Background technology
Cookies is when the user browses web sites, and is placed the text on the memory device of terminal equipment by the webserver, the webpage that its recording user was browsed, the time of stop, the information such as list of filling in.Cookies can allow the webserver that partial data is stored into the memory device of terminal equipment, or obtains a kind of technology of data from the memory device of terminal equipment.When the user visited this website once more, user related information was learnt by obtaining Cookies in the website, just can make corresponding action, as show welcome sign at the page, perhaps allowed the user need not input the just directly login etc. of ID, password.In essence, it can be regarded as user's identity card.
CPC (Cost Per Click pays per click) advertisement is thrown on network by advertisement publishers, for end-user access.The terminal use clicks picture or the literal that contains the advertising address link on the page, with ad content, comprise that picture, text or audio frequency, video information download to local and demonstration, just realized visit to advertisement, sometimes also download the code of some programs simultaneously, as the javascript code, realize the data interaction between human-computer dialogue and terminal equipment and the server.And advertisement publishers wish that each click all is that its targeted customer brings, rather than from the click of carrying out just to the earning advertising expenditure.The latter utilizes software or additive method to realize repeatedly automatically clicking often, and the advertising expenditure that this visit make to be thrown in has no way of obtaining expected effect, belongs to ineffective access from advertisement publishers' angle.
In sum, Cookies can be regarded as user's identity card, as the user who lands by cookies, it is effective that this user described advertisement of point in the certain hour scope is only calculated once, can prevent repeatedly that like this user clicks or pass through the behavior of plug-in unit automatically clicking.But deleted as Cookie, when using software or manually deleting Cookies, prevent that the method for repeatedly clicking is just powerless.
For the click that the terminal equipment from same IP address produces same advertisement, only calculation is once effective in the certain hour scope, and Cookie is deleted in this way even make, and also can judge the ineffective access of the terminal equipment of same IP address.But still exist certain methods can when clicking advertisement, constantly revise the IP address, after each modification IP address, click advertisement and still can be considered to effective.In addition, in some local area network (LAN), the shared same IP of a plurality of users address if only calculation is once effective in the certain hour scope, certainly will have repeatedly to click to be considered to invalid, and this is irrational.
Except visit CPC advertisement, for the access to netwoks of other types, for example various forms of ballots, and regulation will browse the network courses etc. of the named web page of sufficient amount all exist and judge whether effective problem of access to netwoks.For ballot, if stipulate that each user can only vote 1 time, then the 2nd time and later ballot promptly are considered to invalid.And for example for network courses, if the student browses the webpage of course by using certain automatic mode, just do not reach the effect of study, it is invalid that this automatic browsing mode should be considered to equally.But because there are all deficiencies in prior art, therefore need a kind of method, in the statistic processes of visit capacity, can judge whether visit effective, thus can prevent from this basis again to adopt continuous modification terminal device IP address disguise oneself as a plurality of terminal equipments to the consolidated network target automatically repeatedly visit or deletion Cookie to the repeatedly ineffective access behavior of means such as click automatically of consolidated network target.
Summary of the invention
For solving all weak points of the scheme existence of judging network objectives visit validity in the above-mentioned prior art, the embodiment of the invention provides following technical scheme:
A kind of method of judging validity of network access comprises:
When terminal equipment accesses network target, provide the server of network objectives to obtain the characteristic value of described terminal equipment;
Described server according to described corresponding relation and access consideration, judges whether described terminal equipment is effective to the visit of described network objectives according to the corresponding relation and the access consideration of the described characteristic value foundation of obtaining with described network objectives.
A kind of system of judging validity of network access comprises terminal equipment and the server that network objectives is provided, wherein,
Described terminal equipment, be used to visit described network objectives and with described server communication;
Described server is used for:
When described terminal equipment is visited described network objectives, obtain the characteristic value of described terminal equipment,
According to corresponding relation and the access consideration of the described characteristic value foundation of obtaining with described network objectives,
According to described corresponding relation and access consideration, judge whether described terminal equipment is effective to the visit of described network objectives.
A kind of server of judging validity of network access is used to provide the network order to show and judges the validity of terminal equipment to the network objectives visit, and comprise the characteristic value acquisition module, set up module and judge module, wherein,
Described characteristic value acquisition module is used to obtain the characteristic value of described terminal equipment,
The described module of setting up is used for according to corresponding relation and the access consideration of the described characteristic value foundation of obtaining with described network objectives,
Described judge module is used for according to described corresponding relation and access consideration, judges whether described terminal equipment is effective to the visit of described network objectives.
Because the terminal equipment characteristic value is intrinsic by terminal equipment, it is unique corresponding with terminal equipment, and be difficult for making amendment,, can the combined with access condition judge better whether the accesses network target is effective so the use characteristic value is distinguished each terminal equipment by software or other means.
Embodiment
The embodiment of the invention provides a kind of methods, devices and systems of judging validity of network access, when terminal equipment accesses network target, provides the server of network objectives to obtain the characteristic value of terminal equipment; Server according to corresponding relation and access consideration, judges whether terminal equipment is effective to the visit of network objectives according to the corresponding relation and the access consideration of the characteristic value foundation of obtaining with network objectives.
The terminal equipment characteristic value is a sign terminal equipment itself, is different from the number that can not change of other-end equipment, and it is unique corresponding with terminal equipment.It includes but not limited to: terminal equipment manufacturer is to the coding of terminal equipment, for example gives the coding of terminal equipment according to the time of making the product or the sequence number of dispatching from the factory; The identification code of various hardware in the terminal equipment is as hard disk sequence number, network interface card MAC (medium access control) address; The registration code of the various softwares of terminal equipment is as the operating system registration code; By some numerical computation method, as Hash (Hash) algorithm, but according in the above-mentioned characteristic value one or several calculate not by the numerical value of inverse operation.The terminal equipment characteristic value can be obtained or be calculated by networking client software, running client software on terminal equipment, according to the manufacturer of the instruction reading terminal equipment of program among the registration code three of the identification code of the coding of terminal equipment, various hardware and the various softwares of terminal equipment one or more, also can be as required, among the above-mentioned three one or more are carried out numerical computations or directly connect as the terminal equipment characteristic value.
The ident value of network objectives is unique corresponding with network objectives, and for example the address of network objectives or server are given title, sequence number of network objectives etc.
A kind of method that the embodiment of the invention provides is judged the validity of terminal equipment to the network objectives visit.As shown in Figure 1, the method flow that provides of the embodiment of the invention is as follows:
Step 11: terminal equipment accesses network target provides the server of network objectives to send client-side program to terminal equipment;
Step 12: the terminal equipment running client program, thus its characteristic value is sent to server;
Step 13: server is according to the characteristic value of terminal equipment, and the corresponding relation and the access consideration of foundation and described network objectives according to this corresponding relation and access consideration, judge whether terminal equipment is effective to the visit of this network objectives;
Step 14: whether server is effective to the visit of this network objectives according to terminal equipment, sends announcement information to terminal equipment.
In step 11, it can be after terminal equipment accesses network target to terminal equipment transmission client-side program that the server of network objectives is provided, also can be before, for example the user clicks after the web advertisement, provides the server of the web advertisement to send client-side program to terminal equipment; And for example terminal equipment is opened the homepage of network courses, before each chapters and sections of visit course, provides the server of network courses to send client-side program to terminal equipment.In addition, terminal equipment can also directly be sent to server with its characteristic value.
In step 12, terminal equipment obtains visit information and comprises the characteristic value of terminal equipment, the ident value of network objectives, can also comprise the time of terminal equipment accesses network target.
Access consideration in step 13 is the time that described terminal equipment is visited described network objectives, when the each accesses network target of terminal equipment, because the ident value of terminal equipment characteristic value and network objectives is unique corresponding with terminal equipment and network objectives respectively, so server can be determined the terminal equipment of accesses network target according to the ident value of terminal equipment characteristic value and network objectives, determine that promptly the visit that takes place is that this terminal equipment is visited this network objectives, rather than this network objectives of other-end device access, judge then whether this visit is effective.Dissimilar according to network objectives also have some kinds of determination methods.
For example, after server is received the visit information that terminal equipment sends, judge terminal equipment to the access times of network objectives whether greater than setting numerical value, if, judge that then this accesses network target of terminal equipment is invalid, otherwise then judge this accesses network target effective of terminal equipment.If restriction is to the access times of certain web advertisement, or certain network voting number of times, just can make in this way.
And for example, whether the preceding time interval of visiting this network objectives 1 time of server statistics this accesses network target of terminal equipment and terminal equipment less than set point, if, then judge terminal equipment this to visit this network objectives invalid, if not, then judge terminal equipment this to visit this network objectives effective.This method can be used for limiting the frequent access to the web advertisement or network courses or other network objectives.And for example, server statistics at terminal equipment this visit this network objectives in the residing time period to the access times of this network objectives whether greater than set point, if, then judge terminal equipment this to visit this network objectives invalid, otherwise then judge terminal equipment this to visit this network objectives effective.This method can be used for limiting to the visit total amount of network objectives in the setting-up time section.
After server judges terminal equipment accesses network goal effectiveness, can return announcement information to terminal equipment according to the Different Results of judging.For example in network voting, the user launches ballot paper by terminal equipment, and server then sends announcement information to terminal equipment if judge that the user votes effectively, terminal equipment is shown " vote successfully! " printed words; Otherwise then make terminal equipment show " you had thrown ticket ".
Based on above-mentioned method, the embodiment of the invention provides corresponding device thereof and system.As shown in Figure 2, the system of the judgement validity of network access that provides of the embodiment of the invention comprises server and terminal equipment.Terminal equipment is used for accesses network target and and server communication.Server is used for when described terminal equipment is visited described network objectives, obtain the characteristic value of described terminal equipment, according to corresponding relation and the access consideration of the described characteristic value foundation of obtaining with described network objectives, according to described corresponding relation and access consideration, judge whether described terminal equipment is effective to the visit of described network objectives.
Fig. 3 has provided a kind of concrete structure of the system among Fig. 2, comprises server 31 and terminal equipment 32.A kind of internal structure of server 31 and terminal equipment 32, wherein server 31 comprises client-side program sending module, characteristic value receiver module, sets up module 311 and judge module 312, and terminal equipment 32 comprises client-side program receiver module and characteristic value sending module.
In server 31, the client-side program sending module is used for sending client-side program to terminal equipment 32; The characteristic value receiver module is used for the characteristic value of receiving terminal apparatus 32; Setting up module 311 is used for according to the characteristic value foundation of the terminal equipment 32 that obtains and the corresponding relation and the access consideration of network objectives; Judge module 312 is used for according to this corresponding relation and access consideration, judges whether the visit of 32 pairs of network objectives of terminal equipment is effective.
In terminal equipment 32, the client-side program receiver module is used for the client-side program that reception server 31 sends; The characteristic value sending module is used for sending to server 31 characteristic value of terminal equipment 32.
Fig. 4 has provided the another kind of concrete structure of the system among Fig. 2, comprises server 41 and terminal equipment 42.Server 41 comprises receiver module, sets up module 411 and judge module 412, and terminal equipment comprises sending module.
In server 41, receiver module is used for the characteristic value of receiving terminal apparatus 42; Setting up module 411 is used for according to the characteristic value foundation of the terminal equipment 42 that obtains and the corresponding relation and the access consideration of network objectives; Judge module 412 is used for according to corresponding relation and access consideration, judges whether the visit of 42 pairs of network objectives of terminal equipment is effective.Sending module in the terminal equipment 42 is used for sending to server 41 characteristic value of terminal equipment 42.
Server 41 among server among Fig. 3 31 and Fig. 4 can further include announcement information generation module and announcement information sending module in addition, with being shown among Fig. 3 and Fig. 4.Announcement information generation module 313 is used for generating announcement information according to the judged result of judge module 312, and announcement information sending module 314 is used for sending announcement information to terminal equipment 32.Announcement information generation module 413 is used for generating announcement information according to the judged result of judge module 412, and announcement information sending module 414 is used for sending announcement information to terminal equipment 42.
Because the terminal equipment characteristic value is intrinsic by terminal equipment, it is unique corresponding with terminal equipment, and be difficult for making amendment by software or other means, distinguish each terminal equipment so utilize the terminal equipment characteristic value, can count effective visit, thus can prevent from again to adopt continuous modification terminal device IP address disguise oneself as a plurality of terminal equipments to the consolidated network target automatically repeatedly visit or deletion Cookies to the repeatedly ineffective access behavior of means such as click automatically of consolidated network target.The method of using the embodiment of the invention to provide can be judged the validity of terminal equipment to the network objectives visit effectively.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.