CN109802919B - Web page access intercepting method and device - Google Patents

Web page access intercepting method and device Download PDF

Info

Publication number
CN109802919B
CN109802919B CN201711140318.XA CN201711140318A CN109802919B CN 109802919 B CN109802919 B CN 109802919B CN 201711140318 A CN201711140318 A CN 201711140318A CN 109802919 B CN109802919 B CN 109802919B
Authority
CN
China
Prior art keywords
web page
blacklist
user
data packet
domain name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711140318.XA
Other languages
Chinese (zh)
Other versions
CN109802919A (en
Inventor
宋小龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Hangzhou Information Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201711140318.XA priority Critical patent/CN109802919B/en
Publication of CN109802919A publication Critical patent/CN109802919A/en
Application granted granted Critical
Publication of CN109802919B publication Critical patent/CN109802919B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a method and a device for intercepting Web page access, which are used for solving the problems of high complexity and low efficiency of Web page access interception in the prior art. The method comprises the following steps: acquiring a blacklist of a web page; the method comprises the steps of obtaining a URL (Uniform resource locator) of a web page currently accessed by a user, and obtaining a flow data packet generated by accessing the web page by constructing a VPN (virtual private network) service process, wherein the VPN service process comprises a TCP (transmission control protocol) proxy service module and a DNS (domain name server) proxy service module, and the flow data packet is a TCP data packet or a DNS data packet; analyzing the TCP data packet or the DNS data packet to obtain a corresponding target address or a corresponding domain name; matching any one of the URL, the target address and the domain name with a blacklist of the web page; and intercepting the web page access when any one of the URL, the target address and the domain name is determined to be matched with the illegal web page address in the web page blacklist.

Description

Web page access intercepting method and device
Technical Field
The invention relates to the field of network information security, in particular to a web page access intercepting method and device.
Background
With the popularization of mobile terminals and the development of internet technology, mobile terminal users can access various web pages for information retrieval and communication, and great convenience is brought to the lives of the users. However, the presence of some illegal websites poses a threat to the information security of mobile terminal users.
At present, a method for intercepting access to a web page of an Android terminal mainly comprises the following steps:
firstly, intercepting the access of a web page by acquiring root authority of an Android system. However, the method cannot be widely popularized due to fragmentation of the Android terminal, and as the security check strength of the Android system increases, the root authority of the Android system is more difficult to acquire.
Secondly, all web page Access flows from the Android terminal are obtained by configuring a Virtual Private Network (VPN) or an Access Point Name (APN), and then illegal websites are identified and intercepted. However, the cost for intercepting the access to the web page of the Android terminal is too high by configuring the VPN or the APN, the configuration is complex, and the practicability is low.
Thirdly, capturing user web page access data through a VPN Service API (Application Programming Interface) of an Android system, and redirecting to intercept illegal web page access. However, since the Android system only allows one VPN Service to be operated at the same time, once the user authorizes other applications to use the VPN Service, the functions in the applications responsible for intercepting web page access will be disabled, and thus, it can be seen that the method is poor in robustness, and therefore intercepting efficiency is reduced.
Therefore, how to improve the interception efficiency on the premise of reducing the cost of web page access interception is one of the technical problems to be solved urgently in the prior art.
Disclosure of Invention
The invention provides a method and a device for intercepting web page access, which are used for solving the problems of high complexity and low efficiency of web page access interception in the prior art.
In a first aspect, an embodiment of the present invention provides a method for intercepting access to a web page, including:
acquiring a web page blacklist, wherein the web page blacklist is a set of preset illegal web page addresses;
the method comprises the steps of obtaining a Uniform Resource Locator (URL) of a web page currently accessed by a user, and obtaining a flow data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the flow data packet is a TCP data packet or a DNS data packet;
analyzing the TCP data packet or the DNS data packet to obtain a corresponding target address or a corresponding domain name;
matching any one of the URL, the target address and the domain name with the blacklist of the web page;
and intercepting the web page access when any one of the URL, the target address and the domain name is determined to be matched with an illegal web page address in the web page blacklist.
Preferably, the obtaining of the URL of the web page currently accessed by the user specifically includes:
monitoring a stored browser database, wherein the browser database is used for recording all web page URLs (uniform resource locators) accessed by the user by using a browser;
and acquiring the URL of the web page currently visited by the user from the browser database.
Preferably, the monitoring the stored browser database specifically includes:
and monitoring the stored browser database by calling an Android application programming interface (Android API) register Content Observer function.
Preferably, when it is determined that any one of the URL, the target address, and the domain name matches an illegal web page address in the web page blacklist, intercepting the web page access specifically includes:
when the URL is determined to be matched with the illegal web page address in the web page blacklist, skipping the web page currently accessed by the user to a blacklist reminding page to remind the user that the page is inaccessible;
when the target address is determined to be matched with an illegal web page address in the web page blacklist, intercepting a web page currently accessed by the user by tampering the target address;
and when the domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted.
Preferably, jumping the web page currently accessed by the user to a blacklist reminding page specifically includes:
and jumping the web page currently accessed by the user to a blacklist reminding page by calling an Android API start Activity function.
In a second aspect, an embodiment of the present invention provides a web page access intercepting apparatus, including:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a web page blacklist, and the web page blacklist is a preset set of illegal web page addresses;
the second acquisition unit is used for acquiring a Uniform Resource Locator (URL) of a web page currently accessed by a user and acquiring a traffic data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the traffic data packet is a TCP data packet or a DNS data packet;
the analysis unit is used for analyzing the TCP data packet or the DNS data packet to obtain a corresponding target address or a corresponding domain name;
the matching unit is used for matching any one of the URL, the target address and the domain name with the blacklist of the web page;
and the intercepting unit is used for intercepting the access of the web page when any one of the URL, the target address and the domain name is matched with an illegal web page address in the web page blacklist.
Preferably, the second obtaining unit is specifically configured to monitor a stored browser database, where the browser database is configured to record all URLs of web pages visited by the user using a browser; and acquiring the URL of the web page currently visited by the user from the browser database.
Preferably, the second obtaining unit is specifically configured to monitor the stored browser database by calling an Android application programming interface Android API register Content Observer function.
Preferably, the intercepting unit is specifically configured to jump the web page currently accessed by the user to a blacklist reminding page when it is determined that the URL matches an illegal web page address in the blacklist of web pages, and remind the user that the page is inaccessible; when the target address is determined to be matched with an illegal web page address in the web page blacklist, intercepting a web page currently accessed by the user by tampering the target address; and when the domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted.
Preferably, the intercepting unit is specifically configured to jump the web page currently accessed by the user to a blacklist reminding page by calling an Android API start Activity function.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the web page access intercepting method according to the present invention when executing the computer program.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps in the web page access intercepting method according to the present invention.
The beneficial effects of the invention include:
in the method and the device for intercepting access to a web page provided by the embodiment of the present invention, a mobile terminal obtains a blacklist of web pages, where the blacklist of web pages is a set of preset illegal web page addresses, obtains a URL (Uniform Resource Locator) of a web page currently accessed by a user, and obtains a traffic data packet generated when the user accesses the web page by constructing a VPN service process, where the VPN service process includes a TCP (Transmission Control Protocol) proxy service module and a DNS (Domain Name System) proxy service module, where the traffic data packet is a TCP data packet or a DNS data packet, analyzes the TCP data packet or the DNS data packet to obtain a corresponding target address or Domain Name, matches any one of the URL, the target address and the Domain Name with the blacklist of web pages, and when it is determined that any one of the URL, the target address and the Domain Name is matched with the illegal web page address in the blacklist of web pages And intercepting the illegal web page access comprehensively by two modes of acquiring the URL of the web page currently accessed by the user by monitoring a browser database and acquiring a traffic data packet generated by accessing the web page by constructing a VPN service process without acquiring root authority, wherein the identification interception is performed locally on the mobile terminal, so that unnecessary network interaction is reduced, the interception efficiency is higher compared with that of a platform side, the consumed traffic is less, the deployment is easy, and the interception complexity is reduced.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flowchart illustrating an implementation flow of a web page access intercepting method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a web page access intercepting apparatus according to a second embodiment of the present invention.
Detailed Description
The invention provides a method and a device for intercepting web page access, which are used for solving the problems of high complexity and low efficiency of web page access interception in the prior art.
The implementation principle of the web page access interception method provided by the embodiment of the invention is as follows: the method comprises the steps that a mobile terminal obtains a web blacklist, the web blacklist is a set of preset illegal web page addresses, a web page URL currently accessed by a user is obtained, a VPN service process is constructed and a flow data packet generated when the user accesses the web page is obtained, the VPN service process comprises a TCP proxy service module and a DNS proxy service module, the flow data packet is a TCP data packet or a DNS data packet, the TCP data packet or the DNS data packet is analyzed to obtain a corresponding target address or a domain name, any one of the URL, the target address and the domain name is matched with the web blacklist, and when any one of the URL, the target address and the domain name is determined to be matched with the illegal web page address in the web blacklist, the web page access is intercepted without obtaining root authority, the method comprises the steps of acquiring a web page URL currently accessed by a user through monitoring a browser database and acquiring a traffic data packet generated by accessing the web page through constructing a VPN service process, comprehensively intercepting illegal web page access, reducing unnecessary network interaction due to the fact that identification interception occurs locally on a mobile terminal, and reducing interception complexity compared with a platform side, wherein interception efficiency is higher, traffic consumption is less, deployment is easy, and the interception complexity is reduced.
It should be noted that the mobile terminal in the embodiment of the present invention is a mobile terminal installed with an Android system.
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings of the specification, it being understood that the preferred embodiments described herein are merely for illustrating and explaining the present invention, and are not intended to limit the present invention, and that the embodiments and features of the embodiments in the present invention may be combined with each other without conflict.
Example one
As shown in fig. 1, which is a schematic implementation flow diagram of a web page access intercepting method according to an embodiment of the present invention, the method may include the following steps:
s11, obtaining a web page blacklist, wherein the web page blacklist is a preset set of illegal web page addresses.
In specific implementation, the mobile terminal firstly obtains a web page blacklist, and the web page blacklist is a set of preset illegal web page addresses. Specifically, the blacklist of the web page may be obtained in two ways: the method comprises the following steps that a web page blacklist configuration issuing platform pushes web page blacklist data to a mobile terminal through a push instruction and stores the web page blacklist data on the mobile terminal; or the mobile terminal sends a request to the blacklist configuration issuing platform at regular time to acquire the blacklist data of the web page and updates the blacklist data to the local. The blacklist of the web page blacklist configuration issuing platform can be updated in real time, and the illegal web page addresses can include, but are not limited to, the following addresses: a web page URL, a domain name address of the web page, and an IP address of the web page. The web page address may be a complete web page address or an ambiguous web page address, for example, a complete illegal web page address is www.aaa.bb.com/item/12345678, and an ambiguous web page address is www.a × b.com/item/, and for the ambiguous web page address, if the web page address visited by the user matches the web page except "#", the web page address visited by the user is considered to match the ambiguous web page address, for example, www.abc.bc.com/item/111111 or www.acc.bd.com/item/222222 matches www.a × b.com/item/.
S12, acquiring a Uniform Resource Locator (URL) of a web page currently accessed by a user, and acquiring a traffic data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the traffic data packet is a TCP data packet or a DNS data packet.
In specific implementation, the mobile terminal monitors a locally stored browser database, wherein the browser database is used for recording all web page URLs accessed by the user by using a browser, and acquiring the web page URL currently accessed by the user from the browser database. Specifically, a locally stored browser database is monitored by calling an Android apersister Content Observer function, and a latest record in the history record is read when callback is monitored, namely the URL of the web page currently accessed by the user.
And the mobile terminal acquires a traffic data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the traffic data packet is a TCP data packet or a DNS data packet. Specifically, the mobile terminal obtains a park File Descriptor (interface description File) by calling establish (creation) of a VPN service process, performs read-write forwarding on a local traffic data packet, constructs a local TCP proxy service and a DNS proxy service of the mobile terminal, and obtains a traffic data packet, i.e., a TCP data packet or a DNS data packet, generated by accessing the web page.
S13, analyzing the TCP data packet or DNS data packet to obtain the corresponding target address or domain name.
In specific implementation, the mobile terminal analyzes the TCP data packet to obtain a TCP target address; or analyzing the DNS data packet to obtain the DNS domain name.
S14, matching any one of the URL, the target address and the domain name with the blacklist of the web page.
In specific implementation, any one of the acquired URL of the web page currently accessed by the user, the analyzed TCP target address or the DNS domain name is matched with the blacklist of the web page.
S15, intercepting the web page access when any one of the URL, the target address and the domain name is determined to be matched with the illegal web page address in the web page blacklist.
In specific implementation, when the URL of the web page currently accessed by the user is determined to be matched with the illegal web page address in the blacklist of the web page, the web page currently accessed by the user is skipped to the blacklist reminding page, and the user is reminded that the page is inaccessible. Specifically, the mobile terminal jumps to a blacklist reminding page from a web page currently accessed by the user by calling an Android API start Activity function, so as to remind the user that the page is inaccessible, and the user can further select whether to continue accessing the web page.
And when the obtained TCP target address is determined to be matched with the illegal web page address in the web page blacklist, intercepting the web page currently accessed by the user by tampering the TCP target address.
And when the obtained DNS domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted. Specifically, the domain name cannot be resolved into an IP (Internet Protocol) address by tampering the DNS reply packet, so that the purpose of intercepting the web page currently accessed by the user is achieved.
The web page access intercepting method provided by the embodiment of the invention acquires a web blacklist through a mobile terminal, wherein the web blacklist is a set of preset illegal web page addresses, acquires a web page URL currently accessed by a user, and acquires a flow data packet generated by the user accessing the web page by constructing a VPN service process, wherein the VPN service process comprises a TCP proxy service module and a DNS proxy service module, the flow data packet is a TCP data packet or a DNS data packet, analyzes the TCP data packet or the DNS data packet to acquire a corresponding target address or a domain name, matches any one of the URL, the target address and the domain name with the web blacklist, and intercepts the web page access when any one of the URL, the target address and the domain name is determined to be matched with the illegal web page address in the web blacklist, according to the web page access intercepting method provided by the embodiment of the invention, the root authority does not need to be acquired, and the web page blacklist configuration issuing platform can dynamically configure the web page blacklist to be issued to the mobile terminal according to the actual situation, so that the method is flexible and convenient; the method has the advantages that the URL of the web page currently accessed by the user is obtained by monitoring the browser database, the illegal web page accessed by the user through the browser can be intercepted in real time, and the illegal web page accessed by the user can be intercepted by constructing a VPN service process to obtain a flow data packet generated by accessing the web page. When the use permission of the VPN service is occupied by other applications, interception of a user for accessing an illegal web page by using a browser can still be carried out by monitoring the browser database, so that the interception is more comprehensive and effective, unnecessary network interaction is reduced because the identification interception is carried out locally at the mobile terminal, the interception efficiency is higher compared with that at a platform side, the consumed flow is less, the deployment is easy, and the interception complexity is reduced.
Example two
Based on the same inventive concept, the embodiment of the invention also provides a web page access intercepting device, and as the principle of the device for solving the problems is similar to the web page access intercepting method, the implementation of the device can refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 2, which is a schematic structural diagram of a web page access intercepting apparatus according to a second embodiment of the present invention, the web page access intercepting apparatus may include:
the first obtaining unit 21 is configured to obtain a web page blacklist, where the web page blacklist is a set of preset illegal web page addresses;
a second obtaining unit 22, configured to obtain a uniform resource locator URL of a web page currently accessed by a user, and obtain a traffic data packet generated by accessing the web page by constructing a virtual private network VPN service process, where the VPN service process includes a TCP proxy service module and a domain name system DNS proxy service module, and the traffic data packet is a TCP data packet or a DNS data packet;
the analyzing unit 23 is configured to analyze the TCP data packet or the DNS data packet to obtain a corresponding destination address or a domain name;
a matching unit 24, configured to match any one of the URL, the target address, and the domain name with the blacklist of the web page;
and the intercepting unit 25 is configured to intercept the web page access when it is determined that any one of the URL, the target address, and the domain name matches an illegal web page address in the web page blacklist.
Preferably, the second obtaining unit 22 is specifically configured to monitor a stored browser database, where the browser database is configured to record all URLs of web pages visited by the user using a browser; and acquiring the URL of the web page currently visited by the user from the browser database.
Preferably, the second obtaining unit 22 is specifically configured to monitor the stored browser database by calling an Android application programming interface Android API register Content Observer function.
Preferably, the intercepting unit 25 is specifically configured to, when it is determined that the URL matches an illegal web page address in the blacklist of web pages, jump the web page currently accessed by the user to a blacklist reminding page, and remind the user that the page is inaccessible; when the target address is determined to be matched with an illegal web page address in the web page blacklist, intercepting a web page currently accessed by the user by tampering the target address; and when the domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted.
Preferably, the intercepting unit 25 is specifically configured to jump the web page currently accessed by the user to a blacklist reminding page by calling an Android API start Activity function.
EXAMPLE III
The third embodiment of the invention provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein when the processor executes the program, the web page access intercepting method is realized.
Example four
A fourth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the method for intercepting access to a web page according to the first embodiment of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A web page access intercepting method is characterized by comprising the following steps:
acquiring a web page blacklist, wherein the web page blacklist is a set of preset illegal web page addresses;
the method comprises the steps of obtaining a Uniform Resource Locator (URL) of a web page currently accessed by a user, and obtaining a flow data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the flow data packet is a TCP data packet or a DNS data packet;
analyzing the TCP data packet or the DNS data packet to obtain a corresponding target address or a corresponding domain name;
matching any one of the URL, the target address and the domain name with the blacklist of the web page;
intercepting the web page access when any one of the URL, the target address and the domain name is determined to be matched with an illegal web page address in the web page blacklist;
the obtaining of the URL of the web page currently accessed by the user specifically includes:
monitoring a stored browser database, wherein the browser database is used for recording all web page URLs (uniform resource locators) accessed by the user by using a browser;
and acquiring the URL of the web page currently visited by the user from the browser database.
2. The method of claim 1, wherein monitoring the stored browser database specifically comprises:
and monitoring the stored browser database by calling an Android application programming interface (Android API) register Content Observer function.
3. The method of claim 1, wherein intercepting the web page access when it is determined that any one of the URL, the target address, and the domain name matches an illegitimate web page address in the blacklist of web pages comprises:
when the URL is determined to be matched with the illegal web page address in the web page blacklist, skipping the web page currently accessed by the user to a blacklist reminding page to remind the user that the page is inaccessible;
when the target address is determined to be matched with an illegal web page address in the web page blacklist, intercepting a web page currently accessed by the user by tampering the target address;
and when the domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted.
4. The method of claim 3, wherein jumping the web page currently accessed by the user to a blacklist reminder page specifically comprises:
and jumping the web page currently accessed by the user to a blacklist reminding page by calling an Android API start Activity function.
5. A web page access intercepting apparatus, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a web page blacklist, and the web page blacklist is a preset set of illegal web page addresses;
the second acquisition unit is used for acquiring a Uniform Resource Locator (URL) of a web page currently accessed by a user and acquiring a traffic data packet generated by accessing the web page by constructing a Virtual Private Network (VPN) service process, wherein the VPN service process comprises a Transmission Control Protocol (TCP) proxy service module and a Domain Name System (DNS) proxy service module, and the traffic data packet is a TCP data packet or a DNS data packet;
the analysis unit is used for analyzing the TCP data packet or the DNS data packet to obtain a corresponding target address or a corresponding domain name;
the matching unit is used for matching any one of the URL, the target address and the domain name with the blacklist of the web page;
the intercepting unit is used for intercepting the access of the web page when any one of the URL, the target address and the domain name is matched with an illegal web page address in the web page blacklist;
the second obtaining unit is specifically configured to monitor a stored browser database, where the browser database is configured to record all web page URLs that the user accesses using a browser; and acquiring the URL of the web page currently visited by the user from the browser database.
6. The apparatus of claim 5,
the second obtaining unit is specifically configured to monitor the stored browser database by calling an Android application programming interface Android API register Content Observer function.
7. The apparatus of claim 5,
the intercepting unit is specifically configured to jump the web page currently accessed by the user to a blacklist reminding page when it is determined that the URL matches an illegal web page address in the blacklist of web pages, and remind the user that the page is inaccessible; when the target address is determined to be matched with an illegal web page address in the web page blacklist, intercepting a web page currently accessed by the user by tampering the target address; and when the domain name is determined to be matched with the illegal web page address in the web page blacklist, the domain name cannot be analyzed by tampering the DNS response packet, and the web page currently accessed by the user is intercepted.
8. The apparatus of claim 7,
the intercepting unit is specifically configured to jump the web page currently accessed by the user to a blacklist reminding page by calling an Android API start Activity function.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the web page access intercepting method according to any one of claims 1 to 4 when executing the program.
10. A computer-readable storage medium having stored thereon a computer program, which when executed by a processor performs the steps in the web page access intercepting method of any one of claims 1-4.
CN201711140318.XA 2017-11-16 2017-11-16 Web page access intercepting method and device Active CN109802919B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711140318.XA CN109802919B (en) 2017-11-16 2017-11-16 Web page access intercepting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711140318.XA CN109802919B (en) 2017-11-16 2017-11-16 Web page access intercepting method and device

Publications (2)

Publication Number Publication Date
CN109802919A CN109802919A (en) 2019-05-24
CN109802919B true CN109802919B (en) 2021-06-29

Family

ID=66555767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711140318.XA Active CN109802919B (en) 2017-11-16 2017-11-16 Web page access intercepting method and device

Country Status (1)

Country Link
CN (1) CN109802919B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110427302A (en) * 2019-07-29 2019-11-08 努比亚技术有限公司 Trigger method, mobile terminal and the computer readable storage medium of content observer
CN113127813A (en) * 2019-12-30 2021-07-16 东软集团(上海)有限公司 J2EE WEB application abnormal access identification and control method, device and storage medium
CN111429199A (en) * 2020-01-14 2020-07-17 湖北淘大集供应链有限责任公司 Intelligent O2O food material supply chain management system and method
CN111399966B (en) * 2020-06-03 2020-09-18 广东睿江云计算股份有限公司 Method and system for hiding webpage
CN113190838A (en) * 2021-03-29 2021-07-30 贵州电网有限责任公司 Web attack behavior detection method and system based on expression
CN114390108B (en) * 2021-12-07 2024-03-12 新浪技术(中国)有限公司 Method and system for processing user service request

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338211A (en) * 2013-07-19 2013-10-02 腾讯科技(深圳)有限公司 Malicious URL (unified resource locator) authenticating method and device
CN105635178A (en) * 2016-02-26 2016-06-01 北京奇虎科技有限公司 Blocking network access method and device for ensuring safety
CN106055603A (en) * 2016-05-24 2016-10-26 北京奇虎科技有限公司 VPN-based browser access website recommendation method and system, and client
CN106095781A (en) * 2016-05-26 2016-11-09 北京小米移动软件有限公司 Malicious websites recognition methods and device
CN106104550A (en) * 2014-03-19 2016-11-09 日本电信电话株式会社 Site information extraction element, system, site information extracting method and site information extraction procedure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9692734B2 (en) * 2015-01-07 2017-06-27 Anchorfree Inc. Secure personal server system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338211A (en) * 2013-07-19 2013-10-02 腾讯科技(深圳)有限公司 Malicious URL (unified resource locator) authenticating method and device
CN106104550A (en) * 2014-03-19 2016-11-09 日本电信电话株式会社 Site information extraction element, system, site information extracting method and site information extraction procedure
CN105635178A (en) * 2016-02-26 2016-06-01 北京奇虎科技有限公司 Blocking network access method and device for ensuring safety
CN106055603A (en) * 2016-05-24 2016-10-26 北京奇虎科技有限公司 VPN-based browser access website recommendation method and system, and client
CN106095781A (en) * 2016-05-26 2016-11-09 北京小米移动软件有限公司 Malicious websites recognition methods and device

Also Published As

Publication number Publication date
CN109802919A (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN109802919B (en) Web page access intercepting method and device
JP6559694B2 (en) Automatic SDK acceptance
CN106936793B (en) Information interception processing method and terminal
US9436763B1 (en) Infrastructure enabling intelligent execution and crawling of a web application
US11126749B2 (en) Apparatus and method for securing web application server source code
CN109818937A (en) For the control method of Android permission, device and storage medium, electronic device
EP3170091B1 (en) Method and server of remote information query
CN103491543A (en) Method for detecting malicious websites through wireless terminal, and wireless terminal
CN109088909B (en) Service gray level publishing method and device based on merchant type
CN103607385A (en) Method and apparatus for security detection based on browser
CN107239701B (en) Method and device for identifying malicious website
WO2017080366A1 (en) Method and apparatus for recognising camouflage download link
US10659335B1 (en) Contextual analyses of network traffic
CN103428309A (en) Jump processing method for two-dimensional bar codes
CN105141709B (en) Determine the method and device of page jump in application program
US10931688B2 (en) Malicious website discovery using web analytics identifiers
JP6666441B2 (en) IP address obtaining method and apparatus
US11582226B2 (en) Malicious website discovery using legitimate third party identifiers
US20140208385A1 (en) Method, apparatus and system for webpage access control
CN104506529A (en) Website protection method and device
US20150365434A1 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
CN105100298A (en) Page access method in application program and apparatus thereof
CN111818038B (en) Network data acquisition and identification method and device
CN102833249B (en) The method and system of the applications client logging in network server of mobile terminal
CN113794731A (en) Method, device, equipment and medium for identifying disguised attack based on CDN flow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant