CN112748960A - Process control method and device, electronic equipment and storage medium - Google Patents

Process control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112748960A
CN112748960A CN201911043234.3A CN201911043234A CN112748960A CN 112748960 A CN112748960 A CN 112748960A CN 201911043234 A CN201911043234 A CN 201911043234A CN 112748960 A CN112748960 A CN 112748960A
Authority
CN
China
Prior art keywords
instruction information
matched
webpage
business
malicious
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911043234.3A
Other languages
Chinese (zh)
Inventor
赵安元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911043234.3A priority Critical patent/CN112748960A/en
Publication of CN112748960A publication Critical patent/CN112748960A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a process control method, which comprises the following steps: acquiring instruction information, and performing word segmentation processing on the instruction information; determining a keyword corresponding to the instruction information according to the word segmentation processing result; and triggering a business process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified business matched with the instruction information through the business process. The invention also provides a process control device, electronic equipment and a storage medium. According to the invention, the Rom and the App can be decoupled, the App can automatically execute the internal capacity to complete the specified service matched with the instruction information through the service process, the translation capacity which is required to be added by the Rom for upgrading the App due to continuous upgrading of the capacity of the App is reduced, the learning cost and the hardware cost are also reduced, and the use experience of a user is effectively improved.

Description

Process control method and device, electronic equipment and storage medium
Technical Field
The present invention relates to process control technologies, and in particular, to a process control method and apparatus, an electronic device, and a storage medium.
Background
In the conventional technology, when an application program (APP) is installed, the application program already informs a Read-Only Memory (Rom Read-Only Memory) of the terminal of its own processing capability through a corresponding registration process, and when any URL (Uniform Resource Locator) needs to be opened through the application program, after the Rom completes voice recognition and determines to trigger a corresponding instruction of an APP, the Rom directly triggers the process of registering the APP with the Rom, so that the aim of directly calling the APP internal capability by the Rom is fulfilled. However, in this process, Rom needs to analyze tasks that need to be completed by the App for corresponding voice commands, and commands need to be translated into intent (a structured object that can be recognized by Rom and App), and then the App is triggered by intent. In the process, the App capability is continuously upgraded, and the Rom needs to continuously add the translation capability for upgrading the App, so that the learning cost and the hardware cost are greatly improved.
Disclosure of Invention
In view of this, embodiments of the present invention provide a process control method and apparatus, an electronic device, and a storage medium, to decouple Rom and App, and execute an internal capability by the App itself without using Rom to directly trigger the internal capability of the App, so as to avoid that, because the capability of the App is continuously upgraded, Rom needs to continuously add a translation capability for upgrading the App, thereby greatly improving the learning cost and the hardware cost, and effectively improving the user experience.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a process control method, which comprises the following steps:
acquiring instruction information, and performing word segmentation processing on the instruction information;
determining a keyword corresponding to the instruction information according to the word segmentation processing result;
and triggering a business process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified business matched with the instruction information through the business process.
An embodiment of the present invention further provides a process control apparatus, where the apparatus includes:
the information transmission module is used for receiving the instruction information;
the information processing module is used for performing word segmentation processing on the instruction information;
the information processing module is used for determining a keyword corresponding to the instruction information according to the word segmentation processing result;
and the information processing module is used for triggering a business process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified business matched with the instruction information through the business process.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for determining a dynamic noise threshold value matched with the use environment of the instruction information;
the information processing module is used for carrying out denoising processing on the target text set according to the dynamic noise threshold value and triggering a first word segmentation strategy matched with the dynamic noise threshold value;
the information processing module is used for performing word segmentation processing on the instruction information according to a first word segmentation strategy matched with the dynamic noise threshold value to form a keyword matched with the instruction information;
the information processing module is used for determining a fixed noise threshold corresponding to the instruction information;
the information processing module is used for carrying out denoising processing on the target text set according to the fixed noise threshold value and triggering a second word segmentation strategy matched with the fixed noise threshold value;
and the information processing module is used for performing word segmentation processing on the instruction information according to a second word segmentation strategy matched with the fixed noise threshold value to form a keyword matched with the instruction information.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for traversing a corresponding service parameter table according to the keyword corresponding to the instruction information and determining the service parameter matched with the keyword;
and the information processing module is used for triggering the business process matched with the business parameters according to the business parameters matched with the keywords.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for analyzing the service parameters matched with the keywords and determining the real-time process path parameters and the access updating time parameters matched with the service process;
the information processing module is used for matching the real-time process path parameter and the access updating time parameter according to the corresponding blocking list and determining a corresponding matching result;
the information processing module is used for acquiring a target webpage matched with the business process according to the matching result of the real-time process path parameter and the access updating time parameter;
and the information processing module is used for intercepting the triggered business process.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for determining a target webpage of the business process as a resource transfer webpage according to the real-time process path parameter, wherein the resource transfer webpage is used for carrying out online resource transfer;
the information processing module is used for acquiring a malicious webpage access record corresponding to the terminal, wherein the malicious webpage access record is used for recording access history information of the terminal to a malicious webpage;
and the information processing module is used for determining the incidence relation between the resource transfer webpage and the malicious webpage access record according to the update time parameter and intercepting the business process according to the incidence relation between the resource transfer webpage and the malicious webpage access record.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for traversing the malicious webpage access records and determining a jump time set of the malicious webpage in the malicious webpage access records;
the information processing module is used for matching the update time parameter according to the jump time set of the malicious webpage;
the information processing module is used for determining the resource transfer webpage to be a malicious resource transfer webpage when the update time parameter can be matched with the jump time set of the malicious webpage;
and the information processing module is used for intercepting the business process when the determined resource transfer webpage is a malicious resource transfer webpage.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for processing the instruction information when the business process completes the specified business matched with the instruction information,
and the information processing module is used for generating a target block based on the instruction information, the process triggering information and the target webpage matched with the business process, and adding the target block into the block chain network.
An embodiment of the present invention further provides an electronic device, where the server includes:
a memory for storing executable instructions;
and the processor is used for realizing the preorder process control method when the executable instructions stored in the memory are operated.
An embodiment of the present invention further provides a computer-readable storage medium, which stores executable instructions, and when the executable instructions are executed by a processor, the method for controlling a process according to a preamble is implemented.
The embodiment of the invention has the following beneficial effects:
obtaining instruction information and performing word segmentation processing on the instruction information; determining a keyword corresponding to the instruction information according to the word segmentation processing result; according to the key words corresponding to the instruction information, the business process matched with the instruction information is triggered to achieve the purpose that the specified business matched with the instruction information is completed through the business process, so that the purpose that the Rom and the App are decoupled is achieved, the internal capacity is automatically executed through the App, the internal capacity of the App is not directly triggered by the Rom to trigger the corresponding business process, the specified business matched with the instruction information is completed through the business process, the problem that due to the fact that the capacity of the App is continuously upgraded, the Rom needs to continuously add the translation capacity for upgrading the App is solved, learning cost and hardware cost are reduced, and use experience of a user is effectively improved.
Drawings
Fig. 1 is a schematic view of a usage scenario of a process control method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 3 is an optional flowchart of a process control method according to an embodiment of the present invention;
fig. 4 is an optional flowchart of a process control method according to an embodiment of the present invention;
fig. 5 is an optional flowchart of a process control method according to an embodiment of the present invention;
fig. 6 is an optional flowchart of a process control method according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an optional front-end display interface of the process control method according to the embodiment of the present invention;
FIG. 8 is a block diagram of a process control apparatus 100 according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a block chain in the block chain network 200 according to an embodiment of the present invention;
fig. 10 is a functional architecture diagram of a blockchain network 200 according to an embodiment of the present invention;
FIG. 11 is a schematic view of an alternative process flow of the process control method of the present invention;
FIG. 12 is a schematic process flow diagram illustrating an alternative process control method provided by the present invention;
FIG. 13 is a schematic view of an alternative display interface of the process control method of the present invention;
fig. 14 is a schematic view of an alternative display interface of the process control method according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
1) API: the full Application Programming Interface can be translated into an Application program Interface, and is a predefined function or a convention for linking different components of a software system. The goal is to provide applications and developers the ability to access a set of routines based on certain software or hardware without having to access native code or understand the details of the internal workings.
2) And (3) SDK: the full-name Software Development Kit can be translated into a Software Development tool package, and is a collection of Development tools when application Software is established for a specific Software package, a Software framework, a hardware platform, an operating system and the like, and broadly comprises a collection of related documents, paradigms and tools for assisting in developing a certain type of Software.
3) In response to the condition or state on which the performed operation depends, one or more of the performed operations may be in real-time or may have a set delay when the dependent condition or state is satisfied; there is no restriction on the order of execution of the operations performed unless otherwise specified.
Fig. 1 is a schematic view of a usage scenario of a process control method provided in an embodiment of the present invention, referring to fig. 1, a terminal (including a terminal 10-1 and a terminal 10-2) is provided with corresponding clients capable of executing different functions, where the clients are terminals (including the terminal 10-1 and the terminal 10-2) that acquire different web pages from corresponding servers 200 through different service processes via a network 300 for browsing, the terminal is connected to the servers 200 through the network 300, the network 300 may be a wide area network or a local area network, or a combination of the two, and data transmission is implemented using a wireless link, where types of the web pages acquired by the terminals (including the terminal 10-1 and the terminal 10-2) from the corresponding servers 200 through the network 300 are different, for example: the terminal (including the terminal 10-1 and the terminal 10-2) can obtain a video webpage (i.e. the webpage carries video information or a corresponding video link) from the corresponding server 200 through the network 300, and can also obtain a corresponding webpage only including characters or images from the corresponding server 200 through the network 300 for browsing. Different types of web pages may be stored in server 200. In some embodiments of the invention, different types of web pages maintained in server 200 may be written in software code in different programming languages, and code objects may be different types of code entities. For example, in the software code of C language, one code object may be one function. In the software code of JAVA language, a code object may be a class, and the OC language of IOS terminal may be a target code. In the software code of the C + + language, a code object may be a class or a function. Wherein the 1 compiling environment of different types of web pages is not distinguished any more in the present application.
The server 400 needs to monitor the target web page to be accessed by different instruction information in the process that the server 200 transmits different types of web pages to the terminal (the terminal 10-1 and/or the terminal 10-2) through the network 300, and therefore. As an example, the server 400 is used for receiving instruction information sent by the terminal; acquiring an access parameter corresponding to the instruction information; screening the instruction information according to the access parameters to judge whether the corresponding process is in a blocking list; acquiring an access parameter corresponding to the instruction information; and screening the instruction information according to the access parameters to realize real-time blocking of the corresponding process.
As described in detail below, the server according to the embodiment of the present invention may be implemented in various forms, such as a dedicated terminal with a program control function, for example, a gateway, or a server with a program control function, for example, the server 400 in fig. 1. Fig. 2 is a schematic diagram of a composition structure of an electronic device according to an embodiment of the present invention, and it is understood that fig. 2 only shows an exemplary structure of the electronic device, and not a whole structure, and a part of the structure or the whole structure shown in fig. 2 may be implemented as needed.
The server provided by the embodiment of the invention comprises: at least one processor 201, memory 202, user interface 203, and at least one network interface 204. The various components in the electronic device are coupled together by a bus system 205. It will be appreciated that the bus system 205 is used to enable communications among the components. The bus system 205 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 205 in fig. 2.
The user interface 203 may include, among other things, a display, a keyboard, a mouse, a trackball, a click wheel, a key, a button, a touch pad, or a touch screen.
It will be appreciated that the memory 202 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. The memory 202 in embodiments of the present invention is capable of storing data to support operation of the terminal (e.g., 10-1). Examples of such data include: any computer program, such as an operating system and application programs, for operating on a terminal (e.g., 10-1). The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
In some embodiments, the process control apparatus provided in the embodiments of the present invention may be implemented by a combination of hardware and software, and for example, the process control apparatus provided in the embodiments of the present invention may be a processor in the form of a hardware decoding processor, which is programmed to execute the process control method provided in the embodiments of the present invention. For example, a processor in the form of a hardware decoding processor may employ one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), or other electronic components.
As an example of the process control device provided by the embodiment of the present invention implemented by combining software and hardware, the process control device provided by the embodiment of the present invention may be directly embodied as a combination of software modules executed by the processor 201, where the software modules may be located in a storage medium located in the memory 202, and the processor 201 reads executable instructions included in the software modules in the memory 202, and completes the process control method provided by the embodiment of the present invention in combination with necessary hardware (for example, including the processor 201 and other components connected to the bus 205).
By way of example, the Processor 201 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
As an example of the process control Device provided by the embodiment of the present invention implemented by hardware, the Device provided by the embodiment of the present invention may be implemented by directly using the processor 201 in the form of a hardware decoding processor, for example, by being executed by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), or other electronic components, to implement the process control method provided by the embodiment of the present invention.
The memory 202 in embodiments of the present invention is used to store various types of data to support the operation of the electronic device. Examples of such data include: any executable instructions for operating on an electronic device, such as executable instructions, may be included in the program that implements the slave process control method of embodiments of the present invention.
In other embodiments, the process control apparatus provided by the embodiment of the present invention may be implemented by software, and fig. 2 shows the process control apparatus 2020 stored in the memory 202, which may be software in the form of programs, plug-ins, and the like, and includes a series of modules, and as examples of the programs stored in the memory 202, the process control apparatus 2020 may include the process control apparatus 2020, and the process control apparatus 2020 includes the following software modules: an information processing module 2081, and an information processing module 2082. When the software modules in the process control apparatus 2020 are read into the RAM by the processor 201 and executed, the functions of the software modules in the process control apparatus 2020 are described as follows:
the information transmission module 2081, which is used for receiving instruction information;
the information processing module 2082 is used for performing word segmentation processing on the instruction information;
the information processing module 2082 is configured to determine a keyword corresponding to the instruction information according to the word segmentation processing result;
the information processing module 2082 is configured to trigger a service process matched with the instruction information according to the keyword corresponding to the instruction information, so as to implement that the specified service matched with the instruction information is completed through the service process.
Referring to fig. 3, fig. 3 is an optional flowchart of the process control method provided in the embodiment of the present invention, and it can be understood that the steps shown in fig. 3 may be executed by various servers running the process control apparatus, for example, a dedicated terminal, a server, or a server cluster with a process control function. The following is a description of the steps shown in fig. 3.
Step 301: the process control device acquires the instruction information.
In some embodiments of the present invention, when a user triggers a corresponding process through a terminal to access a target webpage, instruction information may be sent to a corresponding web server, where the instruction information includes, but is not limited to: voice instructions, gesture instructions, and text instructions.
Step 302: and the process control device carries out word segmentation processing on the instruction information.
Step 303: and the process control device determines the keywords corresponding to the instruction information according to the word segmentation processing result.
Step 304: and triggering the business process matched with the instruction information by the process control device according to the keyword corresponding to the instruction information so as to realize the completion of the specified business matched with the instruction information through the business process.
In some embodiments of the present invention, the obtaining instruction information and performing word segmentation processing on the instruction information may be implemented by:
determining a dynamic noise threshold value matched with the use environment of the instruction information; denoising the target text set according to the dynamic noise threshold value, and triggering a first segmentation strategy matched with the dynamic noise threshold value; and performing word segmentation processing on the instruction information according to a first word segmentation strategy matched with the dynamic noise threshold value to form a keyword matched with the instruction information. Because the using environment, the type and the triggering mode of the instruction information are different, the dynamic noise threshold value matched with the using environment of the instruction information is also different, for example, in the using environment of academic translation, the dynamic noise threshold value matched with the using environment of the instruction information needs to be smaller than that in the article reading environment.
In some embodiments of the present invention, the obtaining instruction information and performing word segmentation processing on the instruction information may be implemented by:
determining a fixed noise threshold corresponding to the instruction information; denoising the target text set according to the fixed noise threshold value, and triggering a second word segmentation strategy matched with the fixed noise threshold value; and performing word segmentation processing on the instruction information according to a second word segmentation strategy matched with the fixed noise threshold value to form a keyword matched with the instruction information. When the instruction information is solidified in the corresponding hardware mechanism and the using environment is spoken translation, the training speed of the instruction information can be effectively improved and the waiting time of a user is reduced by fixing the fixed noise threshold corresponding to the instruction information.
Continuing to describe the process control method provided by the embodiment of the present invention with reference to the electronic device shown in fig. 2, referring to fig. 4, fig. 4 is an optional flowchart of the process control method provided by the embodiment of the present invention, and it can be understood that the steps shown in fig. 4 may be executed by various servers running the process control apparatus, for example, a dedicated terminal, a server or a server cluster with a process control function. The following is a description of the steps shown in fig. 4.
Step 3041: and the process control device traverses the corresponding service parameter table according to the key words corresponding to the instruction information, and determines the service parameters matched with the key words.
Step 3042: and triggering the business process matched with the business parameters by the process control device according to the business parameters matched with the keywords.
In order to facilitate the process control device to trigger the service process matched with the service parameter according to the service parameter matched with the keyword, the service parameter matched with the keyword may be stored in a corresponding service parameter table in advance, for example: the keyword is 'weather', and the corresponding service parameter can be a webpage address of the weather station and/or a voice page parameter with a weather broadcasting function.
Continuing to describe the process control method provided by the embodiment of the present invention with reference to the electronic device shown in fig. 2, referring to fig. 5, fig. 5 is an optional flowchart of the process control method provided by the embodiment of the present invention, and it can be understood that the steps shown in fig. 5 may be executed by various servers running the process control apparatus, for example, a dedicated terminal, a server or a server cluster with a process control function. The following is a description of the steps shown in fig. 5.
Step 501: the process control device analyzes the service parameters matched with the keywords and determines the real-time process path parameters and the access updating time parameters matched with the service process;
step 502: the process control device performs matching processing on the real-time process path parameter and the access updating time parameter according to the corresponding blocking list, and determines a corresponding matching result;
step 503: and acquiring a target webpage matched with the business process according to the matching result of the real-time process path parameter and the access updating time parameter.
Step 504: and the process control device intercepts the triggered business process according to the matching result of the real-time process path parameter and the access updating time parameter.
The process control device can set a corresponding blocking list according to a preset rule or historical interception information, and when the real-time process path parameter and the access updating time parameter are matched according to the blocking list and the real-time process path parameter and/or the access updating time parameter are/is consistent with the information in the blocking list in a matching mode, the process control device can determine that the instruction information is malicious webpage corresponding to the target webpage and should intercept the target webpage.
In some embodiments of the present invention, the process control apparatus performs a first matching process on the uniform resource locator of the target web page to be triggered by the service process according to the target home region, and may be implemented in the following manner:
acquiring the domain name parameter of the target webpage corresponding to the uniform resource locator of the target webpage; acquiring attribution area information of the target webpage holder corresponding to the target webpage domain name parameter; and performing first matching processing on the uniform resource locator of the target webpage according to the attribution area information of the target webpage holder and the target attribution area so as to acquire the uniform resource locator matched with the target attribution area. Because it is complicated to directly obtain the home information of the url, the domain name of each url can be extracted, and then the corresponding relationship between the url and the holder is indirectly known by connecting the domain name and the corresponding table of the holder. Therefore, the holders of the corresponding attribution can be filtered out, the domain names corresponding to the holders and the url links corresponding to the domain names can be found, and therefore the total target url can be obtained.
Continuing to describe the process control method provided by the embodiment of the present invention with reference to the electronic device shown in fig. 2, referring to fig. 6, fig. 6 is an optional flowchart of the process control method provided by the embodiment of the present invention, and it can be understood that the steps shown in fig. 6 may be executed by various process control devices operating the process control devices, for example, a dedicated terminal with a process control function, a process control device, or a process control device cluster. The following is a description of the steps shown in fig. 6.
Step 601: and the process control device determines that the target webpage of the instruction information is a resource transfer webpage according to the real-time process path parameter.
The resource transfer webpage is used for carrying out online resource transfer.
In some embodiments of the present invention, when the terminal displays the resource transfer webpage including the resource transfer graphics code, the URL corresponding to the resource transfer webpage includes a resource transfer link (i.e., the pre-transaction payment link) corresponding to the resource transfer graphics code, and formats of the resource transfer links adopted by different resource transfer platforms are different. Therefore, in one possible embodiment, when identifying whether the webpage currently accessed by the terminal is the resource transfer webpage, the process control device detects whether the URL of the webpage contains a resource transfer link, and when the URL contains the resource transfer link, may determine that the webpage is the resource transfer webpage. Since the web page to be skipped by the resource transfer web page may be a malicious web page, the security of the resource transfer web page needs to be verified.
Step 602: and the process control device acquires the malicious webpage access record corresponding to the terminal.
And the malicious webpage access record is used for recording access history information of the terminal to the malicious webpage.
In some embodiments of the present invention, an optional representation of the malicious web page access record is shown in table 1, and includes a business process identifier, a malicious web address, a malicious type, and an access time.
Figure BDA0002253428860000121
Figure BDA0002253428860000131
TABLE 1
In some embodiments of the present invention, in order to ensure the user privacy, the process control device performs an irreversible Hash calculation on a network environment parameter of the terminal, for example, such as an internet protocol address (IP internet protocol), a media Access control address mac (media Access control), or a user account used when logging in an application program, for example, performs a Hash calculation on the user account through an Algorithm such as MD5 or SHA-256(Secure Hash Algorithm), and uses a Hash value obtained by the calculation as a service process identifier.
Step 603: and the process control device determines the incidence relation between the resource transfer webpage and the malicious webpage access record according to the update time parameter.
In some embodiments of the present invention, the association relationship between the resource transfer webpage and the malicious webpage access record is determined according to the update time parameter, and the instruction information is intercepted according to the association relationship between the resource transfer webpage and the malicious webpage access record, which can be implemented by the following steps:
traversing the malicious webpage access record, and determining a jump time set of the malicious webpage in the malicious webpage access record; matching the update time parameters according to the jump time set of the malicious webpage; when the update time parameter can be matched with the jump time set of the malicious webpage, determining that the resource transfer webpage is the malicious resource transfer webpage; and intercepting the instruction information when the determined resource transfer webpage is a malicious resource transfer webpage. The malicious resource transfer webpage usually jumps to the malicious webpage within a short time (or a fixed time), so that the update time parameter is matched according to the jump time set of the malicious webpage; when the update time parameter can be matched with the jump time set of the malicious webpage, the resource transfer webpage is determined to be the malicious resource transfer webpage, so that the malicious webpage can be quickly identified, the waiting time of a user is reduced, and the use experience of the user is improved.
In some embodiments of the present invention, after the process control device determines the association relationship between the malicious resource transfer webpage and the malicious webpage, the process control device stores the malicious resource transfer webpage and the malicious webpage in the malicious resource transfer database in an associated manner, where each piece of data in the malicious resource transfer database includes the access record shown in table 1 and the access record shown in table 2 below.
Business process identification Website of malicious resource transfer webpage Type (B) Time of access
Business A Process 1 http://www.zijie-b.com Lottery game 2020-01-01 16:44:01
Business A Process 2 http://www.zijie-c.com Pornography 2020-01-01 17:44:01
Business C Process 3 http://www.zijie-a.com Violence 2020-01-01 18:44:01
Service D Process 4 http://www.zijie-d.com Lottery game 2020-01-01 19:44:01
TABLE 2
Step 604: and the process control device intercepts the instruction information according to the incidence relation between the resource transfer webpage and the malicious webpage access record.
Furthermore, the process to be intercepted can be verified again in a third party verification mode, and therefore the mistaken interception is avoided.
Referring to fig. 7, fig. 7 is a schematic diagram of an optional front-end display interface of the process control method according to the embodiment of the present invention, and through the display interface shown in fig. 7, the terminal can know which instruction information is intercepted and which business process is triggered while maintaining a normal working state.
Therefore, when the determined resource transfer webpage is a malicious resource transfer webpage, the instruction information is intercepted, attacks of the malicious webpage on the process and the terminal can be effectively avoided, and loss of the malicious webpage on a user is reduced.
In some embodiments of the invention, the method further comprises:
and when the business process completes the specified business matched with the instruction information, generating a target block based on the instruction information, the process trigger information and a target webpage matched with the business process, and adding the target block into the block chain network. The instruction information, the process trigger information and the target webpage matched with the business process stored in the blockchain network cannot be tampered, so that the analysis of whether the target webpage corresponding to the business process is a malicious webpage is facilitated, and the safety of process control is improved.
With continued reference to fig. 8, fig. 8 is a schematic structural diagram of the process control apparatus 100 according to the embodiment of the present invention, which includes a blockchain network 200 (exemplarily illustrating the consensus node 210-1 to the consensus node 210-3), an authentication center 300, a service agent 400, and a service agent 500, which are respectively described below.
The type of blockchain network 200 is flexible and may be, for example, any of a public chain, a private chain, or a federation chain. Taking a public link as an example, electronic devices such as user terminals and servers of any service entity can access the blockchain network 200 without authorization; taking a federation chain as an example, an electronic device (e.g., a terminal/server) under the jurisdiction of a service entity after obtaining authorization may access the blockchain network 200, and at this time, become a client node in the blockchain network 200.
In some embodiments, the client node may act as a mere watcher of the blockchain network 200, i.e., provides functionality to support a business entity to initiate a transaction (e.g., for uplink storage of data or querying of data on a chain), and may be implemented by default or selectively (e.g., depending on the specific business requirements of the business entity) with respect to the functions of the consensus node 210 of the blockchain network 200, such as a ranking function, a consensus service, and an accounting function, etc. Therefore, the data and the service processing logic of the service subject can be migrated into the block chain network 200 to the maximum extent, and the credibility and traceability of the data and service processing process are realized through the block chain network 200.
Consensus nodes in blockchain network 200 receive transactions submitted from client nodes (e.g., client node 410 shown in fig. 1 as being attributed to business entity 400 and business entity 500) of different business entities (e.g., business entity 400 and business entity 500 shown in fig. 1), perform the transactions to update the ledger or query the ledger, and various intermediate or final results of performing the transactions may be returned for display in the business entity's client nodes.
For example, the client node 410/510 may subscribe to events of interest in the blockchain network 200, such as transactions occurring in a particular organization/channel in the blockchain network 200, and the corresponding transaction notifications are pushed by the consensus node 210 to the client node 410/510, thereby triggering the corresponding business logic in the client node 410/510.
An exemplary application of the blockchain network is described below, taking an example that a plurality of service agents access the blockchain network to implement management of instruction information and service processes matched with the instruction information.
Referring to fig. 8, a plurality of business entities involved in the management link, for example, the business entity 400 may be an artificial intelligence-based process control device, the business entity 500 may be a display system with a process control device function, and registers from the certificate authority 300 to obtain respective digital certificates, where the digital certificates include the public key of the business entity and the digital signature signed by the certificate authority 300 for the public key and the identity information of the business entity, and are used to be attached to the transaction together with the digital signature of the business entity for the transaction, and are sent to the blockchain network, so that the blockchain network takes out the digital certificate and the signature from the transaction, verifies the authenticity of the message (i.e., whether the message is not tampered) and the identity information of the business entity sending the message, and verifies the blockchain network according to the identity, for example, whether the blockchain network has the right to initiate the transaction. Clients running on electronic devices (e.g., terminals or servers) hosted by the business entity may request access from the blockchain network 200 to become client nodes.
The client node 410 of the service body 400 is configured to obtain instruction information and perform word segmentation processing on the instruction information; determining a keyword corresponding to the instruction information according to the word segmentation processing result; and triggering the service process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified service matched with the instruction information through the service process, and sending the corresponding instruction information and the service process information matched with the instruction information to the block chain network 200.
The corresponding instruction information and the service progress information matched with the instruction information are sent to the blockchain network 200, a service logic may be set in the client node 410 in advance, when a corresponding three-dimensional map is formed, the client node 410 automatically sends the instruction information to be processed and the service progress information matched with the instruction information to the blockchain network 200, or a service person of the service main body 400 logs in the client node 410, manually packages the instruction information, the service progress information matched with the instruction information and the corresponding conversion progress information, and sends the instruction information, the service progress information matched with the instruction information and the corresponding conversion progress information to the blockchain network 200. During sending, the client node 410 generates a transaction corresponding to the update operation according to the instruction information, the business process information matched with the instruction information, and the corresponding converted business process information, specifies an intelligent contract to be called for implementing the update operation, and parameters transferred to the intelligent contract in the transaction, and also carries a digital certificate of the client node 410 and a signed digital signature (for example, a digest of the transaction is encrypted by using a private key in the digital certificate of the client node 410), and broadcasts the transaction to the consensus node 210 in the blockchain network 200.
When the transaction is received in the consensus node 210 in the blockchain network 200, the digital certificate and the digital signature carried by the transaction are verified, after the verification is successful, whether the service agent 400 has the transaction right is determined according to the identity of the service agent 400 carried in the transaction, and the transaction fails due to any verification judgment of the digital signature and the right verification. After successful verification, node 210 signs its own digital signature (e.g., by encrypting the digest of the transaction using the private key of node 210-1) and continues to broadcast in blockchain network 200.
After receiving the transaction successfully verified, the consensus node 210 in the blockchain network 200 fills the transaction into a new block and broadcasts the new block. When a new block is broadcasted by the consensus node 210 in the block chain network 200, performing a consensus process on the new block, if the consensus is successful, adding the new block to the tail of the block chain stored in the new block, updating the state database according to a transaction result, and executing a transaction in the new block: and for the transaction of submitting and updating the instruction information to be processed, the business process information matched with the instruction information and the corresponding process trigger information, adding a key value pair comprising the instruction information, the business process information matched with the instruction information and the corresponding process trigger information into a state database.
The service personnel of the service agent 500 logs in the client node 510, inputs instruction information and a service process information query request matched with the instruction information, the client node 510 generates a transaction corresponding to an update operation/query operation according to the instruction information and the service process information query request matched with the instruction information, specifies an intelligent contract required to be called for realizing the update operation/query operation and parameters transferred to the intelligent contract in the transaction, and the transaction also carries a digital certificate of the client node 510 and a signed digital signature (for example, a digest of the transaction is encrypted by using a private key in the digital certificate of the client node 510), and broadcasts the transaction to the consensus node 210 in the blockchain network 200.
After receiving the transaction in the consensus node 210 in the blockchain network 200, verifying the transaction, filling the block and making the consensus consistent, adding the filled new block to the tail of the blockchain stored in the new block, updating the state database according to the transaction result, and executing the transaction in the new block: for the submitted transaction of the manual identification result corresponding to the updated three-dimensional map data information, updating the key value pair corresponding to the three-dimensional map data information in the state database according to the manual identification result; for the submitted transaction for inquiring the data information of a certain three-dimensional map, inquiring instruction information and a key value pair corresponding to the business process information matched with the instruction information from a state database, and returning a transaction result.
It should be noted that fig. 8 exemplarily shows a process of directly linking the instruction information and the service process information and the corresponding process trigger information matching the instruction information, but in other embodiments, for a case that the instruction information and the service process information matching the instruction information have a large data volume, the client node 410 may pair the uplink by the hash of the instruction information and the service process information matching the instruction information and the hash of the corresponding instruction information and the service process information matching the instruction information, and store the instruction information and the service process information and the corresponding process trigger information matching the instruction information in the distributed file system or the database. After the client node 510 acquires the instruction information, the service process information matched with the instruction information, and the corresponding process trigger information from the distributed file system or the database, the corresponding hash in the block chain network 200 may be combined to perform verification, thereby reducing the workload of uplink operation.
As an example of a block chain, referring to fig. 9, fig. 9 is a schematic structural diagram of a block chain in a block chain network 200 according to an embodiment of the present invention, where a header of each block may include hash values of all transactions in the block and also include hash values of all transactions in a previous block, a record of a newly generated transaction is filled in the block and is added to a tail of the block chain after being identified by nodes in the block chain network, so as to form a chain growth, and a chain structure based on hash values between blocks ensures tamper resistance and forgery prevention of transactions in the block.
An exemplary functional architecture of a block chain network provided in the embodiment of the present invention is described below, referring to fig. 10, fig. 10 is a schematic functional architecture diagram of a block chain network 200 provided in the embodiment of the present invention, which includes an application layer 201, a consensus layer 202, a network layer 203, a data layer 204, and a resource layer 205, which are described below respectively.
The resource layer 205 encapsulates the computing, storage, and communication resources that implement each node 210 in the blockchain network 200.
The data layer 204 encapsulates various data structures that implement the ledger, including blockchains implemented in files in a file system, state databases of the key-value type, and presence certificates (e.g., hash trees of transactions in blocks).
The network layer 203 encapsulates the functions of a Point-to-Point (P2P) network protocol, a data propagation mechanism and a data verification mechanism, an access authentication mechanism and service agent identity management.
Wherein the P2P network protocol implements communication between nodes 210 in the blockchain network 200, the data propagation mechanism ensures propagation of transactions in the blockchain network 200, and the data verification mechanism implements reliability of data transmission between nodes 210 based on cryptography methods (e.g., digital certificates, digital signatures, public/private key pairs); the access authentication mechanism is used for authenticating the identity of the service subject added into the block chain network 200 according to an actual service scene, and endowing the service subject with the authority of accessing the block chain network 200 when the authentication is passed; the business entity identity management is used to store the identity of the business entity that is allowed to access blockchain network 200, as well as the permissions (e.g., the types of transactions that can be initiated).
The consensus layer 202 encapsulates the functions of the mechanism for the nodes 210 in the blockchain network 200 to agree on a block (i.e., a consensus mechanism), transaction management, and ledger management. The consensus mechanism comprises consensus algorithms such as POS, POW and DPOS, and the pluggable consensus algorithm is supported.
The transaction management is configured to verify a digital signature carried in the transaction received by the node 210, verify identity information of the service entity, and determine whether the node has an authority to perform the transaction (read related information from the identity management of the service entity) according to the identity information; for the service agents authorized to access the blockchain network 200, the service agents all have digital certificates issued by the certificate authority, and the service agents sign the submitted transactions by using private keys in the digital certificates of the service agents, so that the legal identities of the service agents are declared.
The ledger administration is used to maintain blockchains and state databases. For the block with the consensus, adding the block to the tail of the block chain; executing the transaction in the acquired consensus block, updating the key-value pairs in the state database when the transaction comprises an update operation, querying the key-value pairs in the state database when the transaction comprises a query operation and returning a query result to the client node of the business entity. Supporting query operations for multiple dimensions of a state database, comprising: querying the block based on the block vector number (e.g., hash value of the transaction); inquiring the block according to the block hash value; inquiring a block according to the transaction vector number; inquiring the transaction according to the transaction vector number; inquiring account data of a business main body according to an account (vector number) of the business main body; and inquiring the block chain in the channel according to the channel name.
The application layer 201 encapsulates various services that the blockchain network can implement, including tracing, crediting, and verifying transactions.
The process control method provided by the present invention is explained by taking an example of triggering a corresponding service process through a Read-Only Memory of an electronic device by using a voice instruction as an example, wherein a use environment of the process control method provided by the present invention is explained first, when a conventional application program (APP) is installed, a processing capability of the APP itself is already notified to a Read-Only Memory (Rom Read-Only Memory) of a terminal through a corresponding registration process, and when any URL (Uniform Resource Locator) needs to be opened through the application program, after completing voice recognition, the Rom determines that a corresponding instruction of an APP is triggered, the Rom directly triggers a process in which the corresponding APP registers to the Rom, thereby achieving a purpose that the Rom directly calls an APP internal capability. However, in this process, Rom needs to analyze tasks that need to be completed by the App for corresponding voice commands, and commands need to be translated into intent (a structured object that can be recognized by Rom and App), and then the App is triggered by intent. However, the App capability is continuously upgraded, and the Rom needs to continuously add the translation capability for upgrading the App, so that the learning cost is greatly increased.
With continuing reference to fig. 11, fig. 11 is a schematic diagram of an alternative processing flow of the process control method provided by the present invention, including the following steps:
step 1101: acquiring voice instruction information, and analyzing the voice instruction information;
step 1102: triggering a service process matched with the instruction information according to the analysis processing result;
step 1103: and finishing the specified service matched with the instruction information through the service process.
In some embodiments of the present invention, referring to fig. 12, fig. 12 is a schematic process flow diagram of an alternative process control method provided by the present invention; the process control method provided by the invention is explained continuously in the process from Rom voice recognition to the final App execution instruction, and specifically comprises the following steps:
1) rom receiving a voice instruction;
fig. 13 is a schematic view of an optional display interface of the process control method provided in the present invention; voice commands of different users can be received through the display interface Rom shown in fig. 13.
2) Rom recognizes the voice command and disassembles the command, e.g., "search for" weather "with browser", which will be disassembled into browser and search for "weather";
3) rom finds the browser in the installed list and opens the browser, passing the parameter "voicecommand: search weather ";
wherein the browser supports the use of qb addresses;
fig. 14 is a schematic view of an optional display interface of the process control method provided in the present invention; the voice instruction can be processed through the display interface Rom shown in fig. 14.
4) The first Activiy of the browser receives the intent, searches the parameter voicecommand from the intent, if the parameter voicecommand is found, continues the next step, otherwise enters the main interface;
5) the voicecommand is sent to a browser voice recognition background, and the background returns a qb address;
6) the browser opens the qb address.
Wherein, qb address introduction: the format of the qb address is as follows:
qb://home
qb://searchkey=xxx
the qb address is used in the browser to trigger each capability of the browser in a uniform format of a url address, and the specific implementation process is to firstly resolve the url? "field before character, use this field to find the corresponding module in the key-module table (the key-module table is a table defined in advance), and then will"? The character string after the character is transmitted to the module, the module will parse the character string (because the character string is formatted data such as key & key value), and the corresponding module can perform the corresponding operation. Therefore, the Rom and the App can be decoupled, the App can execute the internal capacity by itself, and the Rom is not used for directly triggering the internal capacity of the App. The method avoids the defects that the interpretation capability is required to be added for upgrading the App by Rom due to the continuous upgrading of the App, greatly improves the learning cost and the hardware cost, and effectively improves the use experience of users.
The invention has the following beneficial technical effects:
the process control method provided by the invention comprises the steps of obtaining instruction information and carrying out word segmentation processing on the instruction information; determining a keyword corresponding to the instruction information according to the word segmentation processing result; according to the key words corresponding to the instruction information, the business process matched with the instruction information is triggered to achieve the purpose that the specified business matched with the instruction information is completed through the business process, so that the purpose that the Rom and the App are decoupled is achieved, the internal capacity is automatically executed through the App, the internal capacity of the App is not directly triggered by the Rom to trigger the corresponding business process, the specified business matched with the instruction information is completed through the business process, the problem that due to the fact that the capacity of the App is continuously upgraded, the Rom needs to continuously add the translation capacity for upgrading the App is solved, learning cost and hardware cost are reduced, and use experience of a user is effectively improved.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A method for process control, the method comprising:
acquiring instruction information, and performing word segmentation processing on the instruction information;
determining a keyword corresponding to the instruction information according to the word segmentation processing result;
and triggering a business process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified business matched with the instruction information through the business process.
2. The method of claim 1, wherein the obtaining instruction information and performing word segmentation processing on the instruction information comprises:
determining a dynamic noise threshold value matched with the use environment of the instruction information;
denoising the target text set according to the dynamic noise threshold value, and triggering a first segmentation strategy matched with the dynamic noise threshold value;
performing word segmentation processing on the instruction information according to a first word segmentation strategy matched with the dynamic noise threshold value to form a keyword matched with the instruction information; or
Determining a fixed noise threshold corresponding to the instruction information;
denoising the target text set according to the fixed noise threshold value, and triggering a second word segmentation strategy matched with the fixed noise threshold value;
and performing word segmentation processing on the instruction information according to a second word segmentation strategy matched with the fixed noise threshold value to form a keyword matched with the instruction information.
3. The method according to claim 1, wherein the triggering the business process matched with the instruction information according to the keyword corresponding to the instruction information comprises:
according to the key words corresponding to the instruction information, traversing the corresponding service parameter table, and determining the service parameters matched with the key words;
and triggering the business process matched with the business parameters according to the business parameters matched with the keywords.
4. The method of claim 3, further comprising:
analyzing the service parameters matched with the keywords, and determining the real-time process path parameters and the access updating time parameters matched with the service process;
matching the real-time process path parameter and the access updating time parameter according to the corresponding blocking list, and determining a corresponding matching result;
acquiring a target webpage matched with the business process according to the matching result of the real-time process path parameter and the access updating time parameter; alternatively, the first and second electrodes may be,
and intercepting the triggered business process.
5. The method of claim 4, further comprising:
when the target webpage of the business process is determined to be a resource transfer webpage according to the real-time process path parameter, wherein the resource transfer webpage is used for carrying out online resource transfer;
acquiring a malicious webpage access record corresponding to the terminal, wherein the malicious webpage access record is used for recording access history information of the terminal to a malicious webpage;
and determining the incidence relation between the resource transfer webpage and the malicious webpage access record according to the update time parameter, and intercepting the business process according to the incidence relation between the resource transfer webpage and the malicious webpage access record.
6. The method according to claim 5, wherein the determining an association relationship between a resource transfer webpage and a malicious webpage access record according to the update time parameter, and intercepting the business process according to the association relationship between the resource transfer webpage and the malicious webpage access record comprises:
traversing the malicious webpage access record, and determining a jump time set of the malicious webpage in the malicious webpage access record;
matching the update time parameters according to the jump time set of the malicious webpage;
when the update time parameter can be matched with the jump time set of the malicious webpage, determining that the resource transfer webpage is the malicious resource transfer webpage;
and intercepting the business process when the determined resource transfer webpage is a malicious resource transfer webpage.
7. The method of claim 1, further comprising:
when the business process completes the designated business matched with the instruction information,
and generating a target block based on the instruction information, the process trigger information and the target webpage matched with the business process, and adding the target block into the block chain network.
8. A process control apparatus, characterized in that the apparatus comprises:
the information transmission module is used for receiving the instruction information;
the information processing module is used for performing word segmentation processing on the instruction information;
the information processing module is used for determining a keyword corresponding to the instruction information according to the word segmentation processing result;
and the information processing module is used for triggering a business process matched with the instruction information according to the keyword corresponding to the instruction information so as to complete the specified business matched with the instruction information through the business process.
9. An electronic device, wherein the server comprises:
a memory for storing executable instructions;
a processor configured to implement the process control method of any one of claims 1 to 7 when executing the executable instructions stored by the memory.
10. A computer-readable storage medium storing executable instructions, wherein the executable instructions, when executed by a processor, implement the process control method of any one of claims 1 to 7.
CN201911043234.3A 2019-10-30 2019-10-30 Process control method and device, electronic equipment and storage medium Pending CN112748960A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911043234.3A CN112748960A (en) 2019-10-30 2019-10-30 Process control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911043234.3A CN112748960A (en) 2019-10-30 2019-10-30 Process control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112748960A true CN112748960A (en) 2021-05-04

Family

ID=75641680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911043234.3A Pending CN112748960A (en) 2019-10-30 2019-10-30 Process control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112748960A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117033146A (en) * 2023-10-10 2023-11-10 北京安天网络安全技术有限公司 Identification method, device, equipment and medium for appointed consensus contract execution process

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117033146A (en) * 2023-10-10 2023-11-10 北京安天网络安全技术有限公司 Identification method, device, equipment and medium for appointed consensus contract execution process
CN117033146B (en) * 2023-10-10 2023-12-08 北京安天网络安全技术有限公司 Identification method, device, equipment and medium for appointed consensus contract execution process

Similar Documents

Publication Publication Date Title
CN110602052B (en) Micro-service processing method and server
US9361085B2 (en) Systems and methods for intercepting, processing, and protecting user data through web application pattern detection
CN111062024B (en) Application login method and device
US10148660B2 (en) Delivering author specific content
WO2016173199A1 (en) Mobile application single sign-on method and device
US20060026692A1 (en) Network resource access authentication apparatus and method
CN112818325A (en) Method for realizing API gateway independent authentication based on application
CN110493308B (en) Distributed consistency system session method and device, storage medium and server
US20230195812A1 (en) Optimizing scraping requests through browsing profiles
CN112506747A (en) Business process monitoring method and device, electronic equipment and storage medium
CN110636038A (en) Account number analysis method, account number analysis device, security gateway and system
CN111770072B (en) Method and device for accessing function page through single sign-on
WO2021078062A1 (en) Ssl certificate verification method, apparatus and device, and computer storage medium
CN111371811B (en) Resource calling method, resource calling device, client and service server
CN112925589B (en) Calling method and device of expansion interface
CN112612482A (en) Method, device, equipment and storage medium for executing intelligent contract
CN112748960A (en) Process control method and device, electronic equipment and storage medium
CN113569166A (en) Data processing method and device, electronic equipment and storage medium
CN109525613B (en) Request processing system and method
CN112836186A (en) Page control method and device
US11138463B1 (en) Unsupervised and supervised machine learning approaches to detecting bots and other types of browsers
Wang et al. A framework for formal analysis of privacy on SSO protocols
KR101978898B1 (en) Web scraping prevention system using characteristic value of user device and the method thereof
Senol et al. Unveiling the Impact of User-Agent Reduction and Client Hints: A Measurement Study
US11687672B1 (en) Data access gateway for security and privacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40043978

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination