CN104243489A - Method and device for reminding user of safety of Cookies - Google Patents
Method and device for reminding user of safety of Cookies Download PDFInfo
- Publication number
- CN104243489A CN104243489A CN201410523027.9A CN201410523027A CN104243489A CN 104243489 A CN104243489 A CN 104243489A CN 201410523027 A CN201410523027 A CN 201410523027A CN 104243489 A CN104243489 A CN 104243489A
- Authority
- CN
- China
- Prior art keywords
- cookies
- field value
- field name
- field
- name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
An embodiment of the invention discloses a method and a device for reminding a user of safety of Cookies and relates to the field of network safety. By the method and the device, damage to privacy and safety of the user can be reduced. The method includes determining storage positions of the Cookies, and acquiring the Cookies from the storage positions; analyzing the Cookies to acquire domain names and field names corresponding to the Cookies and original field values corresponding to the field names; recognizing meaning of the field names by inquiring a pre-built field name meaning library; if the circumstance that the field names contain field names indicating account information and/or field names indicating password information is recognized, determining that the Cookies contain the account information and/or the password information, and the user to delete the Cookies. The method and the device are suitable for occasions needing to clean and protect the Cookies generated by websites.
Description
Technical field
The present invention relates to network safety filed, particularly relate to a kind of method and device of pointing out user Cookies fail safe.
Background technology
When user browses some website, provide the Web server of webpage can generate the Cookies of the information such as time of the account of recording user on this website, password, browsed webpage, stop, and this Cookies can be stored on the hard disk of user.Wherein, Cookies (Chinese is small-size text file) refers to that some website is in order to distinguish that user identity is stored in the data on user local terminal, these data are usually through encryption, and these data are made up of domain name, field name, field value usually.
Realizing in process of the present invention, inventor finds that some rogue program can steal the related data in Cookies, thus produces harm to the privacy of user with safety.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method and device of pointing out user Cookies fail safe, can reduce and produce harm to the privacy of user with safety.
For achieving the above object, embodiments of the invention adopt following technical scheme:
On the one hand, the embodiment of the present invention provides a kind of and points out the user Cookies method of fail safe, comprising:
Determine the memory location of Cookies, and obtain Cookies from described memory location;
Described Cookies is resolved, obtains the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name;
The implication of described field name is identified by inquiring about the field name implication storehouse set up in advance, the field name representing account information and/or the field name having expression encrypted message is had if identify in described field name, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
The method of the prompting user Cookies fail safe that the embodiment of the present invention provides, this Cookies is deleted containing prompting user when account information and/or encrypted message in the Cookies that can generate in website, thus rogue program can be stoped to a certain extent to steal accounts information in this Cookies, thus can reduce and harm is produced to the privacy of user and safety.
On the other hand, the embodiment of the present invention provides a kind of and points out the user Cookies device of fail safe, comprising: the first acquiring unit, for determining the memory location of Cookies, and obtains Cookies from described memory location; Second acquisition unit, resolves for the Cookies obtained described first acquiring unit, obtains the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name; Recognition unit, for identifying the implication of described field name by inquiring about the field name implication storehouse set up in advance; Tip element, if identify in described field name the field name having and represent account information and/or the field name having expression encrypted message for described recognition unit, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
The device of the prompting user Cookies fail safe that the embodiment of the present invention provides, this Cookies is deleted containing prompting user when account information and/or encrypted message in the Cookies that can generate in website, thus rogue program can be stoped to a certain extent to steal accounts information in this Cookies, thus can reduce and harm is produced to the privacy of user and safety.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet that the present invention points out method one embodiment of user Cookies fail safe;
Fig. 2 is that the present invention points out in another embodiment of method of user Cookies fail safe the schematic flow sheet obtaining account information and/or encrypted message one embodiment contained in described Cookies;
Fig. 3 is the schematic flow sheet of S40 mono-embodiment in Fig. 2;
Fig. 4 is the part run schematic diagram that the present invention points out the another embodiment of method of user Cookies fail safe;
Fig. 5 is the frame structure schematic diagram that the present invention points out device one embodiment of user Cookies fail safe;
Fig. 6 is the frame structure schematic diagram of Tip element one embodiment in Fig. 5;
Fig. 7 is the frame structure schematic diagram obtaining subelement one embodiment in Fig. 6;
Fig. 8 is the frame structure schematic diagram of acquisition module one embodiment in Fig. 7;
Fig. 9 is the frame structure schematic diagram obtaining another embodiment of subelement in Fig. 6;
Figure 10 is the frame structure schematic diagram obtaining the another embodiment of subelement in Fig. 6.
Embodiment
Below in conjunction with accompanying drawing, the method for a kind of user of prompting Cookies of embodiment of the present invention fail safe and device are described in detail.
Should be clear and definite, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Referring to Fig. 1, embodiments of the invention provide a kind of and point out the user Cookies method of fail safe, comprising:
S1, determine the memory location of Cookies, and obtain Cookies from described memory location;
S2, described Cookies to be resolved, obtain the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name;
S3, identify the implication of described field name by inquiring about the field name implication storehouse set up in advance, the field name representing account information and/or the field name having expression encrypted message is had if identify in described field name, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
The method of the prompting user Cookies fail safe that the embodiment of the present invention provides, this Cookies is deleted containing prompting user when account information and/or encrypted message in the Cookies that can generate in website, thus rogue program can be stoped to a certain extent to steal accounts information in this Cookies, thus can reduce and harm is produced to the privacy of user and safety.
Alternatively, point out in another embodiment of the method for user Cookies fail safe in the present invention, determining containing after account information and/or encrypted message in described Cookies, and point out before user deletes described Cookies, the method for described prompting user Cookies fail safe can also comprise:
Obtain the account information and/or encrypted message that contain in described Cookies, and show the account information and/or encrypted message that contain in described Cookies to user.
In the present embodiment, time in a Cookies containing account information and/or encrypted message, user is not only pointed out to delete this Cookies, and the account information and/or encrypted message that contain in this Cookies is shown to user, thus can improve compared with previous embodiment the probability that user deletes this Cookies.
Alternatively, referring to Fig. 2, point out in another embodiment of the method for user Cookies fail safe in the present invention, the account information contained in the described Cookies of described acquisition and/or encrypted message, can comprise:
S40, the original field value corresponding to each field name are reduced, and obtain the true field value corresponding to each field name;
S41, from the true field value corresponding to described each field name, filter out and represent the true field value corresponding to field name of account information, as the account in described Cookies; And/or
S42, from the true field value corresponding to described each field name, filter out and represent the true field value corresponding to field name of encrypted message, as the password in described Cookies.
In the present embodiment, reduced by the original field value corresponding to each field name of a Cookies parsing generation, can be convenient to obtain the account information in this Cookies and encrypted message.
Alternatively, referring to Fig. 3, point out in another embodiment of the method for user Cookies fail safe in the present invention, the described original field value corresponding to each field name is reduced, obtain the true field value (S40) corresponding to each field name, can comprise:
S400, for each original field value in the corresponding original field value of described each field name, judge whether this original field value has the coding characteristic in the code identification storehouse set up in advance;
The coding characteristic in the code identification storehouse set up in advance described in if this original field value of S401 has, then determine the encoding operation this original field value having been carried out to the coding method corresponding to described coding characteristic;
S402, the coding/decoding method corresponding to described coding method is utilized to carry out decode operation to this original field value;
S403, judge whether this original field value of having carried out decode operation has the encrypted feature in the encryption identification storehouse set up in advance;
If the encrypted feature in the encryption identification storehouse set up in advance described in this original field value that S404 has carried out decode operation has, then determine the cryptographic operation this original field value of having carried out decode operation having been carried out to the encryption method corresponding to described encrypted feature;
S405, utilize the decryption method corresponding to described encryption method to be decrypted operation to this original field value of having carried out decode operation, obtain the true field value corresponding to this original field value.
In the present embodiment, such as, the character string containing " %XY " (" X " and " Y " all represents any one letter or number) form in an original field value, then illustrate that this original field value have passed through URL coded treatment.URL decoding is carried out to this original field value, if latter two character of decoded character string is "=", then illustrate that this decoded character string have passed through Base64 encryption, Base64 deciphering is carried out to this decoded character string, namely can obtain the true field value corresponding to this original field value.
In the present embodiment, the coding characteristic in the code identification storehouse set up in advance by inquiry, can be convenient to determine whether original field value has carried out coded treatment, and carry out which kind of coded treatment; Encrypted feature in the encryption identification storehouse set up in advance by inquiry, can be convenient to determine whether original field value has carried out encryption, and carry out which kind of encryption.
Alternatively, point out in the present invention in another embodiment of the method for user Cookies fail safe, can also comprise:
From the true field value corresponding to described each field name, filter out according to the described field name implication storehouse set up in advance unidentified go out field name implication field name corresponding to true field value.
In the present embodiment, by filter out unidentified go out field name implication field name corresponding to true field value, can be convenient to follow-uply to operate this true field value, and obtain accounts information from this true field value.
Alternatively, referring to Fig. 4, point out in the present invention in another embodiment of the method for user Cookies fail safe, can also comprise:
S43, judge described unidentified go out the true field value corresponding to field name of implication of field name, whether consistent with the account in the described Cookies obtained or password;
If S44 described unidentified go out the true field value corresponding to field name of implication of field name, consistent with the account in the described Cookies obtained, then determine described unidentified go out the account of the true field value corresponding to field name also for existing in described Cookies of implication of field name; Or
If S45 described unidentified go out the true field value corresponding to field name of implication of field name, consistent with the password in the described Cookies obtained, then determine described unidentified go out the password of the true field value corresponding to field name also for existing in described Cookies of implication of field name.
In the present embodiment, such as, one that generated after the Cookies parsing generate Tengxun website represents that the original field value corresponding to field name pwd of encrypted message is reduced, generates 123456, then to this
One that generates after Cookies resolves unidentified go out the original field value corresponding to field name pdddd of implication of field name reduce, if the true field value generated is 123456, so just illustrate that this true field value is password, namely this true field value 123456 is other passwords existed in this Cookies.
In the present embodiment, utilize the account in the Cookies obtained, obtain other account existed in Cookies; Utilize the password in the Cookies that obtained, obtain other password existed in Cookies, can guarantee that the account that obtains from Cookies and password are not omitted.
Referring to Fig. 5, embodiments of the invention provide a kind of and point out the user Cookies device of fail safe, comprising: the first acquiring unit 1, for determining the memory location of Cookies, and obtain Cookies from described memory location; Second acquisition unit 2, resolves for the Cookies obtained described first acquiring unit 1, obtains the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name; Recognition unit 3, for identifying the implication of described field name by inquiring about the field name implication storehouse set up in advance; Tip element 4, if identify in described field name the field name having and represent account information and/or the field name having expression encrypted message for described recognition unit 3, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
The device of the prompting user Cookies fail safe that the embodiment of the present invention provides, this Cookies is deleted containing prompting user when account information and/or encrypted message in the Cookies that can generate in website, thus rogue program can be stoped to a certain extent to steal accounts information in this Cookies, thus can reduce and harm is produced to the privacy of user and safety.
Alternatively, referring to Fig. 6, point out in another embodiment of the device of user Cookies fail safe in the present invention, described Tip element 4, can comprise: obtain subelement 40, for determine to contain account information and/or encrypted message in described Cookies at described recognition unit 3 after, obtain the account information and/or encrypted message that contain in described Cookies; Prompting subelement 41, for showing the account information and/or encrypted message that contain in the described Cookies that described acquisition subelement 40 gets to user, and points out user to delete described Cookies.
In the present embodiment, time in a Cookies containing account information and/or encrypted message, user is not only pointed out to delete this Cookies, and the account information and/or encrypted message that contain in this Cookies is shown to user, thus can improve compared with previous embodiment the probability that user deletes this Cookies.
Alternatively, referring to Fig. 7, point out in another embodiment of the device of user Cookies fail safe in the present invention, described acquisition subelement 40, can comprise: acquisition module 400, reduce for the original field value corresponding to each field name, obtain the true field value corresponding to each field name; First screening module 401, for from the true field value corresponding to described each field name, filters out the true field value corresponding to field name representing account information, as the account in described Cookies; And/or second screens module 402, for from the true field value corresponding to described each field name, filter out the true field value corresponding to field name representing encrypted message, as the password in described Cookies.
In the present embodiment, reduced by the original field value corresponding to each field name of a Cookies parsing generation, can be convenient to obtain the account information in this Cookies and encrypted message.
Alternatively, referring to Fig. 8, point out in another embodiment of the device of user Cookies fail safe in the present invention, described acquisition module 400, can comprise: first judges submodule 4000, for for each original field value in the corresponding original field value of described each field name, judge whether this original field value has the coding characteristic in the code identification storehouse set up in advance; Decoding sub-module 4001, if for described first judge submodule 4000 determine this original field value have described in coding characteristic in the code identification storehouse set up in advance, then determine the encoding operation this original field value having been carried out to the coding method corresponding to described coding characteristic, and utilize the coding/decoding method corresponding to described coding method to carry out decode operation to this original field value; Second judges submodule 4002, and whether this original field value for judging to have carried out decode operation has the encrypted feature in the encryption identification storehouse set up in advance; Deciphering submodule 4003, if for described second judge submodule 4002 determine this original field value of having carried out decode operation have described in encrypted feature in the encryption identification storehouse set up in advance, then determine the cryptographic operation this original field value of having carried out decode operation having been carried out to the encryption method corresponding to described encrypted feature, and utilize the decryption method corresponding to described encryption method to be decrypted operation to this original field value of having carried out decode operation, obtain the true field value corresponding to this original field value.
In the present embodiment, such as, the character string containing " %XY " (" X " and " Y " all represents any one letter or number) form in an original field value, then illustrate that this original field value have passed through URL coded treatment.URL decoding is carried out to this original field value, if latter two character of decoded character string is "=", then illustrate that this decoded character string have passed through Base64 encryption, Base64 deciphering is carried out to this decoded character string, namely can obtain the true field value corresponding to this original field value.
In the present embodiment, the coding characteristic in the code identification storehouse set up in advance by inquiry, can be convenient to determine whether original field value has carried out coded treatment, and carry out which kind of coded treatment; Encrypted feature in the encryption identification storehouse set up in advance by inquiry, can be convenient to determine whether original field value has carried out encryption, and carry out which kind of encryption.
Alternatively, referring to Fig. 9, point out in another embodiment of the device of user Cookies fail safe in the present invention, can also comprise: three screening module 403, for from the true field value corresponding to described each field name, filter out according to the described field name implication storehouse set up in advance unidentified go out field name implication field name corresponding to true field value.
In the present embodiment, by filter out unidentified go out field name implication field name corresponding to true field value, can be convenient to follow-uply to operate this true field value, and obtain accounts information from this true field value.
Alternatively, referring to Figure 10, point out in another embodiment of the device of user Cookies fail safe in the present invention, can also comprise: judge module 404, for judge described unidentified go out field name implication field name corresponding to true field value, whether consistent with the account in the described Cookies obtained or password; First determination module 405, if for described judge module 404 determine described unidentified go out field name implication field name corresponding to true field value, consistent with the account in the described Cookies obtained, then determine described unidentified go out the account of the true field value corresponding to field name also for existing in described Cookies of implication of field name; Or second determination module 406, if for described judge module 404 determine described unidentified go out field name implication field name corresponding to true field value, consistent with the password in the described Cookies obtained, then determine described unidentified go out the password of the true field value corresponding to field name also for existing in described Cookies of implication of field name.
In the present embodiment, such as, one that generated after the Cookies parsing generate Tengxun website represents that the original field value corresponding to field name pwd of encrypted message is reduced, generate 123456, then to this Cookies resolve after generate one unidentified go out field name implication field name pdddd corresponding to original field value reduce, if the true field value generated is 123456, so just illustrate that this true field value is password, namely this true field value 123456 is other passwords existed in this Cookies.
In the present embodiment, utilize the account in the Cookies obtained, obtain other account existed in Cookies; Utilize the password in the Cookies that obtained, obtain other password existed in Cookies, can guarantee that the account that obtains from Cookies and password are not omitted.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.
Claims (12)
1. point out a user Cookies method for fail safe, it is characterized in that, comprising:
Determine the memory location of Cookies, and obtain Cookies from described memory location;
Described Cookies is resolved, obtains the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name;
The implication of described field name is identified by inquiring about the field name implication storehouse set up in advance, the field name representing account information and/or the field name having expression encrypted message is had if identify in described field name, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
2. the method for prompting user Cookies according to claim 1 fail safe, it is characterized in that, determining containing after account information and/or encrypted message in described Cookies, and point out before user deletes described Cookies, the method for described prompting user Cookies fail safe also comprises:
Obtain the account information and/or encrypted message that contain in described Cookies, and show the account information and/or encrypted message that contain in described Cookies to user.
3. the method for prompting user Cookies according to claim 2 fail safe, it is characterized in that, the account information contained in the described Cookies of described acquisition and/or encrypted message, comprising:
The original field value corresponding to each field name is reduced, and obtains the true field value corresponding to each field name;
From the true field value corresponding to described each field name, filter out the true field value corresponding to field name representing account information, as the account in described Cookies; And/or
From the true field value corresponding to described each field name, filter out the true field value corresponding to field name representing encrypted message, as the password in described Cookies.
4. the method for prompting user Cookies according to claim 3 fail safe, it is characterized in that, the described original field value corresponding to each field name is reduced, and obtains the true field value corresponding to each field name, comprising:
For each original field value in the original field value that described each field name is corresponding, judge whether this original field value has the coding characteristic in the code identification storehouse set up in advance;
The coding characteristic in the code identification storehouse set up in advance described in if this original field value has, then determine the encoding operation this original field value having been carried out to the coding method corresponding to described coding characteristic;
The coding/decoding method corresponding to described coding method is utilized to carry out decode operation to this original field value;
Judge whether this original field value of having carried out decode operation has the encrypted feature in the encryption identification storehouse set up in advance;
The encrypted feature in the encryption identification storehouse set up in advance described in if this original field value of having carried out decode operation has, then determine the cryptographic operation this original field value of having carried out decode operation having been carried out to the encryption method corresponding to described encrypted feature;
Utilize the decryption method corresponding to described encryption method to be decrypted operation to this original field value of having carried out decode operation, obtain the true field value corresponding to this original field value.
5. the method for the prompting user Cookies fail safe according to claim 3 or 4, is characterized in that, also comprise:
From the true field value corresponding to described each field name, filter out according to the described field name implication storehouse set up in advance unidentified go out field name implication field name corresponding to true field value.
6. the method for prompting user Cookies according to claim 5 fail safe, is characterized in that, also comprise:
Judge described unidentified go out the true field value corresponding to field name of implication of field name, whether consistent with the account in the described Cookies obtained or password;
If described unidentified go out the true field value corresponding to field name of implication of field name, consistent with the account in the described Cookies obtained, then determine described unidentified go out the account of the true field value corresponding to field name also for existing in described Cookies of implication of field name; Or
If described unidentified go out the true field value corresponding to field name of implication of field name, consistent with the password in the described Cookies obtained, then determine described unidentified go out the password of the true field value corresponding to field name also for existing in described Cookies of implication of field name.
7. point out a user Cookies device for fail safe, it is characterized in that, comprising:
First acquiring unit, for determining the memory location of Cookies, and obtains Cookies from described memory location;
Second acquisition unit, resolves for the Cookies obtained described first acquiring unit, obtains the domain name corresponding to described Cookies, field name and the original field value corresponding with described field name;
Recognition unit, for identifying the implication of described field name by inquiring about the field name implication storehouse set up in advance;
Tip element, if identify in described field name the field name having and represent account information and/or the field name having expression encrypted message for described recognition unit, then determine containing account information and/or encrypted message in described Cookies, and point out user to delete described Cookies.
8. the device of prompting user Cookies according to claim 7 fail safe, it is characterized in that, described Tip element, comprising:
Obtain subelement, for determine to contain account information and/or encrypted message in described Cookies at described recognition unit after, obtain the account information and/or encrypted message that contain in described Cookies;
Prompting subelement, for showing the account information and/or encrypted message that contain in the described Cookies that described acquisition subelement gets to user, and points out user to delete described Cookies.
9. the device of prompting user Cookies according to claim 8 fail safe, it is characterized in that, described acquisition subelement, comprising:
Acquisition module, reduces for the original field value corresponding to each field name, obtains the true field value corresponding to each field name;
First screening module, for from the true field value corresponding to described each field name, filters out the true field value corresponding to field name representing account information, as the account in described Cookies; And/or
Second screening module, for from the true field value corresponding to described each field name, filters out the true field value corresponding to field name representing encrypted message, as the password in described Cookies.
10. the device of prompting user Cookies according to claim 9 fail safe, it is characterized in that, described acquisition module, comprising:
First judges submodule, for for each original field value in the corresponding original field value of described each field name, judges whether this original field value has the coding characteristic in the code identification storehouse set up in advance;
Decoding sub-module, if for described first judge submodule determine this original field value have described in coding characteristic in the code identification storehouse set up in advance, then determine the encoding operation this original field value having been carried out to the coding method corresponding to described coding characteristic, and utilize the coding/decoding method corresponding to described coding method to carry out decode operation to this original field value;
Second judges submodule, and whether this original field value for judging to have carried out decode operation has the encrypted feature in the encryption identification storehouse set up in advance;
Deciphering submodule, if for described second judge submodule determine this original field value of having carried out decode operation have described in encrypted feature in the encryption identification storehouse set up in advance, then determine the cryptographic operation this original field value of having carried out decode operation having been carried out to the encryption method corresponding to described encrypted feature, and utilize the decryption method corresponding to described encryption method to be decrypted operation to this original field value of having carried out decode operation, obtain the true field value corresponding to this original field value.
The device of 11. prompting user Cookies fail safes according to claim 9 or 10, is characterized in that, also comprise:
Three screening module, for from the true field value corresponding to described each field name, filter out according to the described field name implication storehouse set up in advance unidentified go out field name implication field name corresponding to true field value.
The device of 12. prompting user Cookies according to claim 11 fail safes, is characterized in that, also comprise:
Judge module, for judge described unidentified go out field name implication field name corresponding to true field value, whether consistent with the account in the described Cookies obtained or password;
First determination module, if for described judge module determine described unidentified go out field name implication field name corresponding to true field value, consistent with the account in the described Cookies obtained, then determine described unidentified go out the account of the true field value corresponding to field name also for existing in described Cookies of implication of field name; Or
Second determination module, if for described judge module determine described unidentified go out field name implication field name corresponding to true field value, consistent with the password in the described Cookies obtained, then determine described unidentified go out the password of the true field value corresponding to field name also for existing in described Cookies of implication of field name.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410523027.9A CN104243489B (en) | 2014-09-30 | 2014-09-30 | A kind of method and device of prompting user's Cookies securities |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410523027.9A CN104243489B (en) | 2014-09-30 | 2014-09-30 | A kind of method and device of prompting user's Cookies securities |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104243489A true CN104243489A (en) | 2014-12-24 |
CN104243489B CN104243489B (en) | 2017-09-19 |
Family
ID=52230838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410523027.9A Active CN104243489B (en) | 2014-09-30 | 2014-09-30 | A kind of method and device of prompting user's Cookies securities |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104243489B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072223A1 (en) * | 2009-09-22 | 2011-03-24 | Yahoo! Inc. | Method and system for managing cookies in web communications |
CN102594979A (en) * | 2011-12-15 | 2012-07-18 | 华为终端有限公司 | Information processing method and device |
CN103117897A (en) * | 2013-01-25 | 2013-05-22 | 北京星网锐捷网络技术有限公司 | Method and related device for detecting messages including Cookie information |
CN103701800A (en) * | 2013-12-25 | 2014-04-02 | 贝壳网际(北京)安全技术有限公司 | Cookie processing method, cookie processing device, browser and client |
CN103971059A (en) * | 2014-05-09 | 2014-08-06 | 中国科学院计算技术研究所 | Cookie local storage and usage method |
US20140259147A1 (en) * | 2011-09-29 | 2014-09-11 | Israel L'Heureux | Smart router |
-
2014
- 2014-09-30 CN CN201410523027.9A patent/CN104243489B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110072223A1 (en) * | 2009-09-22 | 2011-03-24 | Yahoo! Inc. | Method and system for managing cookies in web communications |
US20140259147A1 (en) * | 2011-09-29 | 2014-09-11 | Israel L'Heureux | Smart router |
CN102594979A (en) * | 2011-12-15 | 2012-07-18 | 华为终端有限公司 | Information processing method and device |
CN103117897A (en) * | 2013-01-25 | 2013-05-22 | 北京星网锐捷网络技术有限公司 | Method and related device for detecting messages including Cookie information |
CN103701800A (en) * | 2013-12-25 | 2014-04-02 | 贝壳网际(北京)安全技术有限公司 | Cookie processing method, cookie processing device, browser and client |
CN103971059A (en) * | 2014-05-09 | 2014-08-06 | 中国科学院计算技术研究所 | Cookie local storage and usage method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
Also Published As
Publication number | Publication date |
---|---|
CN104243489B (en) | 2017-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10447766B2 (en) | Information sharing method and system | |
US9990507B2 (en) | Adapting decoy data present in a network | |
CN106788995B (en) | File encryption method and device | |
AU2014237406B2 (en) | Method and apparatus for substitution scheme for anonymizing personally identifiable information | |
US11580760B2 (en) | Visual domain detection systems and methods | |
CN104144419A (en) | Identity authentication method, device and system | |
KR20140042905A (en) | Identity authentication and management device and method thereof | |
US20150220718A1 (en) | Method for web service user authentication | |
US8825728B2 (en) | Entering confidential information on an untrusted machine | |
CN103888480A (en) | Cloud monitoring based network information security identification method and cloud device | |
CN110445792B (en) | Verification code generation method and verification code login system | |
CN104780046A (en) | Terminal | |
CN104680215A (en) | Making method and decoding method for two-dimensional code graph | |
CN104780162A (en) | Authentication information verification method | |
KR102375973B1 (en) | Security server using case based reasoning engine and storage medium for installing security function | |
CN104243489A (en) | Method and device for reminding user of safety of Cookies | |
CN105450591A (en) | An information verification method and system, clients and a server | |
KR101526500B1 (en) | Suspected malignant website detecting method and system using information entropy | |
CN113254986B (en) | Data processing method, device and computer readable storage medium | |
CN108063742B (en) | Sensitive information providing and tracking method and device | |
US10484422B2 (en) | Prevention of rendezvous generation algorithm (RGA) and domain generation algorithm (DGA) malware over existing internet services | |
CN111931165A (en) | Host password detection method and system based on dictionary library | |
CN106802841A (en) | Data extract analytic method, device and server | |
CN112199731A (en) | Data processing method, device and equipment | |
CN111698082A (en) | Method for generating fingerprint identification of hybrid terminal equipment based on JS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190122 Address after: 519031 Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province Patentee after: Zhuhai Seal Interest Technology Co., Ltd. Address before: 519070, six level 601F, 10 main building, science and technology road, Tangjia Bay Town, Zhuhai, Guangdong. Patentee before: Zhuhai Juntian Electronic Technology Co.,Ltd. |
|
TR01 | Transfer of patent right |