KR101739415B1 - Apparatus and method for controlling information access in internet - Google Patents
Apparatus and method for controlling information access in internet Download PDFInfo
- Publication number
- KR101739415B1 KR101739415B1 KR1020150150201A KR20150150201A KR101739415B1 KR 101739415 B1 KR101739415 B1 KR 101739415B1 KR 1020150150201 A KR1020150150201 A KR 1020150150201A KR 20150150201 A KR20150150201 A KR 20150150201A KR 101739415 B1 KR101739415 B1 KR 101739415B1
- Authority
- KR
- South Korea
- Prior art keywords
- information
- result
- host
- directory
- server
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H04L61/1523—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The method includes extracting URL information from a packet requested by a user, dividing URL information into host information and page information, generating a first result by searching whether the host information exists in the first block list, The method of claim 1, further comprising: generating a second result by retrieving whether the information is present in a second block list associated with the first block list; and determining whether the site is a harmful site based on the first result and the second result ≪ / RTI >
Description
More particularly, the present invention relates to an apparatus and method for controlling access to information via the Internet. More specifically, the present invention relates to an apparatus and method for controlling access to information via the Internet, And a harmful site access blocking service method for blocking a malicious site access blocking service system.
The Internet environment is indispensable to modern society which is widely used throughout the society, but it is causing many troubles about the dysfunction. Therefore, the development of information protection technology to cope with the inverse function of the Internet environment is continuously increasing.
Businesses and public institutions are not only burdened with the construction and maintenance of the Internet environment required for their work, but they also incur high costs for bandwidth and network equipment upgrades to accommodate increasing Internet traffic. Therefore, enterprises or public institutions use unnecessary Internet access control by using Internet access control system or harmful site access blocking system to suppress the increase of internet traffic to some extent and increase the efficiency of internet use.
The harmful site blocking service is implemented using a harmful site blocking server that blocks harmful sites in the network. The harmful site blocking server checks the packet transmitted between the Internet and the Internet terminal and blocks the harmful site by blocking the packet if it corresponds to the harmful site.
As the Internet contains more information, there are more and more servers on the Internet that have information that users do not want. However, in order to block such harmful sites, when searching for malicious sites using file-based databases, it may be difficult to search and provide results on the network in real time.
The present invention provides an Internet information access control program capable of increasing a search speed by separating a host area and a page area from a URL requested by a user and searching for a harmful site database in two steps of a host search and a page search A recorded computer-readable storage medium and the apparatus therefor.
In addition, the present invention provides a network connection device capable of separating a host area and a page area from a URL requested by a user, searching for a harmful site database in two steps of a host search and a page search, and a management server for a malicious site blocking service .
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, unless further departing from the spirit and scope of the invention as defined by the appended claims. It will be possible.
The present invention can provide a computer-readable storage medium having the Internet information access control program recorded thereon and its apparatus, a network connection apparatus, and a management server.
The method comprising: extracting URL information from a packet requested by a user, the method comprising the steps of: extracting URL information from a packet requested by a user; Dividing the URL information into host information and page information; Retrieving whether the host information is present in a first block list to generate a first result; Retrieving whether the page information is present in a second block list associated with the first block list to generate a second result; And determining whether the site is a harmful site based on the first result and the second result.
The generating of the first result may further include: converting the host information; Searching whether the converted host information matches the information included in the first block list; Recognizing whether or not a lower path exists in the matched first blocking list; And outputting, as the first result, whether or not the first block list matches and whether the lower path exists.
Also, the step of converting the host information may use a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6).
Also, the step of converting the host information may use a Secure Hash Algorithm (SHA) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3).
Also, the step of searching whether the converted host information matches the information included in the first block list uses a lightweight directory access protocol (LDAP) for accessing and managing directory information, The server may first be searched and the primary directory structure describing the server's domain may be performed in a secondary directory structure used by the server extending through the directory assistance document.
The generating of the second result may further include: limiting a search range of the second block list using the first result; Retrieving information matching the page information from the restricted second block list; And generating the second result depending on the presence or absence of matching information.
The generating of the second result may further include converting the page information.
Also, the page information is allowed to be accessed through a lightweight directory access protocol (LDAP) for accessing and managing directory information, and a primary directory structure and a primary directory structure in which the server searches first and describes the domain of the server, It can be stored in the secondary directory structure used by the server extended by the assistant document.
In addition, the first result and the second result may vary depending on the personal information of the user.
In addition, the first result and the second result may vary according to the rating information included in the first block list and the second block list.
The blocking management server for determining whether the URL information included in the packet requested by the user is the blocking target in the blocking management system according to the personal information of the wired / wireless user and the harmfulness degree of the Internet site according to another embodiment of the present invention, A first storage unit for storing information corresponding to host information among the first storage units; A second storage unit for storing information corresponding to page information in the URL information; And connection information for connecting information stored in the first storage unit and information stored in the second storage unit.
The first storage unit may further include personal information of the user and rating information according to the harmfulness level of the Internet site.
The first storage unit may store data to which a Message Digest Algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6) is applied.
Also, the first storage unit may store data to which a SHA (Secure Hash Algorithm) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3) is applied.
Also, the first storage unit and the second storage unit are allowed access through a lightweight directory access protocol (LDAP) for accessing and managing directory information, and a primary directory structure And a secondary directory structure used by a server that extends the primary directory structure through directory assistance documents.
The network connection device for checking whether the URL information included in the packet requested by the user is a blocking object in the blocking management system according to the personal information of the user and the harmfulness level of the Internet site according to another embodiment of the present invention, To host information and page information; A conversion unit for converting the host information; And a transmitting unit for transmitting the converted host information and the page information.
Also, the host information may be converted using a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6).
In addition, the step of converting the host information may be converted using a Secure Hash Algorithm (SHA) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3).
In addition, the host information and the page information are allowed to be accessed through a lightweight directory access protocol (LDAP) for accessing and managing directory information. The host information and the page information are stored in a primary directory structure The directory structure can be retrieved through the secondary directory structure used by the server that extends the directory assistance document.
In addition, the packet requested by the user may be transmitted to a wired network or a wireless network.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, And can be understood and understood.
Effects of the method and apparatus according to the present invention will be described as follows.
INDUSTRIAL APPLICABILITY According to the present invention, an Internet information access control program and its apparatus can increase a search speed in a large-scale harmful site database and enable real-time monitoring.
In addition, according to the present invention, the blocking management service system can provide a harmful site blocking service in units of an Internet page in the network connection step of the user according to the personal information of the wired and wireless users and the harmfulness degree of the internet site.
In addition, the present invention can increase the capacity and performance of the system by shortening the search time in the block management system according to the personal information of the wired and wireless users and the harmful grade of the internet site, thereby reducing the system construction cost.
The effects obtainable by the present invention are not limited to the effects mentioned above, and other effects not mentioned can be clearly understood by those skilled in the art from the following description.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention. It is to be understood, however, that the technical features of the present invention are not limited to the specific drawings, and the features disclosed in the drawings may be combined with each other to constitute a new embodiment.
1 illustrates a system for a harmful site blocking service.
FIG. 2 illustrates a first analysis method for analyzing a URL requested by a user to determine a harmful site.
FIG. 3 illustrates a first control method for determining a harmful site using the first analysis method illustrated in FIG.
4 illustrates a second analysis method for analyzing a URL requested by a user to determine a harmful site.
FIG. 5 illustrates a second control method for determining a harmful site using the second analysis method illustrated in FIG.
FIG. 6 illustrates the structure of a management server for using the method illustrated in FIG.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, an apparatus and various methods to which embodiments of the present invention are applied will be described in detail with reference to the drawings. The suffix "module" and " part "for the components used in the following description are given or mixed in consideration of ease of specification, and do not have their own meaning or role.
In the description of the embodiments, when it is described as being formed on the "upper" or "lower" of each element, the upper or lower (lower) And that at least one further component is formed and arranged between the two components. Also, the expression "upward" or "downward" may include not only an upward direction but also a downward direction on the basis of one component.
1 illustrates a system for a harmful site blocking service.
As shown in the figure, the blocking management system according to the user's personal information and the harmfulness level of the Internet site is provided with a port mirroring function from the
FIG. 2 illustrates a first analysis method of a URL requested by a user to determine a harmful site.
As shown, it is assumed that the URL (10, Internet address) requested by the user is "http://www.all-your-porn.com/sexy/start.html".
According to the first analysis method for determining whether to block or not, the
It may also decide to block with an Internet address that is one step deeper than the host information (i.e., http://www.all-your-porn.com/sexy/). Similarly, after adding an Internet connection port of ": 80" to the host information, the Internet address is converted into a string form using MD-5 which is one of the message reduction algorithms (14). By using the converted character string, it is possible to search for the block list matched in the blocking service management server 8 (see FIG. 1).
In addition, it is possible to decide whether to block or not by using the entire part of the
FIG. 3 illustrates a first control method for determining a harmful site using the first analysis method illustrated in FIG.
As shown in the figure, the first control method includes a step (20) of extracting URL information from a packet requested by the user, a step (22) of determining a blocking target URL from the extracted URL information, an MD-
For example, it is assumed that the URL information extracted from the packet requested by the user is " http://www.all-your-porn.com/sexy/start.html " After determining to use only the host information (http://www.all-your-porn.com) in the step (22) of determining the blocking URL from the extracted URL information, it can be judged whether or not it is a harmful site (28 ). If the host information (http://www.all-your-porn.com) is not a harmful site, the URL information extracted from the packet requested by the user in order to reset the URL to be blocked is added to the sub-path ("/ sexy / start.html ") is present (30). Thereafter, in
In the first control method described with reference to FIG. 3, a URL to be blocked is determined, a search is performed in the database, a URL to be blocked is reset, and the search is rediscovered in the database. Such a harmful site blocking system may have a limitation in the process of searching from the network in real time when searching the file-based database for millions of harmful sites. In addition, a method using hashing based on a message reduction algorithm such as MD-5 (that is, a method of converting a string to a shorter value or key symbolizing the original one) It can not be broken down into blocks. For example, there is a harmful site database provided by a government agency (eg, Ministry of Gender Equality).
4 illustrates a second method of analyzing a URL requested by a user to determine a harmful site.
As shown, it is assumed that the URL 50 (Internet address) requested by the user is "http://www.bad-host.com/directory/subdirectory/index.html".
According to the second analysis method for determining whether to block or not, the
First, an Internet connection port ": 80" is added to the host information (http://www.bad-host.com), and then converted into a string form using MD-5, which is one of the message reduction algorithms (52 ). By using the converted character string, it is possible to search for the block list matched in the blocking service management server 8 (see FIG. 1).
MD-5, one of the message reduction algorithms, is an example, and other schemes may be applied. For example, the host information may be converted using a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6).
The host information may also be converted using a Secure Hash Algorithm (SHA) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3).
In the
FIG. 5 illustrates a second control method for determining a harmful site using the second analysis method illustrated in FIG.
As shown in the figure, the second control method includes a
The step 61 of dividing the URL information into host information and page information may include a
The step 63 of generating a first result may include the steps of translating
For example, the
The
The searching
The step 71 of generating the second result may include the step of limiting (73) the search range of the second block list using the first result, retrieving the information matching the page information in the limited second block list ), And generating a second result based on the presence or absence of matching information (not shown).
The page information is accessed through a lightweight directory access protocol (LDAP) for accessing and managing directory information, and the server first searches for and displays the primary directory structure and primary directory structure describing the server's domain, And can be stored in the secondary directory structure used by the server that has been extended through.
In addition, the step 71 of generating the second result may further include the step of converting page information (not shown). In the case of a database using lightweight directory access protocol (LDAP), each entry has an internal directory tree (DIT) and is distinguished by a distinguished name (DN) indicating its own location and uniqueness . (For example, " cn = index, ou = subdirectory, ou = directory, dc = database2 ") so that search is possible in the directory tree structure.
On the other hand, the first result and the second result outputted to the step 63 for generating the first result and the step 71 for generating the second result may vary depending on the user's personal information. Also, the first result and the second result may vary according to the rating information included in the first block list and the second block list.
Although not shown, the network connection device for checking whether the URL information included in the packet requested by the user in the blocking management system according to the personal information of the user and the harmful rating of the Internet site is a blocking object includes the URL information, A converting unit for converting the host information, and a transmitting unit for transmitting the converted host information and the page information.
Such a network connection device may be implemented as a software program and may be included in a portable terminal or a computer used by a user or may be a network device for connecting the user group 4 (see FIG. 1) and the Internet 2 (see FIG. 1) 6, Fig. 1). This network connection device may also be mounted on the blocking service management server 8 (see FIG. 1).
Such a network connection device may forward a packet requested by a user to a wired network or a wireless network.
FIG. 6 illustrates the structure of a management server for using the method illustrated in FIG.
As shown in the figure, the blocking management server for determining whether the URL information included in the packet requested by the user in the blocking management system according to the private information of the wired / wireless user and the harmfulness degree of the Internet site is the blocking object, A
Also, the
In operation, the
Meanwhile, the
Also, the
Also, the
As described above, the blocking management system according to the personal information of the wired and wireless users and the harmfulness degree of the internet site can provide the harmful site blocking service in the unit of the internet page in the subscriber.
In addition, the blocking management system according to the personal information of the wired and wireless users and the harmful level of the internet site can increase the capacity and performance of the system, thereby reducing the system construction cost.
The method according to the above-described embodiments may be implemented as a program to be executed by a computer and stored in a computer-readable recording medium. Examples of the computer-readable recording medium include a ROM, a RAM, a CD- , Floppy disks, optical data storage devices, and the like.
The computer readable recording medium may be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner. And, functional program, code, and code segments for implementing the above-described method can be easily inferred by programmers in the technical field to which the embodiment belongs.
It will be apparent to those skilled in the art that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
Accordingly, the above description should not be construed in a limiting sense in all respects and should be considered illustrative. The scope of the present invention should be determined by rational interpretation of the appended claims, and all changes within the scope of equivalents of the present invention are included in the scope of the present invention.
2: Internet
4: User group
6: Network device
8: Blocking service management server
80: First storage unit
90: Second storage unit
Claims (20)
Dividing the URL information into host information and page information distinguished from the host information;
Retrieving whether the host information is present in a first block list to generate a first result;
Retrieving whether the page information is present in a second block list associated with the first block list to generate a second result; And
Determining whether the site is a harmful site based on the first result and the second result
And a computer readable storage medium storing a program for performing an Internet information access control method.
Wherein generating the first result comprises:
Converting the host information;
Searching whether the converted host information matches the information included in the first block list;
Recognizing whether or not a lower path exists in the matched first blocking list; And
Outputting the presence or absence of the matched first blocking list and the presence or absence of the lower path to the first result
And a computer readable storage medium storing a program for performing an Internet information access control method.
Wherein the step of converting the host information uses a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6).
Wherein the step of converting the host information uses a Secure Hash Algorithm (SHA) message collapse algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3) ≪ / RTI >
The step of searching whether the converted host information matches the information included in the first block list uses a lightweight directory access protocol (LDAP) for accessing and managing directory information, A computer readable storage medium in which a program for performing an Internet information access control method, which is performed in a secondary directory structure used by a server which searches first and which explains a domain of a server through a directory assistance document, .
Wherein generating the second result comprises:
Limiting the search range of the second block list using the first result;
Retrieving information matching the page information from the restricted second block list; And
Generating the second result according to the presence or absence of matching information
And a computer readable storage medium storing a program for performing an Internet information access control method.
Wherein the generating of the second result further comprises converting the page information. ≪ Desc / Clms Page number 21 >
The page information is allowed to be accessed through a lightweight directory access protocol (LDAP) for directory information access and management, and the primary directory structure and the primary directory structure, which the server searches first and describes the domain of the server, And a second directory structure used by a server extended through the second directory structure. The computer-readable storage medium having the program recorded thereon.
Wherein the first result and the second result depend on personal information of the user. ≪ Desc / Clms Page number 20 >
Wherein the first result and the second result depend on class information included in the first block list and the second block list. ≪ Desc / Clms Page number 19 >
A first storage unit for storing information corresponding to host information in the URL information;
A second storage unit for storing information corresponding to page information distinguished from the host information among the URL information; And
And connection information for connecting information stored in the first storage unit and information stored in the second storage unit
Included, blocking management server.
Wherein the first storage unit further stores the personal information of the user and the rating information according to the harmful rating of the Internet site.
Wherein the first storage unit stores data to which a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6) is applied.
Wherein the first storage unit stores data to which a Secure Hash Algorithm (SHA) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3) is applied.
The first storage unit and the second storage unit are allowed access through a lightweight directory access protocol (LDAP) for accessing and managing directory information. The first directory structure and the first directory structure, in which the server first searches and describes the domain of the server, A blocking management server that stores the secondary directory structure as a secondary directory structure used by the server that extends the directory assistance document.
A sensing unit for classifying the URL information into host information and page information;
A conversion unit for converting the host information;
A transmitting unit for transmitting the converted host information and the page information,
And a network connection device.
Wherein the host information is converted using a message-digest algorithm (MD) message reduction algorithm (MD2, MD4, MD5, MD6).
Wherein the step of converting the host information is converted using a Secure Hash Algorithm (SHA) message reduction algorithm (SHA0, SHA1, SHA2 (SHA224, SHA256, SHA384, SHA512), SHA3).
The host information and the page information are allowed to be accessed through a lightweight directory access protocol (LDAP) for accessing and managing directory information. The host information and the page information are stored in a primary directory structure and a primary directory structure Is retrieved through a secondary directory structure used by a server that has been extended through a directory assistance document.
Wherein the packet requested by the user is delivered to a wired network or a wireless network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150150201A KR101739415B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for controlling information access in internet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150150201A KR101739415B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for controlling information access in internet |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170049169A KR20170049169A (en) | 2017-05-10 |
KR101739415B1 true KR101739415B1 (en) | 2017-05-24 |
Family
ID=58744226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150150201A KR101739415B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for controlling information access in internet |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101739415B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11681779B1 (en) | 2022-04-29 | 2023-06-20 | Franklin Technology Inc. | Notification service server capable of providing access notification service to harmful sites and operating method thereof |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472165B (en) * | 2019-08-20 | 2024-01-16 | 深圳前海微众银行股份有限公司 | URL extraction method, device, equipment and computer readable storage medium |
KR102125966B1 (en) * | 2019-12-05 | 2020-06-23 | 엘에스웨어(주) | System for collecting traffic and feature of TOR network using private network and virtual machine |
KR102533724B1 (en) | 2022-11-17 | 2023-05-17 | 김민석 | Website access management device with cataloged web address |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100704000B1 (en) | 2006-04-18 | 2007-04-05 | 주식회사 소프트런 | Phishing prevention method for analysis internet connection site and media that can record computer program sources for method thereof |
US20140075501A1 (en) | 2012-09-07 | 2014-03-13 | Oracle International Corporation | Ldap-based multi-tenant in-cloud identity management system |
-
2015
- 2015-10-28 KR KR1020150150201A patent/KR101739415B1/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100704000B1 (en) | 2006-04-18 | 2007-04-05 | 주식회사 소프트런 | Phishing prevention method for analysis internet connection site and media that can record computer program sources for method thereof |
US20140075501A1 (en) | 2012-09-07 | 2014-03-13 | Oracle International Corporation | Ldap-based multi-tenant in-cloud identity management system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11681779B1 (en) | 2022-04-29 | 2023-06-20 | Franklin Technology Inc. | Notification service server capable of providing access notification service to harmful sites and operating method thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20170049169A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108206802B (en) | Method and device for detecting webpage backdoor | |
US10375102B2 (en) | Malicious web site address prompt method and router | |
KR101739415B1 (en) | Apparatus and method for controlling information access in internet | |
US8312172B2 (en) | Method and system for delta compression | |
CN103348334B (en) | Cloud system and the compressing file in cloud system and transfer approach | |
US8150823B2 (en) | Private searching on a public search engine | |
US8250081B2 (en) | Resource access filtering system and database structure for use therewith | |
CN109768992B (en) | Webpage malicious scanning processing method and device, terminal device and readable storage medium | |
CN104283723B (en) | Network access log processing method and processing device | |
US20210344770A1 (en) | Proxy computer system to provide direct links for bypass | |
CN110430188B (en) | Rapid URL filtering method and device | |
US20100179954A1 (en) | Quick Mass Data Manipulation Method Based on Two-Dimension Hash | |
RU2642833C2 (en) | Method and device for mediere resource support | |
MX2011013052A (en) | Cache protection. | |
US20050138004A1 (en) | Link modification system and method | |
WO2012034518A1 (en) | Method and system for providing message including universal resource locator | |
JP2009530922A (en) | Peer-to-peer gateway | |
CN110929185B (en) | Website directory detection method and device, computer equipment and computer storage medium | |
US9898463B2 (en) | Document management server, document management method, and non-transitory storage medium storing program | |
US9973597B1 (en) | Differential dictionary compression of network-accessible content | |
JP2005352534A (en) | Multi vendor support system and support method | |
JP7131357B2 (en) | Communication device, communication method, and communication program | |
KR101502589B1 (en) | Method of identifying terminals using web entity and apparatus thereof | |
AU2008350240A1 (en) | Method, system and device for associating content with a category | |
KR101018787B1 (en) | System for searching information using internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |