CN113704659A - Equipment terminal access marking method and system - Google Patents

Equipment terminal access marking method and system Download PDF

Info

Publication number
CN113704659A
CN113704659A CN202111052321.2A CN202111052321A CN113704659A CN 113704659 A CN113704659 A CN 113704659A CN 202111052321 A CN202111052321 A CN 202111052321A CN 113704659 A CN113704659 A CN 113704659A
Authority
CN
China
Prior art keywords
access
equipment
application software
marking
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111052321.2A
Other languages
Chinese (zh)
Other versions
CN113704659B (en
Inventor
王嘉雄
周涛涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Moan Technology Co ltd
Original Assignee
Hangzhou Moan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Moan Technology Co ltd filed Critical Hangzhou Moan Technology Co ltd
Priority to CN202111052321.2A priority Critical patent/CN113704659B/en
Publication of CN113704659A publication Critical patent/CN113704659A/en
Application granted granted Critical
Publication of CN113704659B publication Critical patent/CN113704659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a method and a system for marking equipment terminal access in the technical field of Internet, comprising the following steps: acquiring an application software list, and generating an application program set according to the application software list; compiling the application program set into an execution function of a website; judging whether a user initiates a request for accessing the website, if so, operating an execution function to obtain a result set I; if not, ending; calculating the hash abstract of the result set I to obtain a hash abstract, and judging whether the hash abstract exists in a database or not; according to the judgment result, the accessed equipment terminals are marked and stored in the database, so that the method has the advantages of accurately distinguishing the equipment terminals and being not easy to delete, and the bottleneck of accurately marking the equipment terminals accessing the website is broken through.

Description

Equipment terminal access marking method and system
Technical Field
The invention relates to the technical field of internet, in particular to a method and a system for marking access of a device terminal.
Background
The most extensive device terminal identification technologies at present include device IP identification, Cookie technology identification, and the like, the device IP identification judges whether the user logs in or not by recording the IP of the visitor and taking the IP address as a distinguishing certificate, but the following problems exist in the IP identification, and the visitor from the CDN proxy server cannot be distinguished; the same intranet, i.e. different visitors under the same home router, cannot be distinguished; visitors who use a proxy such as VPN cannot be distinguished.
The identification of the Cookie technology is to store login credentials in the Cookie and judge whether a user logs in or not according to the login credentials, but the Cookie can be easily modified or deleted, and once the Cookie is deleted, the Cookie cannot be automatically regenerated, so that a marking result is not accurate, and meanwhile, when a visitor replaces a browser on a device terminal, the Cookie cannot be marked as a secondary visit of the user on the device terminal.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the equipment terminal access marking method and the equipment terminal access marking system, which have the advantages of accurately distinguishing the equipment terminals and being difficult to delete, and break through the bottleneck of accurately marking the equipment terminals for accessing websites.
In order to solve the technical problem, the invention is solved by the following technical scheme:
an equipment terminal access marking method comprises the following steps:
acquiring an application software list, and generating an application program set according to the application software list;
compiling the application program set into an execution function of a website;
judging whether a user initiates a request for accessing the website, if so, operating an execution function to obtain a result set I; if not, ending;
calculating the hash abstract of the result set I to obtain a hash abstract, and judging whether the hash abstract exists in a database or not;
and marking the accessed equipment terminal according to the judgment result, and storing the marked equipment terminal in the database.
Optionally, generating an application program set according to the application software list includes the following steps:
acquiring a list of application software, and acquiring a registry of the application software according to the list;
acquiring a pseudo protocol corresponding to each application software according to the registry;
and the application software corresponds to the pseudo protocols one by one to form an application program set.
Optionally, the executing function is executed, and the executing function includes the following steps:
acquiring an application program set, sequentially accessing a pseudo protocol of application software on a website according to the sequence of the application software in the application program set, and judging whether the website is normally opened;
if so, installing application software in the equipment terminal, and outputting a result value true;
if not, the equipment terminal does not install application software and outputs a result value false;
and integrating the application software and the result value to obtain a result set I.
Optionally, the step of calculating the hash digest of the result set one to obtain the hash digest includes the following steps:
marking the result value true in the result set as a character string '1' or '0', and marking the result value false in the result set as a character string '0' or '1';
merging the marked result sets one by one to obtain a hash abstract;
and generating a second result set of the unique mapping relation between the equipment terminal and the hash abstract according to the hash abstract.
Optionally, marking the accessed device terminal according to the determination result, including the following steps:
if the hash abstract does not exist in the database, marking the access equipment of the equipment terminal as new equipment, recording the access times as one, and storing the access times into the database;
if the hash abstract exists in the database, judging that the access equipment of the equipment terminal is old equipment;
and when the access equipment of the equipment terminal is old equipment, acquiring the access times of the old equipment in the database, adding one to the access times and storing the access times into the database.
An equipment terminal access marking system comprises a receiving module, a traversing module, an obtaining module and a processing module;
the receiving module is used for receiving a website access request sent by the equipment terminal, and the website access request is used for requesting to access a website containing an execution function;
the traversal module is used for traversing a pseudo protocol corresponding to the application software in the application program set;
the acquisition module is used for acquiring the output result value and the result set I;
the processing module is used for calculating the Hash abstract of the result set I to obtain the Hash abstract.
Optionally, the processing module is further configured to mark the device terminal and the access times of the device terminal according to whether the hash digest exists in the database.
Optionally, the system further comprises a marking module, where the marking module is used to mark the device type of the device terminal, where the device type includes a new device and an old device.
Optionally, the mobile terminal further includes a storage module, and the storage device is configured to store the application set, the result set i, the result set ii, the hash digest, the device name of the device terminal, and the access times corresponding to the device name.
A computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the device terminal access tagging method of any one of the above.
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
whether the equipment terminal accessing the website is provided with the software in the application program set or not is judged through a pseudo protocol of the application software, and the unique hash abstract of the equipment terminal is obtained by performing hash operation on data output by a judgment result, so that whether the hash abstract is the same or not is compared in a database, whether the access record of the equipment terminal exists in the database or not is confirmed, and the access times are marked, so that the equipment terminal accessing the website is marked through a simple algorithm, the marking accuracy is high, the equipment terminal is not easy to modify, and the accuracy of the staff for marking the access of the equipment terminal is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a device terminal access marking method and system according to an embodiment of the present invention;
fig. 2 is a flowchart of execution function operation of a method and a system for device terminal access marking according to an embodiment of the present invention;
fig. 3 is an example of hash digest generation in the method and system for device terminal access marking according to the embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples, which are illustrative of the present invention and are not to be construed as being limited thereto.
As shown in fig. 1, a method and system for device terminal access marking includes the following steps: the method comprises the following steps of obtaining an application software list, generating an application program set according to the application software list, and programming the application program set into an execution function of a website, wherein the application program set is generated according to the application software list, and the method comprises the following steps: acquiring a list of application software, and acquiring a registry of the application software according to the list; acquiring a pseudo protocol corresponding to each application software according to a registry; and the application software corresponds to the pseudo protocols one by one to form an application program set.
The method comprises the steps of firstly obtaining a list of mainstream application software commonly used in the market at present, namely the list supports more than 90% of the mainstream application software currently used, and since the system version of the installed application software and the type of the application software are not completely the same for any two different pieces of user equipment used for a long time, equipment terminal access marking can be carried out by identifying the application software installed on the equipment used by the user, and equipment used by the user is marked at the same time, wherein the type of the application software comprises but is not limited to the following types including system software, mainboard software, social software and office software.
After the list of the application Software is obtained, by looking up the registry on the Windows, names named as AAM, acrobat and the like are obtained, and all the names represent pseudo Protocol names, for example, under the directory of HKLM \ Software \ Classes and HKCU \ Software \ Classes, the pseudo Protocol name can be found by searching for the type of REG _ SZ and the name of URL Protocol, so that the application Software and the pseudo Protocol corresponding to the application Software are obtained, and the application Software and the pseudo Protocol corresponding to the application Software are assembled into a summary table in the form of (application program n, pseudo Protocol n), and the summary table is an application program set.
As shown in fig. 1 and fig. 2, it is determined whether a user initiates a request for accessing a website, and if so, an execution function is run to obtain a result set one; if not, ending the operation, wherein the execution function is operated, and the method comprises the following steps: acquiring an application program set, sequentially accessing a pseudo protocol of application software on a website according to the sequence of the application software in the application program set, and judging whether the website is normally opened; if so, installing application software in the equipment terminal, and outputting a result value true; if not, the equipment terminal does not install application software and outputs a result value false; and integrating the application software and the result value to obtain a result set I.
Users can access web sites through web browsers, and current browsers support custom protocol handlers (also called pseudo-protocols), which include but are not limited to the following classes: when a user accesses a website by using a browser, a pseudo protocol website of application software is input in the browser and accessed, if the website can be opened, the application software is installed on a device terminal used by the user, in this embodiment, visual studio code application software is taken as an example, and the user first inputs a vscode: and if the popped page inquires whether to open the application software of the visual studio code, the device terminal is provided with the application software of the visual studio code, wherein the vscode is the pseudo protocol name of the application software of the visual studio code.
According to the arrangement sequence of the application software in the application program set, sequentially accessing on the website, outputting true if the application software is installed on the device terminal, and outputting false if the application software is not installed, and obtaining a result set I, wherein the result set I is in the form of [ (app1, true/false), (app2, true/false), (app3, true/false) ].
Calculating the hash digest of the result set I to obtain the hash digest, and the method comprises the following steps: marking the result value true in the result set as a character string '1' or '0', and marking the result value false in the result set as a character string '0' or '1'; combining the marked result sets one by one to obtain a hash abstract; and generating a second result set of the unique mapping relation between the equipment terminal and the hash abstract according to the hash abstract.
As shown in fig. 3, after marking true as "1" and false as "0" in the result set one, a new set is obtained [ (app1, 1/0), (app2, 1/0), (app3, 1/0.) (appN, 1/0) ], and the result sets including 1/0 are combined according to a bit to obtain an intermediate character string, for example, if six application software are required to be determined to exist in the result set one, and in order, the determined six application software are respectively installed, uninstalled, installed, and uninstalled, then the result set one is marked by 1/0 to obtain a new set of [ (app1, 1), (2, 0), (app3, 0), (app4, 1), (app5, 1), (6, 0) ], and after bit combination, the intermediate character string is 100110, the intermediate character string is obtained, thus, the unique mapping relation between the device and the hash digest is obtained, and a result set two is formed, wherein the form of the result set two is (device n, hash digest n).
Judging whether the hash abstract exists in a database or not; according to the judgment result, marking the accessed equipment terminal and storing the marked equipment terminal in the database, wherein according to the judgment result, the marking of the accessed equipment terminal comprises the following steps: if the hash abstract does not exist in the database, marking the access equipment of the equipment terminal as new equipment, recording the access times as one, and storing the access times into the database; if the hash abstract exists in the database, judging that the access equipment of the equipment terminal is old equipment; and when the access equipment of the equipment terminal is old equipment, acquiring the access times of the old equipment in the database, adding one to the access times and storing the access times into the database.
And after a new result set II is obtained, firstly judging whether the same hash abstract exists in the database or not according to the hash abstract in the result set II, if so, adding one to the originally marked access frequency, otherwise, directly storing the obtained result set II in the database, and marking the access frequency as 1.
An equipment terminal access marking system comprises a receiving module, a traversing module, an acquiring module and a processing module; the receiving module is used for receiving a website access request sent by the equipment terminal, and the website access request is used for requesting to access a website containing an execution function; the traversing module is used for traversing the pseudo protocol corresponding to the application software in the application program set; the acquisition module is used for acquiring an output result value and a result set I; the processing module is used for calculating the Hash abstract of the result set I to obtain the Hash abstract.
The processing module is also used for marking the equipment terminal and the access times of the equipment terminal according to whether the hash abstract exists in the database.
The equipment terminal access marking system further comprises a marking module used for marking the equipment type of the equipment terminal, wherein the equipment type comprises new equipment and old equipment.
The equipment terminal access marking system further comprises a storage module, and the storage equipment is used for storing the application program set, the result set I, the result set II, the hash abstract, the equipment name of the equipment terminal and the access times corresponding to the equipment name.
A computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the device terminal access tagging method of any one of the above.
More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wire segments, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless section, wire section, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules, or units is only one type of division of logical functions, and there may be other divisions in actual implementation, for example, multiple units, modules, or components may be combined or integrated into another device, or some features may be omitted, or not executed.
The units may or may not be physically separate, and components displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section, and/or installed from a removable medium. The computer program, when executed by a Central Processing Unit (CPU), performs the above-described functions defined in the method of the present application. It should be noted that the computer readable medium mentioned above in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions within the technical scope of the present invention are intended to be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An equipment terminal access marking method is characterized by comprising the following steps:
acquiring an application software list, and generating an application program set according to the application software list;
compiling the application program set into an execution function of a website;
judging whether a user initiates a request for accessing the website, if so, operating an execution function to obtain a result set I;
calculating the hash abstract of the result set I to obtain a hash abstract, and judging whether the hash abstract exists in a database or not;
and marking the accessed equipment terminal according to the judgment result, and storing the marked equipment terminal in the database.
2. The device terminal access marking method according to claim 1, wherein generating an application program set according to the application software list comprises the following steps:
acquiring a list of application software, and acquiring a registry of the application software according to the list;
acquiring a pseudo protocol corresponding to each application software according to the registry;
and the application software corresponds to the pseudo protocols one by one to form an application program set.
3. The device terminal access marking method of claim 2, wherein the execution function is run, comprising the steps of:
acquiring an application program set, sequentially accessing a pseudo protocol of application software on a website according to the sequence of the application software in the application program set, and judging whether the website is normally opened;
if so, installing application software in the equipment terminal, and outputting a result value true;
if not, the equipment terminal does not install application software and outputs a result value false;
and integrating the application software and the result value to obtain a result set I.
4. The method for device terminal access marking according to claim 1, wherein the hash digest of the result set one is calculated to obtain the hash digest, comprising the following steps:
marking the result value true in the result set as a character string '1' or '0', and marking the result value false in the result set as a character string '0' or '1';
merging the marked result sets one by one to obtain a hash abstract;
and generating a second result set of the unique mapping relation between the equipment terminal and the hash abstract according to the hash abstract.
5. The method for marking access of equipment terminal according to claim 1, wherein the accessed equipment terminal is marked according to the judgment result, comprising the following steps:
if the hash abstract does not exist in the database, marking the access equipment of the equipment terminal as new equipment, recording the access times as one, and storing the access times into the database;
if the hash abstract exists in the database, judging that the access equipment of the equipment terminal is old equipment;
and when the access equipment of the equipment terminal is old equipment, acquiring the access times of the old equipment in the database, adding one to the access times and storing the access times into the database.
6. An equipment terminal access marking system is characterized by comprising a receiving module, a traversing module, an obtaining module and a processing module;
the receiving module is used for receiving a website access request sent by the equipment terminal, and the website access request is used for requesting to access a website containing an execution function;
the traversal module is used for traversing a pseudo protocol corresponding to the application software in the application program set;
the acquisition module is used for acquiring the output result value and the result set I;
the processing module is used for calculating the Hash abstract of the result set I to obtain the Hash abstract.
7. The system according to claim 6, wherein the processing module is further configured to mark the device terminal and the number of accesses to the device terminal according to whether the hash digest exists in the database.
8. The system of claim 6, further comprising a marking module for marking the device type of the device terminal, wherein the device type includes a new device and an old device.
9. The device terminal access marking system of claim 6, further comprising a storage module, wherein the storage device is configured to store the application set, the result set one, the result set two, the hash digest, the device name of the device terminal, and the access times corresponding to the device name.
10. A computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the device terminal access tagging method of any one of claims 1 to 8.
CN202111052321.2A 2021-09-08 2021-09-08 Equipment terminal access marking method and system Active CN113704659B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111052321.2A CN113704659B (en) 2021-09-08 2021-09-08 Equipment terminal access marking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111052321.2A CN113704659B (en) 2021-09-08 2021-09-08 Equipment terminal access marking method and system

Publications (2)

Publication Number Publication Date
CN113704659A true CN113704659A (en) 2021-11-26
CN113704659B CN113704659B (en) 2023-07-11

Family

ID=78659376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111052321.2A Active CN113704659B (en) 2021-09-08 2021-09-08 Equipment terminal access marking method and system

Country Status (1)

Country Link
CN (1) CN113704659B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244599A (en) * 2021-12-15 2022-03-25 杭州默安科技有限公司 Method for interfering malicious program

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073946A1 (en) * 2002-10-01 2004-04-15 Yoshikazu Kobayashi Terminal device, method for processing communication data inside the terminal device, and program for implementing the method
CN103856446A (en) * 2012-11-30 2014-06-11 腾讯科技(深圳)有限公司 Login method and device, and open platform system
CN104732144A (en) * 2015-04-01 2015-06-24 河海大学 Pseudo-protocol-based remote code injecting loophole detecting method
CN106095598A (en) * 2016-05-31 2016-11-09 腾讯科技(深圳)有限公司 A kind of data processing method and client
US20170237640A1 (en) * 2016-02-11 2017-08-17 Barracuda Networks, Inc. System and method for correlating captured network packet with metadata
CN109743359A (en) * 2018-12-13 2019-05-10 平安普惠企业管理有限公司 Hybrid Communication processing method, apparatus, computer equipment and storage medium
CN110716786A (en) * 2019-10-16 2020-01-21 腾讯科技(深圳)有限公司 Page display method, system and storage medium
CN113645308A (en) * 2021-08-18 2021-11-12 平安普惠企业管理有限公司 Mobile terminal TCP communication, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073946A1 (en) * 2002-10-01 2004-04-15 Yoshikazu Kobayashi Terminal device, method for processing communication data inside the terminal device, and program for implementing the method
CN103856446A (en) * 2012-11-30 2014-06-11 腾讯科技(深圳)有限公司 Login method and device, and open platform system
CN104732144A (en) * 2015-04-01 2015-06-24 河海大学 Pseudo-protocol-based remote code injecting loophole detecting method
US20170237640A1 (en) * 2016-02-11 2017-08-17 Barracuda Networks, Inc. System and method for correlating captured network packet with metadata
CN106095598A (en) * 2016-05-31 2016-11-09 腾讯科技(深圳)有限公司 A kind of data processing method and client
CN109743359A (en) * 2018-12-13 2019-05-10 平安普惠企业管理有限公司 Hybrid Communication processing method, apparatus, computer equipment and storage medium
CN110716786A (en) * 2019-10-16 2020-01-21 腾讯科技(深圳)有限公司 Page display method, system and storage medium
CN113645308A (en) * 2021-08-18 2021-11-12 平安普惠企业管理有限公司 Mobile terminal TCP communication, device, equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHATGPTER: "伪协议在Android开发中的应用", pages 1 - 5, Retrieved from the Internet <URL:https://blog.csdn.net/ddnosh/article/details/101273441> *
CHUNCHAO LIANG 等: "Network coverage sensitive pseudo geometric broadcast protocols in wireless sensor networks", 《CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC) CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE 》, pages 543 - 548 *
杨晔: "基于行为的恶意代码检测方法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, pages 138 - 213 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244599A (en) * 2021-12-15 2022-03-25 杭州默安科技有限公司 Method for interfering malicious program
CN114244599B (en) * 2021-12-15 2023-11-24 杭州默安科技有限公司 Method for interfering malicious program

Also Published As

Publication number Publication date
CN113704659B (en) 2023-07-11

Similar Documents

Publication Publication Date Title
CN108206802B (en) Method and device for detecting webpage backdoor
US9444899B2 (en) Use of internet information services logging to collect user information in an asynchronous manner
US9798446B2 (en) Standard commands for native commands
US6665634B2 (en) Test system for testing dynamic information returned by a web server
CN110266661B (en) Authorization method, device and equipment
AU2015401229A1 (en) Website access method, apparatus, and website system
CN111431753A (en) Asset information updating method, device, equipment and storage medium
CN108667770A (en) A kind of loophole test method, server and the system of website
JPWO2018131199A1 (en) Coupling device, coupling method and coupling program
CN108351941B (en) Analysis device, analysis method, and computer-readable storage medium
CN104298675A (en) Method and device for cache management
CN111563257A (en) Data detection method and device, computer readable medium and terminal equipment
CN113704659B (en) Equipment terminal access marking method and system
CN112379965B (en) Sandbox file mapping system, client device, mapping end device, sandbox file mapping method and electronic equipment
CN116708034B (en) Method, device, medium and equipment for determining security attribute of domain name
US9398041B2 (en) Identifying stored vulnerabilities in a web service
US9348923B2 (en) Software asset management using a browser plug-in
CN111767542A (en) Unauthorized detection method and device
CN110633432A (en) Method, device, terminal equipment and medium for acquiring data
CN111885063B (en) Open source system access control method, device, equipment and storage medium
WO2022140014A1 (en) Correlation between source code repositories and web endpoints
CN113760727A (en) Interface regression testing method and device
CN114765599A (en) Sub-domain name acquisition method and device
KR20050100278A (en) Vulnerability analysis apparatus and method of web application
CN111414642B (en) Link generation method and device based on gateway, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 1st Floor, Building 3, No. 2616, Yuhangtang Road, Cangqian Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Applicant after: HANGZHOU MOAN TECHNOLOGY CO.,LTD.

Address before: 311100 10th floor, Block E, building 1, 1378 Wenyi West Road, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant before: HANGZHOU MOAN TECHNOLOGY CO.,LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant