CN108259441A - It is a kind of to prevent URL from accessing the method and device to detour - Google Patents
It is a kind of to prevent URL from accessing the method and device to detour Download PDFInfo
- Publication number
- CN108259441A CN108259441A CN201611249115.XA CN201611249115A CN108259441A CN 108259441 A CN108259441 A CN 108259441A CN 201611249115 A CN201611249115 A CN 201611249115A CN 108259441 A CN108259441 A CN 108259441A
- Authority
- CN
- China
- Prior art keywords
- url
- accessed
- chain
- access
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of method and device for preventing URL from accessing detour.The method includes S1, and based on road algorithm is stepped on, the URL log informations accessed are analyzed, obtain the complete operation chain that the URL is accessed;S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies whether higher level's operation per single stepping has accessed that URL access is controlled to prevent from detouring.The present invention, into acquisition and analysis, obtains the complete operation chain that the URL to hold water is accessed by the log information that the URL to business operation in application server each in system is accessed;The complete operation chain that the URL to hold water based on each business is accessed, carry out whole process path verification to each business operation flow, to ensure that user can not detour before all pre actions are not completed to subsequent operation, so as to specification operation flow, security of system is improved.
Description
Technical field
The present invention relates to fields of communication technology, prevent URL from accessing the method and device to detour more particularly, to a kind of.
Background technology
At present, in the system (system including being accessed by public network and LAN) controlled based on menu access, system
The access right of different homepages (menu) access rights and subpage frame (submenu) can be distributed according to the difference of user role
Limit.A business operation in system needs to carry out multiple steps could to complete, and must be grasped in a certain order
It is only a reasonable correct operation flow.
However in a practical situation, can there are problems that detouring to necessary operating procedure malice.With Mobile Henan company
Business support system for, when user accesses the business support system of Mobile Henan company, only verify user to therein
Some operation is with the presence or absence of operating right, without controlling the execution of operation flow sequence.For example, one only allows high-end use
The set meal A that family is ordered, correct operating process are:Shop assistant first carries out A and operates to system initiation set meal A orders, then operates B
High-end user rule verification is carried out, the last C operation completion set meals that could carry out are ordered.But open now that member can maliciously bypass
The high-end user rule of B operations verifies and directly carries out C operations and complete set meal order, so as to seriously compromise system safety and quotient
Industry specification.
The prior art can only control the access rights of node, and operating process that can not be to entire business and operation
Sequence is verified, then the key business rule calibration link in a complete operation flow may be bypassed.
Invention content
The present invention provide it is a kind of overcome the above problem or solve the above problems at least partly prevent URL access detour
Method and apparatus.
According to an aspect of the present invention, a kind of method for preventing URL from accessing detour is provided, including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation that the URL is accessed
Chain;
S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies described every
Whether higher level's operation of single stepping has accessed is controlled to prevent from detouring to URL access.
Further, the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3, using it is described step on road algorithm and reach all operational chains that certain amount of URL accesses to visit capacity unite
Meter analysis obtains the complete operation chain that the URL is accessed.
Further, the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and
It is marked to operating for the first time;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation that is accessed by one URL
Chain obtains higher level's operation of next operation, judges whether higher level's operation has been accessed so as to the control that accesses.
Further, the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used
In the log information for acquiring the access of the URL on each application server;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server acquires for receiving the data
The log information of agent acquisition is summarized and is stored to the log information.
Further, the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches the complete of the URL access
During the particular percentile of the access number of portion's operational chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain;
And/or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches what the URL was accessed
During the particular percentile of the access number of all operationss chain, it is the necessary behaviour that the URL is accessed to mark the specific operation node
Make node;It is described so as to obtain by operation order to form different operational chains by the necessary running node and optional running node
The a plurality of complete operation chain that URL is accessed..
The S1.3 further comprises that the URL based on exclusive path operational chain is accessed and the log information, to one
Each operational chain that URL is accessed is marked, and obtains the marker number for each operational chain that one URL is accessed;
When the marker number of an operational chain reaches the 80% of the marker number for all operationss chain that one URL is accessed
When, it is the complete operation chain that one URL is accessed to mark one operational chain.
The S1.3 further comprises that the URL based on multi-path operational chain is accessed and the log information, to one
Each running node that URL is accessed is marked, and obtains the reference numerals for each running node that one URL is accessed
Amount;
When the marker number of a running node reaches the access number for all operationss chain that one URL is accessed
When 80%, it is the necessary running node that one URL is accessed to mark one running node;
The optional node between the necessary running node is obtained, is pressed by the necessary running node and optional running node
Sequence forms different operational chains so as to obtain a plurality of complete operation chain that the URL is accessed.
Further, judge whether higher level's operation has accessed described in S2.2 to further include:
The URL of multi-path operational chain is accessed, whether to judge each higher level operation of next operation successively
It accesses;Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise described in judgement
The superior node of next operation has accessed.
Further, access control described in S2.2 includes:When higher level's operation has accessed, allow to access next behaviour
Make, the otherwise next operation of denied access.
According to another aspect of the present invention, a kind of device for preventing URL from accessing detour is also provided, including intelligent acquisition mould
Block and business chain control module,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains institute
State the complete operation chain of URL access;
The business chain control module, for being based on the complete operation chain, to the URL access every single stepping into
Line flag, and verify whether higher level's operation per single stepping has accessed.
The application proposes a kind of method and apparatus for preventing URL from accessing detour, by application server each in system
The log information that the URL of business operation is accessed obtains the complete operation chain that the URL to hold water is accessed into acquisition and analysis;Base
In the complete operation chain that the URL to hold water of each business is accessed, to the carry out whole process path of each business operation flow
Verification to ensure that user can not detour before all pre actions are not completed to subsequent operation, so as to specification operation flow, carries
High security of system.
Description of the drawings
Fig. 1, which is that the present invention is a kind of, prevents URL from accessing the method flow diagram to detour;
Fig. 2 accesses schematic diagram for first embodiment of the invention URL;
Fig. 3 is second embodiment of the invention URL access log information collection analysis schematic diagrames;
Fig. 4 is that schematic diagram is analyzed on the road of stepping on that the URL of third embodiment of the invention exclusive path operational chain is accessed;
Fig. 5 is that schematic diagram is analyzed on the road of stepping on that the URL of fourth embodiment of the invention multi-path operational chain is accessed;
Fig. 6 is that the URL of fifth embodiment of the invention multi-path operational chain accesses schematic diagram;
Fig. 7 is that the URL of one business of sixth embodiment of the invention accesses schematic diagram.
Specific embodiment
With reference to the accompanying drawings and examples, the specific embodiment of the present invention is described in further detail.Implement below
Example is used to illustrate the present invention, but be not limited to the scope of the present invention.
As shown in Figure 1, a kind of prevent URL from accessing the method to detour, including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation that the URL is accessed
Chain;
S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies described every
Whether higher level's operation of single stepping has accessed is controlled to prevent from detouring to URL access.
The problem to be solved in the present invention is in the operation system controlled based on menu access permission
URL accesses the problem of detouring.Fig. 2 accesses schematic diagram for first embodiment of the invention URL, in the business of a specification
In operation, including step A, B and C that three sequences perform, step A initiates the ordering industry of set meal A by menu to operation system
Business, step B carry out high-end user rule verification, and step C completes the order of set meal.In the order business of set meal A, step A, B
All it is essential step with C, and sequence is performed with fixed.If in primary order, step B is bypassed and has performed step
Rapid C, then the prior art can not monitor.
The present invention into acquisition and is divided by the log information that the URL to business operation in application server each in system is accessed
Analysis obtains the complete operation chain that the URL to hold water is accessed;The complete behaviour that the URL to hold water based on each business is accessed
Make chain, the carry out whole process path verification to each business operation flow, with ensure user unfinished all pre actions it
Before can not detour to subsequent operation, so as to specification operation flow, improve security of system.
As an optional embodiment, the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3, using it is described step on road algorithm and reach all operational chains that certain amount of URL accesses to visit capacity unite
Meter analysis obtains the complete operation chain that the URL is accessed.
Wherein, a URL accesses a specific business handling in correspondence system.
The log information includes:URL request, operator, service identification, business operation, the Referer letters of URL request
Breath etc..
The specific quantity is 1000, and the operational chain of business for reaching more than 1000 to daily business handling total amount is united
Meter analysis.
As an optional embodiment, the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used
In the log information for acquiring the access of the URL on each application server;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server acquires for receiving the data
The log information of agent acquisition is summarized and is stored to the log information.
As shown in figure 3, for second embodiment of the invention URL access log information collection analysis schematic diagrames, including three work(
Ergosphere, respectively application-server layer, centric acquisition device layer and storage server layer.
In the second embodiment, (such as crm system, ESOP systems and customer service fusion are each application server in systems
System etc.) on dispose flume agencies respectively, flume agency is for acquiring the daily record letter of the access of the URL on each application server
Breath;
Multiple Flume collectors are disposed simultaneously, and the Flume collectors are used to receive the day of the flume agent acquisitions
Will information is stored and is distributed after summarizing to the log information.
The storage server layer includes HDFS systems and Kafka systems.The storage server layer is used to access URL
Log information stored and analyzed and processed.
As an optional embodiment, the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches the complete of the URL access
During the particular percentile of the access number of portion's operational chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain;
And/or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches what the URL was accessed
During the particular percentile of the access number of all operationss chain, it is the necessary behaviour that the URL is accessed to mark the specific operation node
Make node;It is described so as to obtain by operation order to form different operational chains by the necessary running node and optional running node
The a plurality of complete operation chain that URL is accessed..
Fig. 4 is that schematic diagram is analyzed on the road of stepping on that the URL of third embodiment of the invention exclusive path operational chain is accessed.When some
When business is handled with a certain path, this path is marked, such as 1 in Fig. 4;When user is handled again with this path, then
This path tag is deepened, such as 2 in Fig. 4;If user is not when being handled with this path, this path is not deepened, such as Fig. 4
In 3;When user reaches the 80% of this business handling total amount with this path transacting business amount, i.e.,:Y>=X*80% (wherein X
Business handling total amount thus, Y are the quantity that this business is handled with this path), then using this path as handling the correct of this business
Path, i.e. complete operation chain.
Fig. 5 is that schematic diagram is analyzed on the road of stepping on that the URL of fourth embodiment of the invention multi-path operational chain is accessed.When user with
During a certain path transacting business, each node on this service path is marked, such as 1 in Fig. 5;When user is again with it
When his path is handled, the label for the same node point for handling this business is deepened, different nodes is marked, such as Fig. 5
In 2;When operating a certain degree of node when handling this business and reaching handle this total business volume 80%, i.e.,:Y>=X*
80% (business handling total amount, Y are the quantity that this business is handled with this node to wherein X thus), then by this node to handle this industry
The running node that must be carried out during business.The complete operation chain of this business obtained by stepping on road algorithm above is as shown in fig. 6, this industry
There are three complete operation chains for business tool, are 1-2-3-6-7,1-2-4-6-7 and 1-2-5-6-7 respectively, wherein 1,2,6 and 7 be necessary
Running node, 3,4 and 5 be optional running node.
As an optional embodiment, the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and
It is marked to operating for the first time;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation that is accessed by one URL
Chain obtains higher level's operation of next operation, judges whether higher level's operation has been accessed so as to the control that accesses.
As an optional embodiment, judge whether higher level's operation has accessed described in S2.2 and further include:
The URL of multi-path operational chain is accessed, whether to judge each higher level operation of next operation successively
It accesses;Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise described in judgement
The superior node of next operation has accessed.
As an optional embodiment, access control described in S2.2 includes:When higher level's operation has accessed, allow
Next operation is accessed, otherwise the next operation of denied access.
Fig. 6 is please referred to, when a business handling during URL access operation nodes 6, higher level's running node of decision node 6
3rd, whether 4 and 5 have accessed, and if there is any one is accessed, then higher level's running node of node 6 is accessed, then allows to visit
Ask node 6;If node 3,4 and 5, all without accessed, higher level's running node of node 6 is not accessed, then does not allow to access
Node 6.
Prevent URL from accessing the device to detour the present invention also provides a kind of, including intelligent acquisition module and business chain control mould
Block,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains institute
State the complete operation chain of URL access;
The business chain control module, for being based on the complete operation chain, to the URL access every single stepping into
Line flag, and verify whether higher level's operation per single stepping has accessed.
As shown in fig. 7, the URL for one business of sixth embodiment of the invention accesses schematic diagram, user handles a certain business,
The M pages need to be arrived first and carry out A operations, then carry out B operations to the N pages, finally carry out C operations to the S pages.Add in the anti-of the present invention
The device that only URL detours, access sequence check.The operational chain of this business is initialized, while identify A when user accesses A
Operation has been completed;The operational chain of this business is verified when user accesses B, judges whether to have accessed A, be blocked if A is not accessed
This access is cut, does not allow to access B, and check information is returned to page N;Verify the behaviour of this business again when user accesses C
Make chain, judge whether to be accessed B, this access is intercepted if B is not accessed, do not allow to access C, and returning to check information into
Page S.Device of the present invention may insure sequence transacting business of the user according to A-B-C, prevent user's malice from skipping complete
Crucial verification step rather than method transacting business in operation flow, while the completion for preventing user from frequently calling business operates, and makes
Into server crash.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in the protection of the present invention
Within the scope of.
Claims (10)
1. a kind of prevent URL from accessing the method to detour, which is characterized in that including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation chain that the URL is accessed;
S2 based on the complete operation chain, is marked, and verify each step the URL every single steppings accessed
Whether higher level's operation of operation has accessed is controlled to prevent from detouring to URL access.
2. the method as described in claim 1, which is characterized in that the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3 utilizes all operational chains progress statistical for stepping on road algorithm and reaching certain amount of URL to visit capacity and accessing
Analysis obtains the complete operation chain that the URL is accessed.
3. the method as described in claim 1, which is characterized in that the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and to head
Secondary operation is marked;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation chain accessed by one URL obtains
The higher level of next operation is taken to operate, judges whether higher level's operation has been accessed so as to the control that accesses.
4. method as claimed in claim 2, which is characterized in that the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used to adopt
Collect the log information that the URL on each application server is accessed;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server is used to receive the data collection agent
The log information of acquisition is summarized and is stored to the log information.
5. method as claimed in claim 2, which is characterized in that the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches whole behaviour of the URL access
When making the particular percentile of the access number of chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain;With/
Or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches the whole of the URL access
During the particular percentile of the access number of operational chain, it is the necessary operation section that the URL is accessed to mark the specific operation node
Point;Different operational chains is formed so as to obtain the URL by operation order by the necessary running node and optional running node
The a plurality of complete operation chain accessed.
6. method as claimed in claim 5, which is characterized in that the S1.3 further comprises:Based on exclusive path operational chain
URL access and the log information, URL each operational chain accessed is marked, one URL is obtained and visits
The marker number for each operational chain asked;
When the marker number of an operational chain reaches the 80% of the marker number for all operationss chain that one URL is accessed,
It is the complete operation chain that one URL is accessed to mark one operational chain.
7. method as claimed in claim 5, which is characterized in that the S1.3 further comprises:Based on multi-path operational chain
URL access and the log information, URL each running node accessed is marked, obtains one URL
The marker number of each running node accessed;
When the marker number of a running node reaches the 80% of the access number for all operationss chain that one URL is accessed
When, it is the necessary running node that one URL is accessed to mark one running node;
The optional node between the necessary running node is obtained, by the necessary running node and optional running node in order
Different operational chains is formed so as to obtain a plurality of complete operation chain that the URL is accessed.
8. method as claimed in claim 3, which is characterized in that judge whether higher level's operation has accessed also described in S2.2
Including:
The URL of multi-path operational chain is accessed, judges whether each higher level operation of next operation has accessed successively;
Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise judge described next
The superior node of operation has accessed.
9. method as claimed in claim 3, which is characterized in that access control described in S2.2 includes:When higher level operates
During access, allow to access next operation, otherwise the next operation of denied access.
10. a kind of prevent URL from accessing the device to detour, which is characterized in that including intelligent acquisition module and business chain control module,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains the URL
The complete operation chain of access;
The business chain control module, for being based on the complete operation chain, the every single stepping accessed to the URL is into rower
Note, and verify whether higher level's operation per single stepping has accessed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611249115.XA CN108259441A (en) | 2016-12-29 | 2016-12-29 | It is a kind of to prevent URL from accessing the method and device to detour |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611249115.XA CN108259441A (en) | 2016-12-29 | 2016-12-29 | It is a kind of to prevent URL from accessing the method and device to detour |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108259441A true CN108259441A (en) | 2018-07-06 |
Family
ID=62720930
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611249115.XA Pending CN108259441A (en) | 2016-12-29 | 2016-12-29 | It is a kind of to prevent URL from accessing the method and device to detour |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259441A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743303A (en) * | 2018-12-25 | 2019-05-10 | 中国移动通信集团江苏有限公司 | Using guard method, device, system and storage medium |
CN110933081A (en) * | 2019-11-29 | 2020-03-27 | 交通银行股份有限公司 | Method for judging validity of client request by server |
CN112968912A (en) * | 2021-04-01 | 2021-06-15 | 上海帆立信息科技有限公司 | Multi-mode safety verification code technology for long-link Internet service |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120317526A1 (en) * | 2011-06-10 | 2012-12-13 | Fujitsu Semiconductor Limited | Verification method, computer-readable recording medium, and design verification apparatus |
CN202737911U (en) * | 2012-06-12 | 2013-02-13 | 中国人民解放军91655部队 | Authority control system |
CN104301302A (en) * | 2014-09-12 | 2015-01-21 | 深信服网络科技(深圳)有限公司 | Unauthorized attack detection method and device |
-
2016
- 2016-12-29 CN CN201611249115.XA patent/CN108259441A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120317526A1 (en) * | 2011-06-10 | 2012-12-13 | Fujitsu Semiconductor Limited | Verification method, computer-readable recording medium, and design verification apparatus |
CN202737911U (en) * | 2012-06-12 | 2013-02-13 | 中国人民解放军91655部队 | Authority control system |
CN104301302A (en) * | 2014-09-12 | 2015-01-21 | 深信服网络科技(深圳)有限公司 | Unauthorized attack detection method and device |
Non-Patent Citations (1)
Title |
---|
麦权帮等: "基于Web日志的自适应站点优化研究与应用", 《电脑知识与技术》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743303A (en) * | 2018-12-25 | 2019-05-10 | 中国移动通信集团江苏有限公司 | Using guard method, device, system and storage medium |
CN109743303B (en) * | 2018-12-25 | 2021-10-01 | 中国移动通信集团江苏有限公司 | Application protection method, device, system and storage medium |
CN110933081A (en) * | 2019-11-29 | 2020-03-27 | 交通银行股份有限公司 | Method for judging validity of client request by server |
CN112968912A (en) * | 2021-04-01 | 2021-06-15 | 上海帆立信息科技有限公司 | Multi-mode safety verification code technology for long-link Internet service |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110100429A (en) | Real-time detection is simultaneously prevented from cheating and be abused | |
CN106294614A (en) | Method and apparatus for access service | |
CN107329888A (en) | Intelligent contract command code coverage rate computational methods and system | |
CN106888106A (en) | The extensive detecting system of IT assets in intelligent grid | |
CN112766907A (en) | Service data processing method and device and server | |
CN105610819B (en) | The method and apparatus of the query service of server info are provided | |
CN102930431B (en) | Paying server and payment channel identification method | |
CN111444692A (en) | Intelligent environment experiment comprehensive control method, system, computer and storage medium | |
CN106844730A (en) | The display methods and device of file content | |
CN107483381A (en) | The monitoring method and device of interlock account | |
CN108259441A (en) | It is a kind of to prevent URL from accessing the method and device to detour | |
CN107404481A (en) | User profile recognition methods and device | |
CN110427775A (en) | Data query authority control method and device | |
CN103095693A (en) | Method for positioning and accessing database user host information | |
CN108959048A (en) | The method for analyzing performance of modular environment, device and can storage medium | |
CN107704546A (en) | Page configuration method and server | |
CN104850797B (en) | Device security management method and apparatus | |
CN105989457A (en) | Information query method and apparatus thereof | |
CN105868956A (en) | Data processing method and device | |
CN104679870B (en) | A kind of method of data acquisition for information system | |
CN109510800A (en) | A kind of network request processing method, device, electronic equipment and storage medium | |
CN104182546B (en) | The data query method and device of database | |
CN108650123B (en) | Fault information recording method, device, equipment and storage medium | |
CN110175276A (en) | Infringing information acquisition methods, device, computer equipment and storage medium | |
CN112597525A (en) | Data processing method and device based on privacy protection and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |
|
RJ01 | Rejection of invention patent application after publication |