CN105577701A - Web crawler recognition method and system - Google Patents
Web crawler recognition method and system Download PDFInfo
- Publication number
- CN105577701A CN105577701A CN201610134556.9A CN201610134556A CN105577701A CN 105577701 A CN105577701 A CN 105577701A CN 201610134556 A CN201610134556 A CN 201610134556A CN 105577701 A CN105577701 A CN 105577701A
- Authority
- CN
- China
- Prior art keywords
- key value
- server
- client
- script
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a web crawler recognition method and system. The recognition method comprises the steps that: a client sends a request of a preset URL link to a server; the server generates a first key value according to the request and sends the encrypted first key value and a generated JS decryption script to the client; the client generates a second key value according to the encrypted first key value and the JS decryption script and sends the second key value to the server; the server judges whether a first key value the same as the second key value exists, and if not, determines a user corresponding to the client as a web crawler. Compared with the prior art, the web crawler recognition method and system disclosed by the invention can be used for recognizing the web crawler during the first access of the server without large amount of access frequency detection, thereby saving the CPU resources and improving the recognition efficiency. Meanwhile, the first key values of the requests of different URL links do not need to be stored, thereby greatly saving the storage space of the server.
Description
Technical field
The present invention relates to field of computer technology, particularly a kind of recognition methods of web crawlers and system.
Background technology
Along with the development of the Internet, reptile amount on current the Internet increases day by day, reptile can forge user behavior, constantly access services device thus obtaining information, greatly can drag the speed of service of slow server like this, especially, when the link of asking needs a large amount of calculating just can draw time, the information that simultaneously also has is by the risk obtained in batches.
The anti-reptile means of current main flow are according to access frequency, carry out certain restriction to the client ip address of high-frequency access.This way has following shortcoming: first, needs to record a large amount of data, has high requirement to the memory space of server; Secondly, there is certain hysteresis quality, needed reptile to access the regular hour and just can determine that the other side is reptile, and reptile took enough information this time; Finally, because amount of calculation is frequent, also need constantly computing even without reptile, the pressure caused server is very large.
Summary of the invention
The technical problem to be solved in the present invention take server storage in order to overcome in prior art according to the existence of access frequency recognition network reptile, have hysteresis quality and amount of calculation defect frequently, provides a kind of web crawlers to access web spider identification method and the system that just can be identified and save server storage first.
The present invention solves above-mentioned technical problem by following technical proposals:
A recognition methods for web crawlers, its feature is, comprises the following steps:
S
1, client presets the request that links of URL (UniformResourceLocator, URL(uniform resource locator)) by one and is sent to server;
S
2, this server generates one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS (JavaScript) decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
S
3, this client deciphers script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
S
4, this server judges whether to there is first key value identical with this second key value, if not, then determines that user corresponding to this client is web crawlers.
In this programme, user corresponding to the client sent request to server can be normal users, also can be web crawlers.
Step S
3in, when the user that client is corresponding is normal users, client is run JS deciphering script based on the first key value after encryption and is generated the second key value, and this second key value is identical with this first key value; When the user that client is corresponding is web crawlers, client nonrecognition JS deciphers script, second key value of now client generation is not identical with the first key value that server generates, or the second key value is empty, therefore can prove that the request of the default URL link that user end to server sends is forged.
The second key value that this programme is generated by the first key value of being generated by server and client compares, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, compared with prior art, without the need to carrying out the detection of a large amount of access frequency, save CPU (central processing unit) resource, improve recognition efficiency.
In this programme, the request of the default URL link that server receives at every turn can be identical, also can be different, but server all can regenerate the first key value based on default URL link when receiving default URL link at every turn, therefore server is without the need to carrying out the storage of the first key value for the request of different URL link, has greatly saved the memory space of server.
Wherein, default URL link can sets itself as required, and such as can be set to/domestic/cas/key, particularly, in mvc website, need the controller of a newly-increased cas, and increase an action, name is key.
Preferably, by step S
2replace with step S
2':
S
2', this server generates first key value according to the request of this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
In this programme, in order to avoid causing accidentally injuring normal users due to network delay, server generates multiple first key value, step S
4middle server judges whether there is first key value identical with this second key value in multiple first key value.Wherein, can be set according to the concrete condition of network this time period.Such as, when the speed of network, the time period can be arranged longer, as 5 minutes; When the speed of network is slower, the time period can be arranged shorter, as 3 minutes.
Preferably, step S
4also comprise: this server is when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
In this programme, when server judges there is not first key value identical with this second key value, determine that user corresponding to this client is for web crawlers, all requests that at this moment client can be sent are tackled, or deceptive information can be sent to client, with honeypot reptile.Wherein, deceptive information can sets itself as required.
Preferably, step S
3also comprise: the request of a target URL link is sent to this server by this client;
Step S
4also comprise: this server, when judging to there is first key value identical with this second key value, is searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
In this programme, want to obtain the target information on server, client needs the request sending corresponding target URL link to server.When the user that server determination client is corresponding is not web crawlers, just can be sent to client by with the target information corresponding to target URL link, effectively prevent the information leakage of server.
Preferably, the first key value and the second key value are pseudorandom values.In this programme, server can utilize random function to generate the first key value, client also can utilize random function to generate the second key value, because the random function in computer produces according to certain algorithm simulation, consequently determining, is visible, and the probability that this foreseeable result occurs is 100%, therefore the random value produced with computer random function is random, is pseudorandom values.That is, the first key value in this programme and the second key value are pseudorandom values.
The present invention also provides a kind of recognition system of web crawlers, and its feature is, comprises a client and a server;
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
There is first key value identical with this second key value for judging whether in this server, if not, then determines that user corresponding to this client is web crawlers.
Preferably, this server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
Preferably, this server is also for when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
Preferably, this client is also for being sent to this server by the request of a target URL link;
This server also for when judging to there is first key value identical with this second key value, being searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
Preferably, the first key value and the second key value are pseudorandom values.
On the basis meeting this area general knowledge, above-mentioned each optimum condition, can combination in any, obtains the preferred embodiments of the invention.
Positive progressive effect of the present invention is: compared with prior art, the second key value that the present invention is generated by the first key value of being generated by server and client compares, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, without the need to carrying out the detection of a large amount of access frequency, save cpu resource, improve recognition efficiency.Meanwhile, server, without the need to carrying out the storage of the first key value for the request of different URL link, has saved the memory space of server greatly.
Accompanying drawing explanation
Fig. 1 is the recognition methods flow chart of the web crawlers of the embodiment of the present invention 1.
Fig. 2 is the recognition methods flow chart of the web crawlers of the embodiment of the present invention 2.
Embodiment
Mode below by embodiment further illustrates the present invention, but does not therefore limit the present invention among described scope of embodiments.
Embodiment 1
The present embodiment provides a kind of recognition methods of web crawlers, as shown in Figure 1, comprises the following steps:
The request of default URL link is sent to server by step 101, client;
Step 102, this server generate one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
Step 103, this client are deciphered script according to the first key value after this encryption and this JS and are generated one second key value, and the request of this second key value and target URL link is sent to this server;
Step 104, this server judge whether to there is first key value identical with this second key value, if so, then perform step 105, if not, then perform step 106;
Step 105, this server are searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information are sent to this client, process ends;
Step 106, determine that user corresponding to this client is for web crawlers.
In the present embodiment, the first key value and the second key value are the pseudorandom values utilizing random function to produce.
Give a concrete illustration the recognition methods that web crawlers in the present embodiment is described below.
Server receive customer end A send /domestic/cas/key request after, a key is generated according to solicited message, and key is repeatedly encrypted, dynamically generate one section of JS simultaneously and decipher script to client, code sample is: Response.Write (encode (md5 (DateTime.Now))); In the realization of encode, wherein comprise this decryption method corresponding, for client;
Customer end A is deciphered script according to key and JS after the encryption received and is generated key1, and key1 and/price request is sent to server, code sample is: varevalCode=window.eval simultaneously;
Server judge key1 with/whether key that domestic/cas/key issues identical, code sample is: varcheckResult=(Request [" key "]==md5 (DateTime.Now)), checkResult is testing result.Wherein, key and key1 is the random value produced.
If judge identical, then server searches corresponding price according to/price request, and sends it to customer end A.If judge not identical, then prove that customer end A sends/domestic/cas/key request is forged, and determines that user corresponding to customer end A is for web crawlers.
In above-mentioned example, the key1 generated by the key that generated by server and customer end A is compared, and the identification of web crawlers is realized according to comparative result, web crawlers can be made just to be identified when access services device first, compared with prior art, without the need to carrying out the detection of a large amount of access frequency, saving cpu resource, having improve recognition efficiency.Meanwhile, server, without the need to carrying out the storage of the first key value for the request of different URL link, has saved the memory space of server greatly.
The present embodiment also provides a kind of recognition system of web crawlers, comprises a client and a server.
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and the request of this second key value and target URL link is sent to this server;
First key value identical with this second key value is there is in this server for judging whether, if not, then determine that user corresponding to this client is for web crawlers, if, then search and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
Embodiment 2
The present embodiment provides a kind of recognition methods of web crawlers, be with the difference of the recognition methods of web crawlers in embodiment 1: as shown in Figure 2, the step 102 in embodiment 1 replaced with following step 202, the step 106 in embodiment 1 is replaced with following step 206:
Step 202, this server generated first key value according to the request of this default URL link every 3 minutes, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
Step 206, determine that user corresponding to this client is for web crawlers, and all requests this client sent are tackled.
In the present embodiment, in order to avoid causing accidentally injuring normal users due to network delay, server generates multiple first key value, and in step 104, server needs to judge whether there is first key value identical with this second key value in multiple first key value.Such as when execution becomes 3 the first key values to server symbiosis during step 104, comprise key10, key11, key12, key10, key11, key12 and key20 compare by server respectively, if all not identical, then determine that user corresponding to client is web crawlers.
In addition, when determining that user corresponding to client is for after web crawlers, can adopt the mode in step 206 to tackle, the mode sending deceptive information to client can also be adopted to cheat.
The present embodiment also provides a kind of recognition system of web crawlers, on the basis of embodiment 1, server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client; And when judging there is not first key value identical with this second key value, all requests this client sent are tackled, or, send a deceptive information to this client.
Although the foregoing describe the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is defined by the appended claims.Those skilled in the art, under the prerequisite not deviating from principle of the present invention and essence, can make various changes or modifications to these execution modes, but these change and amendment all falls into protection scope of the present invention.
Claims (10)
1. a recognition methods for web crawlers, is characterized in that, comprises the following steps:
S
1, client presets the request of URL link by one and is sent to server;
S
2, this server generates one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
S
3, this client deciphers script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
S
4, this server judges whether to there is first key value identical with this second key value, if not, then determines that user corresponding to this client is web crawlers.
2. recognition methods as claimed in claim 1, is characterized in that, by step S
2replace with step S
2':
S
2', this server generates first key value according to the request of this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
3. recognition methods as claimed in claim 1 or 2, is characterized in that, step S
4also comprise: this server is when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
4. recognition methods as claimed in claim 3, is characterized in that,
Step S
3also comprise: the request of a target URL link is sent to this server by this client;
Step S
4also comprise: this server, when judging to there is first key value identical with this second key value, is searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
5. recognition methods as claimed in claim 1, it is characterized in that, the first key value and the second key value are pseudorandom values.
6. a recognition system for web crawlers, is characterized in that, comprises a client and a server;
The request that this client is used for one presets URL link is sent to this server;
This server is used for generating one first key value according to the request of this default URL link, in the process that this first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption;
This client is used for deciphering script according to the first key value after this encryption and this JS and generates one second key value, and this second key value is sent to this server;
There is first key value identical with this second key value for judging whether in this server, if not, then determines that user corresponding to this client is web crawlers.
7. recognition system as claimed in claim 6, it is characterized in that, this server also generates first key value for the request according to this default URL link every a time period, in the process that current first key value is encrypted, generate a JS decipher script, and the first key value after encryption and this JS deciphering script are sent to this client, wherein, this JS deciphers script for being decrypted the first key value after this encryption.
8. recognition system as claimed in claims 6 or 7, it is characterized in that, this server is also for when judging there is not first key value identical with this second key value, and all requests this client sent are tackled, or, send a deceptive information to this client.
9. recognition system as claimed in claim 8, is characterized in that,
This client is also for being sent to this server by the request of a target URL link;
This server also for when judging to there is first key value identical with this second key value, being searched and the target information corresponding to this target URL link according to the request of this target URL link, and this target information is sent to this client.
10. recognition system as claimed in claim 6, it is characterized in that, the first key value and the second key value are pseudorandom values.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134556.9A CN105577701B (en) | 2016-03-09 | 2016-03-09 | The recognition methods of web crawlers and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610134556.9A CN105577701B (en) | 2016-03-09 | 2016-03-09 | The recognition methods of web crawlers and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105577701A true CN105577701A (en) | 2016-05-11 |
CN105577701B CN105577701B (en) | 2018-11-09 |
Family
ID=55887356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610134556.9A Active CN105577701B (en) | 2016-03-09 | 2016-03-09 | The recognition methods of web crawlers and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105577701B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534193A (en) * | 2016-12-16 | 2017-03-22 | 携程计算机技术(上海)有限公司 | Request data processing method and request data processing system |
CN106960158A (en) * | 2017-03-22 | 2017-07-18 | 福建中金在线信息科技有限公司 | A kind of method and apparatus for preventing blog from being retrieved by web crawlers |
CN107426148A (en) * | 2017-03-30 | 2017-12-01 | 成都优易数据有限公司 | A kind of anti-reptile method and system based on running environment feature recognition |
CN107800684A (en) * | 2017-09-20 | 2018-03-13 | 贵州白山云科技有限公司 | A kind of low frequency reptile recognition methods and device |
CN108429785A (en) * | 2018-01-17 | 2018-08-21 | 广东智媒云图科技股份有限公司 | A kind of generation method, reptile recognition methods and the device of reptile identification encryption string |
CN108429757A (en) * | 2018-03-26 | 2018-08-21 | 成都睿码科技有限责任公司 | A kind of the counter of guarding website resource climbs method |
CN108769037A (en) * | 2018-06-04 | 2018-11-06 | 厦门集微科技有限公司 | A kind of method, apparatus of data processing, computer storage media and terminal |
CN110012023B (en) * | 2019-04-15 | 2020-06-09 | 重庆天蓬网络有限公司 | Poison-throwing type anti-climbing method, system, terminal and medium |
CN115037526A (en) * | 2022-05-19 | 2022-09-09 | 咪咕文化科技有限公司 | Anti-crawler method, device, equipment and computer storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090094372A1 (en) * | 2007-10-05 | 2009-04-09 | Nyang Daehun | Secret user session managing method and system under web environment, recording medium recorded program executing it |
CN103279516A (en) * | 2013-05-27 | 2013-09-04 | 百度在线网络技术(北京)有限公司 | Web spider identification method |
CN105306473A (en) * | 2015-11-05 | 2016-02-03 | 北京奇虎科技有限公司 | Method, client, server and system for preventing injection attacks |
-
2016
- 2016-03-09 CN CN201610134556.9A patent/CN105577701B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090094372A1 (en) * | 2007-10-05 | 2009-04-09 | Nyang Daehun | Secret user session managing method and system under web environment, recording medium recorded program executing it |
CN103279516A (en) * | 2013-05-27 | 2013-09-04 | 百度在线网络技术(北京)有限公司 | Web spider identification method |
CN105306473A (en) * | 2015-11-05 | 2016-02-03 | 北京奇虎科技有限公司 | Method, client, server and system for preventing injection attacks |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106534193A (en) * | 2016-12-16 | 2017-03-22 | 携程计算机技术(上海)有限公司 | Request data processing method and request data processing system |
CN106960158A (en) * | 2017-03-22 | 2017-07-18 | 福建中金在线信息科技有限公司 | A kind of method and apparatus for preventing blog from being retrieved by web crawlers |
CN107426148A (en) * | 2017-03-30 | 2017-12-01 | 成都优易数据有限公司 | A kind of anti-reptile method and system based on running environment feature recognition |
CN107800684A (en) * | 2017-09-20 | 2018-03-13 | 贵州白山云科技有限公司 | A kind of low frequency reptile recognition methods and device |
CN108429785A (en) * | 2018-01-17 | 2018-08-21 | 广东智媒云图科技股份有限公司 | A kind of generation method, reptile recognition methods and the device of reptile identification encryption string |
CN108429757A (en) * | 2018-03-26 | 2018-08-21 | 成都睿码科技有限责任公司 | A kind of the counter of guarding website resource climbs method |
CN108769037A (en) * | 2018-06-04 | 2018-11-06 | 厦门集微科技有限公司 | A kind of method, apparatus of data processing, computer storage media and terminal |
CN108769037B (en) * | 2018-06-04 | 2020-11-10 | 厦门集微科技有限公司 | Data processing method and device, computer storage medium and terminal |
CN110012023B (en) * | 2019-04-15 | 2020-06-09 | 重庆天蓬网络有限公司 | Poison-throwing type anti-climbing method, system, terminal and medium |
CN115037526A (en) * | 2022-05-19 | 2022-09-09 | 咪咕文化科技有限公司 | Anti-crawler method, device, equipment and computer storage medium |
CN115037526B (en) * | 2022-05-19 | 2024-04-19 | 咪咕文化科技有限公司 | Anticreeper method, device, equipment and computer storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105577701B (en) | 2018-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105577701A (en) | Web crawler recognition method and system | |
CN112015674B (en) | Multi-level-based cache resource access method and device and computer equipment | |
US20180152293A1 (en) | Method, apparatus and system for device identification | |
US10943010B2 (en) | Generation of a random value for a child process | |
JP2019525350A (en) | Authentication method, apparatus and authentication client | |
CN110958249B (en) | Information processing method, information processing device, electronic equipment and storage medium | |
CN108306739B (en) | Method for detecting user identity information, server, computer-readable storage medium and computer equipment | |
CN105141605A (en) | Session method, web server and browser | |
CN111258602A (en) | Information updating method and device | |
CN111510442A (en) | User verification method and device, electronic equipment and storage medium | |
CN108282551B (en) | Message identification processing method and device, monitoring equipment and readable storage medium | |
CN111597537B (en) | Block chain network-based certificate issuing method, related equipment and medium | |
JP2019519849A (en) | Method and device for preventing attacks on servers | |
CN111966967A (en) | Copyright storage method and system based on block chain technology and CDN | |
US20230421544A1 (en) | Preventing fraud in aggregated network measurements | |
CN110191203B (en) | Method for realizing dynamic access of server and electronic equipment | |
CN115118504B (en) | Knowledge base updating method and device, electronic equipment and storage medium | |
CN111917787B (en) | Request detection method, request detection device, electronic equipment and computer readable storage medium | |
CN113098880A (en) | Method, system, equipment and readable storage medium for identifying replay attack | |
CN113497827A (en) | Information sharing method and device | |
CN107959691B (en) | Method for detecting user identity information, server, computer-readable storage medium and computer equipment | |
CN108156144B (en) | Access authentication method and corresponding device | |
CN114449514B (en) | Key generation method, device, equipment and medium | |
CN111756771B (en) | Detection method and device for cross-site scripting attack | |
CN106470195B (en) | Message signature method and domain name server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |