CN108259441A - It is a kind of to prevent URL from accessing the method and device to detour - Google Patents

It is a kind of to prevent URL from accessing the method and device to detour Download PDF

Info

Publication number
CN108259441A
CN108259441A CN201611249115.XA CN201611249115A CN108259441A CN 108259441 A CN108259441 A CN 108259441A CN 201611249115 A CN201611249115 A CN 201611249115A CN 108259441 A CN108259441 A CN 108259441A
Authority
CN
China
Prior art keywords
url
accessed
chain
access
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611249115.XA
Other languages
Chinese (zh)
Inventor
鄢兵安
裴照华
郭强
张旭
王亚军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Henan Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201611249115.XA priority Critical patent/CN108259441A/en
Publication of CN108259441A publication Critical patent/CN108259441A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of method and device for preventing URL from accessing detour.The method includes S1, and based on road algorithm is stepped on, the URL log informations accessed are analyzed, obtain the complete operation chain that the URL is accessed;S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies whether higher level's operation per single stepping has accessed that URL access is controlled to prevent from detouring.The present invention, into acquisition and analysis, obtains the complete operation chain that the URL to hold water is accessed by the log information that the URL to business operation in application server each in system is accessed;The complete operation chain that the URL to hold water based on each business is accessed, carry out whole process path verification to each business operation flow, to ensure that user can not detour before all pre actions are not completed to subsequent operation, so as to specification operation flow, security of system is improved.

Description

It is a kind of to prevent URL from accessing the method and device to detour
Technical field
The present invention relates to fields of communication technology, prevent URL from accessing the method and device to detour more particularly, to a kind of.
Background technology
At present, in the system (system including being accessed by public network and LAN) controlled based on menu access, system The access right of different homepages (menu) access rights and subpage frame (submenu) can be distributed according to the difference of user role Limit.A business operation in system needs to carry out multiple steps could to complete, and must be grasped in a certain order It is only a reasonable correct operation flow.
However in a practical situation, can there are problems that detouring to necessary operating procedure malice.With Mobile Henan company Business support system for, when user accesses the business support system of Mobile Henan company, only verify user to therein Some operation is with the presence or absence of operating right, without controlling the execution of operation flow sequence.For example, one only allows high-end use The set meal A that family is ordered, correct operating process are:Shop assistant first carries out A and operates to system initiation set meal A orders, then operates B High-end user rule verification is carried out, the last C operation completion set meals that could carry out are ordered.But open now that member can maliciously bypass The high-end user rule of B operations verifies and directly carries out C operations and complete set meal order, so as to seriously compromise system safety and quotient Industry specification.
The prior art can only control the access rights of node, and operating process that can not be to entire business and operation Sequence is verified, then the key business rule calibration link in a complete operation flow may be bypassed.
Invention content
The present invention provide it is a kind of overcome the above problem or solve the above problems at least partly prevent URL access detour Method and apparatus.
According to an aspect of the present invention, a kind of method for preventing URL from accessing detour is provided, including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation that the URL is accessed Chain;
S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies described every Whether higher level's operation of single stepping has accessed is controlled to prevent from detouring to URL access.
Further, the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3, using it is described step on road algorithm and reach all operational chains that certain amount of URL accesses to visit capacity unite Meter analysis obtains the complete operation chain that the URL is accessed.
Further, the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and It is marked to operating for the first time;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation that is accessed by one URL Chain obtains higher level's operation of next operation, judges whether higher level's operation has been accessed so as to the control that accesses.
Further, the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used In the log information for acquiring the access of the URL on each application server;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server acquires for receiving the data The log information of agent acquisition is summarized and is stored to the log information.
Further, the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches the complete of the URL access During the particular percentile of the access number of portion's operational chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain; And/or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches what the URL was accessed During the particular percentile of the access number of all operationss chain, it is the necessary behaviour that the URL is accessed to mark the specific operation node Make node;It is described so as to obtain by operation order to form different operational chains by the necessary running node and optional running node The a plurality of complete operation chain that URL is accessed..
The S1.3 further comprises that the URL based on exclusive path operational chain is accessed and the log information, to one Each operational chain that URL is accessed is marked, and obtains the marker number for each operational chain that one URL is accessed;
When the marker number of an operational chain reaches the 80% of the marker number for all operationss chain that one URL is accessed When, it is the complete operation chain that one URL is accessed to mark one operational chain.
The S1.3 further comprises that the URL based on multi-path operational chain is accessed and the log information, to one Each running node that URL is accessed is marked, and obtains the reference numerals for each running node that one URL is accessed Amount;
When the marker number of a running node reaches the access number for all operationss chain that one URL is accessed When 80%, it is the necessary running node that one URL is accessed to mark one running node;
The optional node between the necessary running node is obtained, is pressed by the necessary running node and optional running node Sequence forms different operational chains so as to obtain a plurality of complete operation chain that the URL is accessed.
Further, judge whether higher level's operation has accessed described in S2.2 to further include:
The URL of multi-path operational chain is accessed, whether to judge each higher level operation of next operation successively It accesses;Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise described in judgement The superior node of next operation has accessed.
Further, access control described in S2.2 includes:When higher level's operation has accessed, allow to access next behaviour Make, the otherwise next operation of denied access.
According to another aspect of the present invention, a kind of device for preventing URL from accessing detour is also provided, including intelligent acquisition mould Block and business chain control module,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains institute State the complete operation chain of URL access;
The business chain control module, for being based on the complete operation chain, to the URL access every single stepping into Line flag, and verify whether higher level's operation per single stepping has accessed.
The application proposes a kind of method and apparatus for preventing URL from accessing detour, by application server each in system The log information that the URL of business operation is accessed obtains the complete operation chain that the URL to hold water is accessed into acquisition and analysis;Base In the complete operation chain that the URL to hold water of each business is accessed, to the carry out whole process path of each business operation flow Verification to ensure that user can not detour before all pre actions are not completed to subsequent operation, so as to specification operation flow, carries High security of system.
Description of the drawings
Fig. 1, which is that the present invention is a kind of, prevents URL from accessing the method flow diagram to detour;
Fig. 2 accesses schematic diagram for first embodiment of the invention URL;
Fig. 3 is second embodiment of the invention URL access log information collection analysis schematic diagrames;
Fig. 4 is that schematic diagram is analyzed on the road of stepping on that the URL of third embodiment of the invention exclusive path operational chain is accessed;
Fig. 5 is that schematic diagram is analyzed on the road of stepping on that the URL of fourth embodiment of the invention multi-path operational chain is accessed;
Fig. 6 is that the URL of fifth embodiment of the invention multi-path operational chain accesses schematic diagram;
Fig. 7 is that the URL of one business of sixth embodiment of the invention accesses schematic diagram.
Specific embodiment
With reference to the accompanying drawings and examples, the specific embodiment of the present invention is described in further detail.Implement below Example is used to illustrate the present invention, but be not limited to the scope of the present invention.
As shown in Figure 1, a kind of prevent URL from accessing the method to detour, including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation that the URL is accessed Chain;
S2 based on the complete operation chain, is marked the URL every single steppings accessed, and verifies described every Whether higher level's operation of single stepping has accessed is controlled to prevent from detouring to URL access.
The problem to be solved in the present invention is in the operation system controlled based on menu access permission
URL accesses the problem of detouring.Fig. 2 accesses schematic diagram for first embodiment of the invention URL, in the business of a specification In operation, including step A, B and C that three sequences perform, step A initiates the ordering industry of set meal A by menu to operation system Business, step B carry out high-end user rule verification, and step C completes the order of set meal.In the order business of set meal A, step A, B All it is essential step with C, and sequence is performed with fixed.If in primary order, step B is bypassed and has performed step Rapid C, then the prior art can not monitor.
The present invention into acquisition and is divided by the log information that the URL to business operation in application server each in system is accessed Analysis obtains the complete operation chain that the URL to hold water is accessed;The complete behaviour that the URL to hold water based on each business is accessed Make chain, the carry out whole process path verification to each business operation flow, with ensure user unfinished all pre actions it Before can not detour to subsequent operation, so as to specification operation flow, improve security of system.
As an optional embodiment, the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3, using it is described step on road algorithm and reach all operational chains that certain amount of URL accesses to visit capacity unite Meter analysis obtains the complete operation chain that the URL is accessed.
Wherein, a URL accesses a specific business handling in correspondence system.
The log information includes:URL request, operator, service identification, business operation, the Referer letters of URL request Breath etc..
The specific quantity is 1000, and the operational chain of business for reaching more than 1000 to daily business handling total amount is united Meter analysis.
As an optional embodiment, the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used In the log information for acquiring the access of the URL on each application server;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server acquires for receiving the data The log information of agent acquisition is summarized and is stored to the log information.
As shown in figure 3, for second embodiment of the invention URL access log information collection analysis schematic diagrames, including three work( Ergosphere, respectively application-server layer, centric acquisition device layer and storage server layer.
In the second embodiment, (such as crm system, ESOP systems and customer service fusion are each application server in systems System etc.) on dispose flume agencies respectively, flume agency is for acquiring the daily record letter of the access of the URL on each application server Breath;
Multiple Flume collectors are disposed simultaneously, and the Flume collectors are used to receive the day of the flume agent acquisitions Will information is stored and is distributed after summarizing to the log information.
The storage server layer includes HDFS systems and Kafka systems.The storage server layer is used to access URL Log information stored and analyzed and processed.
As an optional embodiment, the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches the complete of the URL access During the particular percentile of the access number of portion's operational chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain; And/or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches what the URL was accessed During the particular percentile of the access number of all operationss chain, it is the necessary behaviour that the URL is accessed to mark the specific operation node Make node;It is described so as to obtain by operation order to form different operational chains by the necessary running node and optional running node The a plurality of complete operation chain that URL is accessed..
Fig. 4 is that schematic diagram is analyzed on the road of stepping on that the URL of third embodiment of the invention exclusive path operational chain is accessed.When some When business is handled with a certain path, this path is marked, such as 1 in Fig. 4;When user is handled again with this path, then This path tag is deepened, such as 2 in Fig. 4;If user is not when being handled with this path, this path is not deepened, such as Fig. 4 In 3;When user reaches the 80% of this business handling total amount with this path transacting business amount, i.e.,:Y>=X*80% (wherein X Business handling total amount thus, Y are the quantity that this business is handled with this path), then using this path as handling the correct of this business Path, i.e. complete operation chain.
Fig. 5 is that schematic diagram is analyzed on the road of stepping on that the URL of fourth embodiment of the invention multi-path operational chain is accessed.When user with During a certain path transacting business, each node on this service path is marked, such as 1 in Fig. 5;When user is again with it When his path is handled, the label for the same node point for handling this business is deepened, different nodes is marked, such as Fig. 5 In 2;When operating a certain degree of node when handling this business and reaching handle this total business volume 80%, i.e.,:Y>=X* 80% (business handling total amount, Y are the quantity that this business is handled with this node to wherein X thus), then by this node to handle this industry The running node that must be carried out during business.The complete operation chain of this business obtained by stepping on road algorithm above is as shown in fig. 6, this industry There are three complete operation chains for business tool, are 1-2-3-6-7,1-2-4-6-7 and 1-2-5-6-7 respectively, wherein 1,2,6 and 7 be necessary Running node, 3,4 and 5 be optional running node.
As an optional embodiment, the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and It is marked to operating for the first time;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation that is accessed by one URL Chain obtains higher level's operation of next operation, judges whether higher level's operation has been accessed so as to the control that accesses.
As an optional embodiment, judge whether higher level's operation has accessed described in S2.2 and further include:
The URL of multi-path operational chain is accessed, whether to judge each higher level operation of next operation successively It accesses;Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise described in judgement The superior node of next operation has accessed.
As an optional embodiment, access control described in S2.2 includes:When higher level's operation has accessed, allow Next operation is accessed, otherwise the next operation of denied access.
Fig. 6 is please referred to, when a business handling during URL access operation nodes 6, higher level's running node of decision node 6 3rd, whether 4 and 5 have accessed, and if there is any one is accessed, then higher level's running node of node 6 is accessed, then allows to visit Ask node 6;If node 3,4 and 5, all without accessed, higher level's running node of node 6 is not accessed, then does not allow to access Node 6.
Prevent URL from accessing the device to detour the present invention also provides a kind of, including intelligent acquisition module and business chain control mould Block,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains institute State the complete operation chain of URL access;
The business chain control module, for being based on the complete operation chain, to the URL access every single stepping into Line flag, and verify whether higher level's operation per single stepping has accessed.
As shown in fig. 7, the URL for one business of sixth embodiment of the invention accesses schematic diagram, user handles a certain business, The M pages need to be arrived first and carry out A operations, then carry out B operations to the N pages, finally carry out C operations to the S pages.Add in the anti-of the present invention The device that only URL detours, access sequence check.The operational chain of this business is initialized, while identify A when user accesses A Operation has been completed;The operational chain of this business is verified when user accesses B, judges whether to have accessed A, be blocked if A is not accessed This access is cut, does not allow to access B, and check information is returned to page N;Verify the behaviour of this business again when user accesses C Make chain, judge whether to be accessed B, this access is intercepted if B is not accessed, do not allow to access C, and returning to check information into Page S.Device of the present invention may insure sequence transacting business of the user according to A-B-C, prevent user's malice from skipping complete Crucial verification step rather than method transacting business in operation flow, while the completion for preventing user from frequently calling business operates, and makes Into server crash.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in the protection of the present invention Within the scope of.

Claims (10)

1. a kind of prevent URL from accessing the method to detour, which is characterized in that including:
S1 based on road algorithm is stepped on, analyzes the URL log informations accessed, obtains the complete operation chain that the URL is accessed;
S2 based on the complete operation chain, is marked, and verify each step the URL every single steppings accessed Whether higher level's operation of operation has accessed is controlled to prevent from detouring to URL access.
2. the method as described in claim 1, which is characterized in that the S1 further comprises:
S1.1, the log information that the URL in acquisition system on each application server is accessed;
S1.2 based on the log information, obtains operational chain when each URL is accessed;
S1.3 utilizes all operational chains progress statistical for stepping on road algorithm and reaching certain amount of URL to visit capacity and accessing Analysis obtains the complete operation chain that the URL is accessed.
3. the method as described in claim 1, which is characterized in that the S2 further comprises:
S2.1 when the operation for the first time that a URL is accessed generates, obtains the complete operation chain that one URL is accessed, and to head Secondary operation is marked;
S2.2, when one URL, which is accessed, carries out next operation, the complete operation chain accessed by one URL obtains The higher level of next operation is taken to operate, judges whether higher level's operation has been accessed so as to the control that accesses.
4. method as claimed in claim 2, which is characterized in that the S1.1 further comprises:
S1.1.1, disposes data collection agent respectively in systems on each application server, the data collection agent is used to adopt Collect the log information that the URL on each application server is accessed;
S1.1.2, disposes multiple data acquisition servers, and the data acquisition server is used to receive the data collection agent The log information of acquisition is summarized and is stored to the log information.
5. method as claimed in claim 2, which is characterized in that the S1.3 further comprises:
The URL of exclusive path operational chain is accessed, when the access number of specific operation chain reaches whole behaviour of the URL access When making the particular percentile of the access number of chain, it is the complete operation chain that the URL is accessed to mark the specific operation chain;With/ Or
The URL of multi-path operational chain is accessed, when the access number of specific operation node reaches the whole of the URL access During the particular percentile of the access number of operational chain, it is the necessary operation section that the URL is accessed to mark the specific operation node Point;Different operational chains is formed so as to obtain the URL by operation order by the necessary running node and optional running node The a plurality of complete operation chain accessed.
6. method as claimed in claim 5, which is characterized in that the S1.3 further comprises:Based on exclusive path operational chain URL access and the log information, URL each operational chain accessed is marked, one URL is obtained and visits The marker number for each operational chain asked;
When the marker number of an operational chain reaches the 80% of the marker number for all operationss chain that one URL is accessed, It is the complete operation chain that one URL is accessed to mark one operational chain.
7. method as claimed in claim 5, which is characterized in that the S1.3 further comprises:Based on multi-path operational chain URL access and the log information, URL each running node accessed is marked, obtains one URL The marker number of each running node accessed;
When the marker number of a running node reaches the 80% of the access number for all operationss chain that one URL is accessed When, it is the necessary running node that one URL is accessed to mark one running node;
The optional node between the necessary running node is obtained, by the necessary running node and optional running node in order Different operational chains is formed so as to obtain a plurality of complete operation chain that the URL is accessed.
8. method as claimed in claim 3, which is characterized in that judge whether higher level's operation has accessed also described in S2.2 Including:
The URL of multi-path operational chain is accessed, judges whether each higher level operation of next operation has accessed successively; Judge that the superior node of next operation does not access when each higher level operation does not access, otherwise judge described next The superior node of operation has accessed.
9. method as claimed in claim 3, which is characterized in that access control described in S2.2 includes:When higher level operates During access, allow to access next operation, otherwise the next operation of denied access.
10. a kind of prevent URL from accessing the device to detour, which is characterized in that including intelligent acquisition module and business chain control module,
The intelligent acquisition module for being based on stepping on road algorithm, analyzes the URL log informations accessed, obtains the URL The complete operation chain of access;
The business chain control module, for being based on the complete operation chain, the every single stepping accessed to the URL is into rower Note, and verify whether higher level's operation per single stepping has accessed.
CN201611249115.XA 2016-12-29 2016-12-29 It is a kind of to prevent URL from accessing the method and device to detour Pending CN108259441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611249115.XA CN108259441A (en) 2016-12-29 2016-12-29 It is a kind of to prevent URL from accessing the method and device to detour

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611249115.XA CN108259441A (en) 2016-12-29 2016-12-29 It is a kind of to prevent URL from accessing the method and device to detour

Publications (1)

Publication Number Publication Date
CN108259441A true CN108259441A (en) 2018-07-06

Family

ID=62720930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611249115.XA Pending CN108259441A (en) 2016-12-29 2016-12-29 It is a kind of to prevent URL from accessing the method and device to detour

Country Status (1)

Country Link
CN (1) CN108259441A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743303A (en) * 2018-12-25 2019-05-10 中国移动通信集团江苏有限公司 Using guard method, device, system and storage medium
CN110933081A (en) * 2019-11-29 2020-03-27 交通银行股份有限公司 Method for judging validity of client request by server
CN112968912A (en) * 2021-04-01 2021-06-15 上海帆立信息科技有限公司 Multi-mode safety verification code technology for long-link Internet service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120317526A1 (en) * 2011-06-10 2012-12-13 Fujitsu Semiconductor Limited Verification method, computer-readable recording medium, and design verification apparatus
CN202737911U (en) * 2012-06-12 2013-02-13 中国人民解放军91655部队 Authority control system
CN104301302A (en) * 2014-09-12 2015-01-21 深信服网络科技(深圳)有限公司 Unauthorized attack detection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120317526A1 (en) * 2011-06-10 2012-12-13 Fujitsu Semiconductor Limited Verification method, computer-readable recording medium, and design verification apparatus
CN202737911U (en) * 2012-06-12 2013-02-13 中国人民解放军91655部队 Authority control system
CN104301302A (en) * 2014-09-12 2015-01-21 深信服网络科技(深圳)有限公司 Unauthorized attack detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
麦权帮等: "基于Web日志的自适应站点优化研究与应用", 《电脑知识与技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743303A (en) * 2018-12-25 2019-05-10 中国移动通信集团江苏有限公司 Using guard method, device, system and storage medium
CN109743303B (en) * 2018-12-25 2021-10-01 中国移动通信集团江苏有限公司 Application protection method, device, system and storage medium
CN110933081A (en) * 2019-11-29 2020-03-27 交通银行股份有限公司 Method for judging validity of client request by server
CN112968912A (en) * 2021-04-01 2021-06-15 上海帆立信息科技有限公司 Multi-mode safety verification code technology for long-link Internet service

Similar Documents

Publication Publication Date Title
CN110100429A (en) Real-time detection is simultaneously prevented from cheating and be abused
CN106294614A (en) Method and apparatus for access service
CN107329888A (en) Intelligent contract command code coverage rate computational methods and system
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
CN112766907A (en) Service data processing method and device and server
CN105610819B (en) The method and apparatus of the query service of server info are provided
CN102930431B (en) Paying server and payment channel identification method
CN111444692A (en) Intelligent environment experiment comprehensive control method, system, computer and storage medium
CN106844730A (en) The display methods and device of file content
CN107483381A (en) The monitoring method and device of interlock account
CN108259441A (en) It is a kind of to prevent URL from accessing the method and device to detour
CN107404481A (en) User profile recognition methods and device
CN110427775A (en) Data query authority control method and device
CN103095693A (en) Method for positioning and accessing database user host information
CN108959048A (en) The method for analyzing performance of modular environment, device and can storage medium
CN107704546A (en) Page configuration method and server
CN104850797B (en) Device security management method and apparatus
CN105989457A (en) Information query method and apparatus thereof
CN105868956A (en) Data processing method and device
CN104679870B (en) A kind of method of data acquisition for information system
CN109510800A (en) A kind of network request processing method, device, electronic equipment and storage medium
CN104182546B (en) The data query method and device of database
CN108650123B (en) Fault information recording method, device, equipment and storage medium
CN110175276A (en) Infringing information acquisition methods, device, computer equipment and storage medium
CN112597525A (en) Data processing method and device based on privacy protection and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706

RJ01 Rejection of invention patent application after publication