CN110620670A - Token acquisition method, data acquisition system, proxy server, and storage medium - Google Patents

Token acquisition method, data acquisition system, proxy server, and storage medium Download PDF

Info

Publication number
CN110620670A
CN110620670A CN201910979729.0A CN201910979729A CN110620670A CN 110620670 A CN110620670 A CN 110620670A CN 201910979729 A CN201910979729 A CN 201910979729A CN 110620670 A CN110620670 A CN 110620670A
Authority
CN
China
Prior art keywords
token
server
client
crawler
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910979729.0A
Other languages
Chinese (zh)
Inventor
陈国锋
梁大钊
胡郎平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Small Win Information Technology Co Ltd
Original Assignee
Shenzhen Small Win Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Small Win Information Technology Co Ltd filed Critical Shenzhen Small Win Information Technology Co Ltd
Priority to CN201910979729.0A priority Critical patent/CN110620670A/en
Publication of CN110620670A publication Critical patent/CN110620670A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention relates to the technical field of data acquisition, and discloses a token acquisition method, a data acquisition system, a proxy server and a storage medium. The method is applied to a proxy server, a client and at least one target server communicate through the proxy server, wherein the target server generates a token when the client requests service from the target server, and returns the token to the client through the proxy server, and the method comprises the following steps: analyzing to obtain a token returned to the client by the target server; and sending the token to a crawler server for the crawler server to crawl data from a corresponding target server according to the token. The embodiment of the invention obtains the token through the proxy server, thereby greatly reducing the difficulty of obtaining the token and further conveniently and effectively realizing data acquisition.

Description

Token acquisition method, data acquisition system, proxy server, and storage medium
Technical Field
The invention relates to the technical field of data acquisition, in particular to a token acquisition method, a data acquisition system, a proxy server and a storage medium.
Background
Token is a key used to identify the identity of a user to realize communication between a client and a server, and is a string of character strings generated by the server as an identifier of a service requested by a client. After the user logs in for the first time, the server generates a token and returns the token to the client, and the client can request data only by carrying the token later without carrying the user name and the password again, so that the safety and confidentiality effects are achieved.
The crawler service is an important data acquisition mode, and with the arrival of a big data era, the application of the crawler service is more and more extensive, and various data information can be provided for enterprises and the like. The existing crawler scheme generally sends a simulated login request through an account and a password at a server end to obtain a token, and then crawls corresponding data through the token.
The inventors found that the related art has at least the following problems: some special tokens can not be obtained through account password simulation login, for example, when some public data in a wechat applet is crawled, because the tokens are generated by encrypting the wechat client, the wechat source code is not public, the encryption algorithm is difficult to know, and the encryption generally needs a secret key, the correct tokens are very difficult to generate, and the data crawling difficulty is greatly increased.
Disclosure of Invention
The embodiment of the invention aims to provide a token acquisition method, a data acquisition system, a proxy server and a storage medium, wherein the token is acquired through the proxy server, so that the token acquisition difficulty is greatly reduced, and the data acquisition can be conveniently and effectively realized.
In order to solve the above technical problem, an embodiment of the present invention provides a token obtaining method, which is applied to a proxy server, where a client and at least one target server communicate through the proxy server, where the target server generates a token when the client requests a service from the target server, and returns the token to the client through the proxy server, the method including:
analyzing to obtain a token returned to the client by the target server;
and sending the token to a crawler server for the crawler server to crawl data from the corresponding target server according to the token.
An embodiment of the present invention further provides a data acquisition system, including: the system comprises a client, a proxy server, a crawler server and at least one target server;
the client communicates with the at least one target server through the proxy server;
the client is used for requesting service from the at least one target server through the proxy server, the target server generates a token and returns the token to the client through the proxy server;
the proxy server is also used for executing the token obtaining method;
the crawler server is used for crawling data from the corresponding target server according to the token.
An embodiment of the present invention further provides a proxy server, including: a memory storing a computer program and a processor running the computer program to implement the token acquisition method as described above.
Embodiments of the present invention also provide a storage medium for storing a computer-readable program for causing a computer to execute the token acquisition method as described above.
Compared with the prior art, the method and the system have the advantages that when the client communicates with the target server through the proxy server and requests service from the target server, the target server generates the token and returns the token to the client through the proxy server, the proxy server obtains the token through analyzing communication data between the client and the target server and sends the token to the crawler server, and therefore the crawler server can crawl data from the corresponding target server through the token. Therefore, the embodiment of the invention realizes data crawling by analyzing the token by the proxy server, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm when the crawler server directly obtains the token by a simulated login mode, and further ensuring that the data crawling is easier to realize.
As an embodiment, the proxy server obtains the token through parsing by using a preset proxy protocol preinstalled in the client.
As an embodiment, the client requests a service from the target server at preset time intervals;
the sending the token to the crawler server specifically includes:
and the proxy server sends each analyzed token to the crawler server. The token can thus be updated in time so that the crawler server can crawl data using valid tokens.
As an embodiment, the preset time interval is determined according to a validity period of the token.
As an embodiment, the proxy server sends the token to the crawler server through a preset interface.
As an embodiment, the proxy server is a hypertext transfer security protocol HTTPS proxy server. Thereby ensuring the security of the communication.
As an embodiment, the number of target servers is greater than one;
the sending the token to the crawler server specifically includes:
and establishing the analyzed mapping relation between the token and the corresponding target server, and sending the mapping relation and the token to the crawler server together for the crawler server to crawl data by adopting the token corresponding to the target server. Therefore, the crawler server can conveniently crawl data by adopting the token corresponding to the target server.
Drawings
FIG. 1 is a schematic diagram of a data acquisition system according to the present invention;
FIG. 2 is a flow chart of a token acquisition method according to a first embodiment of the present invention;
fig. 3 is a flowchart of a token acquisition method according to a second embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a proxy server according to a third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present invention in its various embodiments. However, the technical solution claimed in the present invention can be implemented without these technical details and various changes and modifications based on the following embodiments.
The first embodiment of the present invention relates to a token obtaining method, which is applied to a proxy server 200 in a data acquisition system as shown in fig. 1. The data collection system further comprises a client 100, a crawler server 400 and at least one target server 300. The client 100 and at least one target server 300 communicate through the proxy server 200, and the target server generates a token when the client 100 requests a service from the target server 300 and returns the token to the client 100 through the proxy server 200. In this embodiment, the client 100 and the crawler server 400 may be independent devices, or functions of both may be integrated into one device, which is not limited in this embodiment. For simplicity, only one target server 300 is shown in fig. 1, and in practical applications, the number of target servers 300 may also be two or more. The target server includes, but is not limited to, a WeChat server. The token acquisition method of the present embodiment includes: and analyzing to obtain a token returned by the target server to the client, and sending the token to the crawler server for the crawler server to crawl data from the corresponding target server according to the token. In this embodiment, when the client communicates with the target server through the proxy server and requests a service from the target server, the target server generates a token and returns the token to the client through the proxy server, and the proxy server obtains the token by analyzing communication data between the client and the target server and sends the token to the crawler server, so that the crawler server can crawl data from the corresponding target server through the token. Therefore, the embodiment of the invention realizes data crawling by analyzing the obtained token by the proxy server, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm when the crawler server directly obtains the token by a simulated login mode, and further conveniently and effectively obtaining the token, so that the data crawling is easier to realize.
The token acquisition method according to the present embodiment will be described in detail below with reference to fig. 1 and 2. The method comprises steps 202 and 204.
Step 202: and analyzing to obtain a token returned to the client by the target server.
In this embodiment, the proxy server may be a hypertext Transfer Protocol over Secure Socket Layer (HTTPS) proxy server, but is not limited thereto. The proxy server can analyze a preset proxy protocol pre-installed on the client to obtain the token, wherein the preset proxy protocol conforms to HTTPS protocol specifications, and when the client communicates with the proxy server through the preset proxy protocol, the proxy server can analyze communication data between the client and the target server according to the preset proxy protocol and analyze the token returned by the target server to the client from the communication data. Specifically, the proxy server may parse the token returned by the target server by identifying a URL (Uniform resource locator) logged in by the client.
Step 204: and sending the token to a crawler server for the crawler server to crawl data from a corresponding target server according to the token.
In practical applications, the client may request the service from the target server at preset time intervals, that is, the client may request the service from the target server at regular time. Wherein the preset time interval may be determined according to the validity period of the token. Generally, tokens generated by the target server all have a certain validity period, and therefore, when the lifetime of a token exceeds its validity period, the token will be invalid. In order to avoid the influence of token failure on data crawling, the token needs to be updated in time, so that the service can be requested from the target server at regular time through the client, and the token can be updated. The target server can be accessed at regular time by installing the script on the client, the script can be written by Python, and the embodiment does not limit the target server. In step 204, the proxy server sends each token parsed to the crawler server. Specifically, the proxy server may send the token to the crawler server through a preset interface. The crawler server crawls data from a corresponding target server according to the obtained token, the crawler server can adopt a data crawling strategy well known by technical personnel in the field to realize data crawling, and when crawling large-batch data, the crawler server can also adopt a concurrent or distributed mode to perform data crawling, and the data crawling is not repeated herein.
Compared with the prior art, the client communicates with the target server through the proxy server, the token is required to be returned to the client by the target server through the proxy server, the preset proxy protocol is pre-installed on the client, so that communication data between the target server and the client are resolved on the proxy server, the token returned to the client by the target server is also included, the token is obtained, and then the token is sent to the crawler server for the crawler server to crawl data. Therefore, the method can replace a mode of directly simulating login through the account password to conveniently and effectively acquire the token, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm to acquire the token in the mode, and further ensuring that the token is acquired more easily to ensure the smooth operation of data crawling.
The second embodiment of the invention relates to a token acquisition method, which is an improvement on the basis of the first embodiment, and the main improvement is that in the embodiment, a token identification mode under a multi-target server is further limited, so that a crawler server is ensured to accurately identify tokens corresponding to different target servers.
In this embodiment, the number of target servers in the data acquisition system is two or more. As shown in fig. 3, the token acquisition method of the present embodiment includes steps 302 and 304.
Step 302: and analyzing to obtain a token returned to the client by the target server.
Step 302 is the same as step 202 of the first embodiment, and is not described herein again.
Step 304: and establishing a mapping relation between the analyzed token and the corresponding target server, and sending the mapping relation and the token to the crawler server together for the crawler server to crawl data by adopting the token corresponding to the target server. For example, when a client requests service from a target server A, a token nA is obtained, when the client requests service from a target server B, a token B is obtained, the proxy server establishes a mapping relation between the token nA and the target server A as well as between the token B and the target server B, and sends a token and the mapping relation to the crawler server. When the crawler server crawls data, a target server corresponding to the token is determined through the token and the mapping relation, and therefore the data are crawled from the corresponding target server.
Compared with the prior art, the client communicates with the target server through the proxy server, the token is required to be returned to the client by the target server through the proxy server, the preset proxy protocol is pre-installed on the client, so that communication data between the target server and the client are resolved on the proxy server, the token returned to the client by the target server is also included, the token is obtained, and then the token is sent to the crawler server for the crawler server to crawl data. Therefore, the method can replace a mode of directly simulating login through the account password to conveniently and effectively acquire the token, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm to acquire the token in the mode, and further ensuring that the token is acquired more easily to ensure the smooth operation of data crawling. And the token, the mapping relation of the token and the target server and the token are sent to the crawler server together, so that the crawler server can accurately identify the target server corresponding to the token.
A third embodiment of the present invention relates to a proxy server. The proxy server according to this embodiment may be an independent server or a server group. As shown in fig. 4, the proxy server includes: a memory 402 and a processor 401;
wherein the memory 402 stores instructions executable by the at least one processor 401 to perform instructions executed by the at least one processor 401 to implement: analyzing to obtain a token returned to the client by the target server; and sending the token to a crawler server for the crawler server to crawl data from a corresponding target server according to the token.
The proxy server includes one or more processors 401 and a memory 402, and one processor 401 is taken as an example in fig. 4. The processor 401 and the memory 402 may be connected by a bus or other means, and fig. 4 illustrates the connection by a bus as an example. Memory 402, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The processor 401 executes various functional applications and data processing of the device, i.e. implements the token obtaining method described above, by running non-volatile software programs, instructions and modules stored in the memory 402.
The memory 402 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to an external device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more modules are stored in the memory 402 and, when executed by the one or more processors 401, perform the token derivation method of any of the method embodiments described above.
Compared with the prior art, the client communicates with the target server through the proxy server, the token is required to be returned to the client by the target server through the proxy server, the preset proxy protocol is pre-installed on the client, so that communication data between the target server and the client are resolved on the proxy server, the token returned to the client by the target server is also included, the token is obtained, and then the token is sent to the crawler server for the crawler server to crawl data. Therefore, the method can replace a mode of directly simulating login through the account password to conveniently and effectively acquire the token, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm to acquire the token in the mode, and further ensuring that the token is acquired more easily to ensure the smooth operation of data crawling.
The above-mentioned device can execute the method provided by the embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method, and reference may be made to the method provided by the embodiment of the present invention for technical details that are not described in detail in the embodiment.
A fourth embodiment of the present invention relates to a data acquisition system. Referring to fig. 1, the data acquisition system of the present embodiment includes: client 100, proxy server 200, crawler server 400, and at least one target server 300.
The client 100 communicates with at least one target server 300 through the proxy server 200, the client 100 is configured to request a service from the at least one target server 300 through the proxy server 200, the target server 300 generates a token and returns the token to the client 100 through the proxy server 200, the proxy server 100 is further configured to perform a token obtaining method according to the first or second embodiment, and the crawler server 400 is configured to crawl data from the corresponding target server 300 according to the token.
In practical applications, the client 100 and the crawler server 400 may be independent devices, or the functions of the client 100 and the crawler server 400 may also be integrated, which is not particularly limited in this embodiment.
Compared with the prior art, the client communicates with the target server through the proxy server, the token is required to be returned to the client by the target server through the proxy server, the preset proxy protocol is pre-installed on the client, so that communication data between the target server and the client are resolved on the proxy server, the token returned to the client by the target server is also included, the token is obtained, and then the token is sent to the crawler server for the crawler server to crawl data. Therefore, the method can replace a mode of directly simulating login through the account password to conveniently and effectively acquire the token, thereby avoiding the difficulty caused by the need of cracking the encryption algorithm to acquire the token in the mode, and further ensuring that the token is acquired more easily to ensure the smooth operation of data crawling.
A fifth embodiment of the invention relates to a non-volatile storage medium for storing a computer-readable program for causing a computer to perform some or all of the above method embodiments.
That is, those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. A token obtaining method applied to a proxy server, through which a client and at least one target server communicate, wherein the target server generates a token when the client requests a service from the target server, and returns the token to the client through the proxy server, the method comprising:
analyzing to obtain a token returned to the client by the target server;
and sending the token to a crawler server for the crawler server to crawl data from the corresponding target server according to the token.
2. The token obtaining method according to claim 1, wherein the proxy server obtains the token by parsing through a preset proxy protocol preinstalled in the client.
3. The token obtaining method according to claim 1, wherein the client requests a service from the target server at a preset time interval;
the sending the token to the crawler server specifically includes:
and the proxy server sends each analyzed token to the crawler server.
4. The token acquisition method of claim 3, wherein the predetermined time interval is determined according to a validity period of the token.
5. The token obtaining method of claim 1, wherein the proxy server sends the token to the crawler server through a preset interface.
6. The token derivation method of claim 1, wherein the proxy server is a hypertext transfer security protocol (HTTPS) proxy server.
7. The token acquisition method according to claim 1, wherein the number of the target servers is more than one;
the sending the token to the crawler server specifically includes:
and establishing the analyzed mapping relation between the token and the corresponding target server, and sending the mapping relation and the token to the crawler server together for the crawler server to crawl data by adopting the token corresponding to the target server.
8. A data acquisition system, comprising: the system comprises a client, a proxy server, a crawler server and at least one target server;
the client communicates with the at least one target server through the proxy server;
the client is used for requesting service from the at least one target server through the proxy server, the target server generates a token and returns the token to the client through the proxy server;
the proxy server is further configured to perform the token acquisition method of any one of claims 1 to 7;
the crawler server is used for crawling data from the corresponding target server according to the token.
9. A proxy server, comprising: a memory storing a computer program and a processor running the computer program to implement the token acquisition method of any one of claims 1 to 7.
10. A storage medium storing a computer-readable program for causing a computer to execute the token acquisition method according to any one of claims 1 to 7.
CN201910979729.0A 2019-10-15 2019-10-15 Token acquisition method, data acquisition system, proxy server, and storage medium Pending CN110620670A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910979729.0A CN110620670A (en) 2019-10-15 2019-10-15 Token acquisition method, data acquisition system, proxy server, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910979729.0A CN110620670A (en) 2019-10-15 2019-10-15 Token acquisition method, data acquisition system, proxy server, and storage medium

Publications (1)

Publication Number Publication Date
CN110620670A true CN110620670A (en) 2019-12-27

Family

ID=68925824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910979729.0A Pending CN110620670A (en) 2019-10-15 2019-10-15 Token acquisition method, data acquisition system, proxy server, and storage medium

Country Status (1)

Country Link
CN (1) CN110620670A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112463526A (en) * 2020-11-13 2021-03-09 苏州浪潮智能科技有限公司 Method and related device for acquiring server state
US11204971B1 (en) * 2021-07-08 2021-12-21 metacluster lt, UAB Token-based authentication for a proxy web scraping service
CN113934498A (en) * 2021-10-22 2022-01-14 盐城金堤科技有限公司 Data acquisition method, device and equipment of application program and computer storage medium
CN114928487A (en) * 2022-05-18 2022-08-19 山东浪潮智慧医疗科技有限公司 Method for solving failure of micro-signaling board in high-concurrency scene

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082634A1 (en) * 2005-03-17 2010-04-01 Roy Leban System, Method, and User Interface for Organizing and Searching Information
CN107103079A (en) * 2017-04-25 2017-08-29 中科院微电子研究所昆山分所 The live broadcasting method and system of a kind of dynamic website
US20180083781A1 (en) * 2016-09-19 2018-03-22 Verisign, Inc. Gtld domain name registries rdap architecture
CN108989187A (en) * 2018-07-27 2018-12-11 深信服科技股份有限公司 Mail instant alerts system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082634A1 (en) * 2005-03-17 2010-04-01 Roy Leban System, Method, and User Interface for Organizing and Searching Information
US20180083781A1 (en) * 2016-09-19 2018-03-22 Verisign, Inc. Gtld domain name registries rdap architecture
CN107103079A (en) * 2017-04-25 2017-08-29 中科院微电子研究所昆山分所 The live broadcasting method and system of a kind of dynamic website
CN108989187A (en) * 2018-07-27 2018-12-11 深信服科技股份有限公司 Mail instant alerts system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112463526A (en) * 2020-11-13 2021-03-09 苏州浪潮智能科技有限公司 Method and related device for acquiring server state
US11204971B1 (en) * 2021-07-08 2021-12-21 metacluster lt, UAB Token-based authentication for a proxy web scraping service
CN113934498A (en) * 2021-10-22 2022-01-14 盐城金堤科技有限公司 Data acquisition method, device and equipment of application program and computer storage medium
CN114928487A (en) * 2022-05-18 2022-08-19 山东浪潮智慧医疗科技有限公司 Method for solving failure of micro-signaling board in high-concurrency scene

Similar Documents

Publication Publication Date Title
US11089011B2 (en) Algorithm hardening in background context and external from the browser to prevent malicious intervention with the browser
CN110620670A (en) Token acquisition method, data acquisition system, proxy server, and storage medium
Fett et al. An expressive model for the web infrastructure: Definition and application to the browser id sso system
CN112019493B (en) Identity authentication method, identity authentication device, computer equipment and medium
CN102089767B (en) Authenticated database connectivity for unattended applications
EP2144420B1 (en) Web application security filtering
Miculan et al. Formal analysis of Facebook Connect single sign-on authentication protocol
US9923906B2 (en) System, method and computer program product for access authentication
US20190306148A1 (en) Method for oauth service through blockchain network, and terminal and server using the same
CN108259437B (en) HTTP access method, HTTP server and system
US20180020008A1 (en) Secure asynchronous communications
US20120260321A1 (en) Method and apparatus to auto-login to a browser application launched from an authenticated client application
CN107046544B (en) Method and device for identifying illegal access request to website
WO2017152050A1 (en) Deterministic reproduction of client/server computer state or output sent to one or more client computers
WO2016173199A1 (en) Mobile application single sign-on method and device
US10262146B2 (en) Application-to-application messaging over an insecure application programming interface
CN105354451B (en) Access authentication method and system
CN102682009A (en) Method and system for logging in webpage
US10257171B2 (en) Server public key pinning by URL
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN110730189B (en) Communication authentication method, device, equipment and storage medium
CN114024751B (en) Application access control method and device, computer equipment and storage medium
WO2022081334A1 (en) Systems and methods for autonomous program detection
CN111371811B (en) Resource calling method, resource calling device, client and service server
US9762571B2 (en) Securing connections to unsecure internet resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191227

RJ01 Rejection of invention patent application after publication