, if the operation values of key word to be tested mates with described array, execution in step (c) then;
(c) inquiring about black and white name list, and judge whether described key word to be tested is present in the black and white lists, be present in the black and white lists as if described key word to be tested, then execution in step (d);
(d) according to the black and white lists strategy initial key word is operated.
In the method for a kind of quickly inquiring about black and white name list of the present invention, described step (a) further comprises:
(a1) generate array, and all positions in this array are set to 0;
(a2) successively computing done in each key word in the black and white lists;
(a3) a plurality of bytes of each operation values that will obtain are divided into many group numerical value;
(a4) position corresponding with many class values in the step (a3) in the described array is set to 1 respectively.
Described step (b) further comprises:
(b1) computing done in key word to be tested;
(b2) a plurality of bytes with the operation values of key word to be tested are divided into many group numerical value;
(b3) inquire about respectively and judge whether corresponding with many class values in the step (b2) position is 1 in the described array,, determine that then the operation values of key word to be tested and described array mate execution in step (c) if the position of all correspondences all is 1 in the described array.
In the method for a kind of quickly inquiring about black and white name list of the present invention, described step (b3) further comprises:
(b31) if comprise 0 in the corresponding position in the described array, judge then whether described key to be tested can split, if can split, execution in step (b32) then; Otherwise determine initial key word to be tested not in black and white lists, and execution in step (d);
(b32) split described key word to be tested, and the key word that will split acquisition returns step (b1) as key word to be tested.
In the method for a kind of quickly inquiring about black and white name list of the present invention, computing in described step (a) and the step (b) is a Hash operation, described operation values is a cryptographic hash, array size in the described step (a1) is the 8K byte, in described step (a3) and the described step (b2), per two bytes of described cryptographic hash are formed one group, and being divided into is 8 groups.
In the method for a kind of quickly inquiring about black and white name list of the present invention, further comprise in the described step (c):
(c1) if described key word to be tested is not present in the black and white lists, judge whether described key to be tested can split, if can split, execution in step (c2) then; Otherwise determine initial key word to be tested not in black and white lists, and execution in step (d);
(c2) split described key word to be tested, and the key word that will split acquisition returns step (b) as key word to be tested.
The system and method for a kind of quickly inquiring about black and white name list of the present invention, inquiring about black and white name list again after the operation values comparison by key word to be tested, reduced in the query script the visit of black and white lists in the database, realized the black and white lists state of quick judgement key word to be tested.The present invention is preferable for the inquiry of the black and white lists under classification asterisk wildcard effect, and only takies a small amount of internal memory.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is the schematic flow sheet of existing inquiring about black and white name list;
Fig. 2 is the structural representation of the system embodiment of a kind of quickly inquiring about black and white name list of the present invention;
Fig. 3 is the structural representation of array creating unit among Fig. 2;
Fig. 4 is the structural representation of matching unit among Fig. 2;
Fig. 5 is the process flow diagram of the method embodiment of a kind of quickly inquiring about black and white name list of the present invention;
Fig. 6 is a process flow diagram of creating array among Fig. 5;
Fig. 7 judges among Fig. 5 whether cryptographic hash mates the process flow diagram of array.
Embodiment
The present invention is by each key word in the number group record black and white lists (comprising complete URL, domain name and the situation of being replaced by asterisk), and filters out not situation at the black and white lists table by this array, thereby in the too much visit of skin shielding to database.
As shown in Figure 2, be the structural representation of the system embodiment of a kind of quickly inquiring about black and white name list of the present invention.This system comprises array creating unit 21, storage of array unit 22, matching unit 23, query unit 24, black and white lists storage unit 25 and performance element 26.
Black and white lists storage unit 25 is used to store black and white lists.Keyword root in this black and white lists generates according to the content that the user adds, and comprises domain name after complete URL, domain name, asterisk wildcard are replaced etc.Whether the black and white lists that query unit 24 is used for inquiring about black and white name list storage unit 25 comprises key word to be detected.Performance element 26 is used for carrying out associative operation according to the Query Result of query unit 24, for example inquires key word to be detected in blacklist the time in query unit 24, stops the visit to this key word; Inquire key word to be detected in white list the time in query unit 24, directly by visit to this key word; When query unit 24 inquiries do not inquire key word to be detected in black and white lists, according to the predetermined policy prevention or by visit to this key word.Implementation in above-mentioned black and white lists storage unit 25, query unit 24 and performance element 26 and the existing black and white lists scheme is similar.
Array creating unit 21 is used for Hash operation made respectively in all key words of black and white lists, and generates array according to cryptographic hash.In the present embodiment, adopt the high-quality hash function: the MD5 function is 16 bytes through the cryptographic hash after the Hash operation.Certainly, when specific implementation, also can adopt other hash function.
Storage of array unit 22 is used to store the array that array creating unit 21 is created.This storage of array unit 22 is positioned at internal memory, thereby can realize fast access.Certainly, after array creating unit 21 is created array, can be stored in hard disk earlier, when carrying out the black and white lists inquiry, again array be imported storage of array unit 22.
After matching unit 23 is used for key word to be tested made Hash operation, key word cryptographic hash that this is to be tested and the array in the storage of array unit 22 are compared, and when the cryptographic hash of key word to be tested and array coupling, make whether there is this key word to be tested in query unit 24 inquiring about black and white name list.
Certainly, when specific implementation, be not limited to cryptographic hash, also can store by modes such as tabulations by key word correspondence in the storage of array black and white lists.
As shown in Figure 3, in the present embodiment, array creating unit 21 further comprises array generation unit 214, the first Hash operation unit 211, first split cells 212 and array maintenance unit 213.
The first Hash operation unit 211 is used for successively Hash operation being made in each key word of black and white lists.In the present embodiment, the first Hash operation unit 211 adopts the MD5 function, and the cryptographic hash of each key word after Hash operation is 16 bytes.
First split cells 212 is used for a plurality of bytes of computing gained cryptographic hash are split as many group numerical value.In the present embodiment, per two bytes are one group in the cryptographic hash of first split cells 212 with 16 bytes, split into 8 groups of numerical value altogether.Every group of numerical value is totally 16 of two bytes, with the size of array to corresponding.
As shown in Figure 4, in the present embodiment, matching unit 23 further comprises the second Hash operation unit 231, second split cells 232 and comparing unit 233.
The second Hash operation unit 231 is used for Hash operation made in key word to be tested.Equally, the second Hash operation unit 231 adopts the MD5 function, and the cryptographic hash of each key word after Hash operation is 16 bytes.
Comparing unit 233 is used for inquiring about respectively and judges whether the array position corresponding with 8 groups of numerical value that split key word cryptographic hash acquisition to be tested is 1, if 8 of all correspondences all is 1 in the array, then determine the cryptographic hash and the array coupling of key word to be tested, make in query unit 24 inquiring about black and white name list whether have key word to be tested.
Certainly, above-mentioned array size is not limited to 8K, and the group number that each cryptographic hash is divided into can be different in concrete the application.There is the situation of false positive (be the cryptographic hash of key word to be tested and array coupling and do not have this key word in black and white lists) in above-mentioned array, and when the array intermediate value is 1 position when too many, false-positive probability can be very high.In order to reach best black and white lists inquiry, the quantity of array meta should be not less than 2 times of quantity of key word in the black and white lists.False-positive in addition probability is also relevant with the group number that cryptographic hash is divided into, and probability is more little more at most for the group number.By statistics, when the array intermediate value is 0 and 1 a ratio when being 1: 1, false positive probability and the group number (k) that is divided into satisfy following relationship substantially:
False positive percent=N
k, wherein N is the saturation degree of array, promptly the array intermediate value is that 1 position accounts for the ratio of total bit in the array, for example when the array intermediate value be 0 and 1 ratio when being 1: 1, the array saturation degree is 50%.K is the group number that cryptographic hash is divided into.
In the another one embodiment of the system of a kind of quickly inquiring about black and white name list of the present invention, also comprise the key word split cells, be used for judging and comprise 0 and key to be tested when detachable in the corresponding position of arrays at comparing unit 233, perhaps confirm that in query unit 24 described key word to be tested is not present in the black and white lists and key to be tested when detachable, split key word to be tested (for example be split as domain name or have domain name of asterisk wildcard etc.), and key word to be tested and array after matching unit 23 will be split are compared.
As shown in Figure 5, be the process flow diagram of the method embodiment of a kind of quickly inquiring about black and white name list of the present invention, it specifically may further comprise the steps:
Step S51: all key words in the black and white lists are done respectively to generate array according to cryptographic hash after the Hash operation.In the present embodiment, adopting the MD5 function to carry out Hash operation, is 16 bytes through the cryptographic hash after the Hash operation.
Step S52: Hash operation made in key word to be tested.
Step S53: the cryptographic hash and the array of described key word to be tested are compared, if the cryptographic hash of key word to be tested mates with described array, execution in step S55 then; Otherwise execution in step S54.
Step S54: judge further whether key word to be tested is detachable.If this key word to be tested is detachable, then execution in step S57; Otherwise execution in step S56.
Step S55: inquiring about black and white name list, and judge whether described key word to be tested is present in the black and white lists.Be present in the black and white lists as if described key word to be tested, then execution in step S56; If key word to be tested is not present in the black and white lists, then further judge whether key to be tested can split, as if splitting, execution in step S57 then; Otherwise determine initial key word to be tested not in black and white lists, and execution in step S56.
Step S56: the initial key word is operated according to the black and white lists strategy.
Step S57: split key word to be tested, and execution in step S52.For example complete URL is split as domain name or comprises the URL of asterisk wildcard.
As shown in Figure 6, the step S51 among above-mentioned Fig. 5 further comprises:
Step S61: generate array, and all positions in this array are set to 0.
Step S62: successively Hash operation made in each key word in the black and white lists.
Step S63: a plurality of bytes of each cryptographic hash that will obtain are divided into many group numerical value.
Step S64: position corresponding with many class values among the step S63 in the described array is set to 1 respectively.
As shown in Figure 7, the step S53 among Fig. 5 further comprises:
Step S71: Hash operation made in key word to be tested.
Step S72: a plurality of bytes of the cryptographic hash of key word to be tested are divided into many group numerical value.
Step S73: inquire about respectively and judge whether corresponding with many class values among step S72 position is 1 in the described array.If the position of all correspondences all is 1 in the array, then determine the cryptographic hash and the described array coupling of key word to be tested, execution in step S55; If comprise 0 in the position of correspondence in the array, judge then whether key word to be tested can split, if can split, then split key word to be tested, and the key word that will split acquisition returns step S71 as key word to be tested; Otherwise determine initial key word to be tested not in black and white lists, and execution in step S56.
Certainly, the present invention is not limited to the hash algorithm of the foregoing description, any algorithm that the random length binary value can be mapped as the less binary value of regular length all can replace above-mentioned hash algorithm, and realize technique effect of the present invention, for example Chang Yong encryption algorithm or expressly (ASCII, Unicode etc.) conversion etc.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of claim.
Claims (10)
1, a kind of system of quickly inquiring about black and white name list comprises being used for the query unit whether inquiring about black and white name list comprises key word to be detected, it is characterized in that, also comprises:
The array creating unit is used for all key words of black and white lists are done respectively to generate array according to operation values after the computing;
The storage of array unit is used to store the array that described array creating unit is created;
Matching unit, be used for key word to be tested is done after the computing operation values of described key word to be tested and the array of described storage of array unit are compared, and when the operation values of key word to be tested and described array coupling, make whether there is key word to be tested in the query unit inquiring about black and white name list.
2, the system of a kind of quickly inquiring about black and white name list according to claim 1 is characterized in that, described array creating unit further comprises:
The array generation unit is used to generate array, and each of the array of described generation all is 0;
First arithmetic element is used for successively computing being done in each key word of black and white lists;
First split cells is used for a plurality of bytes of described computing gained operation values are split as many group numerical value;
The array maintenance unit is used for that described array and described first split cells are split the corresponding position of many groups numerical value that obtains and is set to 1 respectively.
3, the system of a kind of quickly inquiring about black and white name list according to claim 2 is characterized in that, described matching unit further comprises:
Second arithmetic element is used for computing done in key word to be tested;
Second split cells is used for a plurality of bytes of key word operation values to be tested are split as many group numerical value;
Comparing unit, inquire about respectively and judge in the described array whether the position corresponding with splitting many groups numerical value that key word operation values to be tested obtains is 1, if the position of all correspondences all is 1 in the described array, then determine the operation values and the described array coupling of key word to be tested, make whether there is key word to be tested in the query unit inquiring about black and white name list.
4, the system of a kind of quickly inquiring about black and white name list according to claim 3, it is characterized in that, also comprise the key word split cells, be used for judging and comprise 0 and key to be tested when detachable in the corresponding position of array at described comparing unit, perhaps confirm that in query unit described key word to be tested is not present in the black and white lists and key to be tested when detachable, split described key word to be tested, and key word to be tested and array after described matching unit will be split are mated.
5, the system of a kind of quickly inquiring about black and white name list according to claim 3, it is characterized in that, described array creating unit and matching unit are Hash operation to key word institute do computing, described operation values is a cryptographic hash, and the quantity of the array meta that described array generation unit generates is not less than 2 times of key word quantity in the black and white lists.
6, a kind of method of quickly inquiring about black and white name list is characterized in that, may further comprise the steps:
(a) all key words in the black and white lists are done respectively generate array according to operation values after the computing;
(b) computing done in key word to be tested, and the operation values and the described array of described key word to be tested are compared, if the operation values of key word to be tested mates with described array, execution in step (c) then;
(c) inquiring about black and white name list, and judge whether described key word to be tested is present in the black and white lists, be present in the black and white lists as if described key word to be tested, then execution in step (d);
(d) according to the black and white lists strategy initial key word is operated.
7, the method for a kind of quickly inquiring about black and white name list according to claim 6 is characterized in that, described step (a) further comprises:
(a1) generate array, and all positions in this array are set to 0;
(a2) successively computing done in each key word in the black and white lists;
(a3) a plurality of bytes of each operation values that will obtain are divided into many group numerical value;
(a4) position corresponding with many class values in the step (a3) in the described array is set to 1 respectively.
Described step (b) further comprises:
(b1) computing done in key word to be tested;
(b2) a plurality of bytes with the operation values of key word to be tested are divided into many group numerical value;
(b3) inquire about respectively and judge whether corresponding with many class values in the step (b2) position is 1 in the described array,, determine that then the operation values of key word to be tested and described array mate execution in step (c) if the position of all correspondences all is 1 in the described array.
8, the method for a kind of quickly inquiring about black and white name list according to claim 7 is characterized in that, described step (b3) further comprises:
(b31) if comprise 0 in the corresponding position in the described array, judge then whether described key to be tested can split, if can split, execution in step (b32) then; Otherwise determine initial key word to be tested not in black and white lists, and execution in step (d);
(b32) split described key word to be tested, and the key word that will split acquisition returns step (b1) as key word to be tested.
9, according to the method for claim 6 or 7 described a kind of quickly inquiring about black and white name list, it is characterized in that, computing in described step (a) and the step (b) is a Hash operation, described operation values is a cryptographic hash, array size in the described step (a1) is the 8K byte, in described step (a3) and the described step (b2), per two bytes of described cryptographic hash are formed one group, and being divided into is 8 groups.
10, the method for a kind of quickly inquiring about black and white name list according to claim 6 is characterized in that, further comprises in the described step (c):
(c1) if described key word to be tested is not present in the black and white lists, judge whether described key to be tested can split, if can split, execution in step (c2) then; Otherwise determine initial key word to be tested not in black and white lists, and execution in step (d);
(c2) split described key word to be tested, and the key word that will split acquisition returns step (b) as key word to be tested.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100645558A CN100489853C (en) | 2006-12-28 | 2006-12-28 | System and method for quickly inquiring about black and white name list |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100645558A CN100489853C (en) | 2006-12-28 | 2006-12-28 | System and method for quickly inquiring about black and white name list |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101079042A true CN101079042A (en) | 2007-11-28 |
CN100489853C CN100489853C (en) | 2009-05-20 |
Family
ID=38906521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100645558A Active CN100489853C (en) | 2006-12-28 | 2006-12-28 | System and method for quickly inquiring about black and white name list |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100489853C (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102216936A (en) * | 2008-06-27 | 2011-10-12 | 微软公司 | Lyons matthew g [us]; ramig randal j [us]; dhawan anil |
CN102647408A (en) * | 2012-02-27 | 2012-08-22 | 珠海市君天电子科技有限公司 | Method for judging phishing website based on content analysis |
CN102682037A (en) * | 2011-03-18 | 2012-09-19 | 阿里巴巴集团控股有限公司 | Data acquisition method, system and device |
CN102902701A (en) * | 2012-06-01 | 2013-01-30 | 珠海市君天电子科技有限公司 | Information inquiry system and information inquiry method |
WO2014079257A1 (en) * | 2012-11-20 | 2014-05-30 | Gao Jianqing | Exclusion of limited items on the basis of partial hash value |
CN103853979A (en) * | 2010-12-31 | 2014-06-11 | 北京奇虎科技有限公司 | Program identification method and device based on machine learning |
CN105099996A (en) * | 2014-04-30 | 2015-11-25 | 北京奇虎科技有限公司 | Website verification method and device |
CN105323173A (en) * | 2014-07-18 | 2016-02-10 | 中兴通讯股份有限公司 | Network rule entry setting method and device |
CN109977295A (en) * | 2019-04-11 | 2019-07-05 | 北京安护环宇科技有限公司 | A kind of black and white lists matching process and device |
CN112364017A (en) * | 2020-10-28 | 2021-02-12 | 中标慧安信息技术股份有限公司 | Method for filtering black and white lists by utilizing bloom filter |
CN113810395A (en) * | 2021-09-06 | 2021-12-17 | 安天科技集团股份有限公司 | Threat information detection method and device and electronic equipment |
CN115168300A (en) * | 2022-09-05 | 2022-10-11 | 山东正中信息技术股份有限公司 | Portable mobile working method and system based on file system filtering |
CN116482521A (en) * | 2023-06-25 | 2023-07-25 | 江西兆驰半导体有限公司 | Chip testing method and system |
-
2006
- 2006-12-28 CN CNB2006100645558A patent/CN100489853C/en active Active
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102216936A (en) * | 2008-06-27 | 2011-10-12 | 微软公司 | Lyons matthew g [us]; ramig randal j [us]; dhawan anil |
US8640244B2 (en) | 2008-06-27 | 2014-01-28 | Microsoft Corporation | Declared origin policy |
CN103853979A (en) * | 2010-12-31 | 2014-06-11 | 北京奇虎科技有限公司 | Program identification method and device based on machine learning |
CN102682037A (en) * | 2011-03-18 | 2012-09-19 | 阿里巴巴集团控股有限公司 | Data acquisition method, system and device |
CN102682037B (en) * | 2011-03-18 | 2016-09-28 | 阿里巴巴集团控股有限公司 | A kind of data capture method, system and device |
CN102647408A (en) * | 2012-02-27 | 2012-08-22 | 珠海市君天电子科技有限公司 | Method for judging phishing website based on content analysis |
CN102902701A (en) * | 2012-06-01 | 2013-01-30 | 珠海市君天电子科技有限公司 | Information inquiry system and information inquiry method |
WO2014079257A1 (en) * | 2012-11-20 | 2014-05-30 | Gao Jianqing | Exclusion of limited items on the basis of partial hash value |
CN105099996A (en) * | 2014-04-30 | 2015-11-25 | 北京奇虎科技有限公司 | Website verification method and device |
CN105099996B (en) * | 2014-04-30 | 2020-03-06 | 奇安信科技集团股份有限公司 | Website verification method and device |
CN105323173B (en) * | 2014-07-18 | 2019-02-12 | 中兴通讯股份有限公司 | The setting method and device of networking rule entry |
CN105323173A (en) * | 2014-07-18 | 2016-02-10 | 中兴通讯股份有限公司 | Network rule entry setting method and device |
CN109977295A (en) * | 2019-04-11 | 2019-07-05 | 北京安护环宇科技有限公司 | A kind of black and white lists matching process and device |
CN112364017A (en) * | 2020-10-28 | 2021-02-12 | 中标慧安信息技术股份有限公司 | Method for filtering black and white lists by utilizing bloom filter |
CN113810395A (en) * | 2021-09-06 | 2021-12-17 | 安天科技集团股份有限公司 | Threat information detection method and device and electronic equipment |
CN113810395B (en) * | 2021-09-06 | 2023-06-16 | 安天科技集团股份有限公司 | Threat information detection method and device and electronic equipment |
CN115168300A (en) * | 2022-09-05 | 2022-10-11 | 山东正中信息技术股份有限公司 | Portable mobile working method and system based on file system filtering |
CN115168300B (en) * | 2022-09-05 | 2022-12-09 | 山东正中信息技术股份有限公司 | Portable mobile working method and system based on file system filtering |
CN116482521A (en) * | 2023-06-25 | 2023-07-25 | 江西兆驰半导体有限公司 | Chip testing method and system |
CN116482521B (en) * | 2023-06-25 | 2023-10-20 | 江西兆驰半导体有限公司 | Chip testing method and system |
Also Published As
Publication number | Publication date |
---|---|
CN100489853C (en) | 2009-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101079042A (en) | System and method for quickly inquiring about black and white name list | |
CN100339855C (en) | Content management system | |
CN101075241A (en) | Method and system for processing buffer | |
CN1929451A (en) | Method and device for solving Hash collision | |
CN103678293B (en) | Data storage method and device | |
CN100342377C (en) | Method of raising officiency of data processing | |
CN1674004A (en) | System and method for data classification usable for data search | |
CN1359068A (en) | Files management method and storage information reproducing device and storage information recording medium | |
CN101043695A (en) | Method for storing and maintaining user equipment information in mobile communication system | |
CN1472963A (en) | Distributive video interactive system and its data recording and accessing method | |
CN1627298A (en) | Method and structure of describing a user profile to describe user preferences | |
CN1673981A (en) | System for balancing multiple memory buffer sizes and method therefor | |
CN1858747A (en) | Data storage/searching method and system | |
CN1869979A (en) | Buffer store management method | |
CN1831825A (en) | Document management method and apparatus and document search method and apparatus | |
CN1848851A (en) | Computer and method for establishing light weight catalog access data protocol exchange format fragment | |
CN101079048A (en) | Internet information search engine and method based on software robot exclusion standard | |
CN101051309A (en) | Researching system and method used in digital labrary | |
EP2428904B1 (en) | Systems and methods for operating a saturated hash table | |
CN1737799A (en) | Searching method based on classified file BloomFilter structure | |
CN1949221A (en) | Method and system of storing element and method and system of searching element | |
CN101060539A (en) | A method and system integrated with the unified access website address and providing the content of multiple website | |
CN106874370A (en) | A kind of method for quickly retrieving of catalogue file | |
CN1746891A (en) | Information handling | |
CN1252566A (en) | Method and device for access control of direct memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20151230 Address after: The South Road in Guangdong province Shenzhen city Fiyta building 518057 floor 5-10 Nanshan District high tech Zone Patentee after: Shenzhen Tencent Computer System Co., Ltd. Address before: 518057 Guangdong city of Shenzhen province high tech Park high-tech South Road Fiyta high-tech building 5-10 Patentee before: Tencent Technology (Shenzhen) Co., Ltd. |