CN107070873A - Webpage invalid data screening method, system, data examination server and browser - Google Patents
Webpage invalid data screening method, system, data examination server and browser Download PDFInfo
- Publication number
- CN107070873A CN107070873A CN201710048244.0A CN201710048244A CN107070873A CN 107070873 A CN107070873 A CN 107070873A CN 201710048244 A CN201710048244 A CN 201710048244A CN 107070873 A CN107070873 A CN 107070873A
- Authority
- CN
- China
- Prior art keywords
- data
- object address
- target web
- request data
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides a kind of webpage invalid data screening method, system, data examination server and browser.Method passes through when getting the request data that user terminal is uploaded, transfer the default legal displaying object address matched with the targeted website, object address in the request data is compared one by one with the default legal displaying object address, by with any one default legal displaying object address inconsistent object address labeled as illegal displaying object address, it is achieved thereby that whether occurring illegally showing object in the target web that detection user gets.
Description
Technical field
The present invention relates to technical field of the computer network, and in particular to a kind of webpage invalid data screening method, system, number
According to examination server and browser.
Background technology
When Internet user uses website service, user can pass through browser access webpage.The webpage browsed
On generally have embedded advertisement, these ad contents have plenty of the legal advertisement through ISP's authorization,
Some then may be by malice and distort the illegal advertisement that http data are added;The illegal advertisement occurred in web page contents,
Caused by substantially web page contents are held as a hostage, this is kidnapped by distorting http data, to add illegal advertisement in web data.
For example, the webpage often accessed in some areas, user, it may appear that illegal advertisement is (i.e. in the webpage of access
Rong Shang, appearance is not the advertisement that ISP delivers on the page, for ISP, direct shadow
Ring the legitimate rights and interests of ISP).
It can be seen that, on the one hand the illegal advertisement of web data influences the legitimate rights and interests of ISP, on the other hand,
Substantial amounts of illegal advertisement obtains occupancy user flow during webpage, causes webpage loading velocity slack-off.
Therefore, how to detect that it is those skilled in the art's technical problem urgently to be resolved hurrily whether to occur illegal advertisement on webpage
One of.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of webpage invalid data screening method, system, data examination server
And browser, to realize in the webpage that detection user gets illegal advertisement whether occur.
To achieve the above object, the embodiment of the present invention provides following technical scheme:
A kind of illegal display data screening method of webpage, it is characterised in that including:
The request data that user terminal is uploaded is obtained, the request data includes:The object of object is shown in target web
Location;
Transfer the default legal displaying object address of target web;
Judge in the request data, if with existing with the default legal displaying unmatched object of object address
Location;
If there is the unmatched object address, by the unmatched object address labeled as with illegally showing object
Location.
A kind of illegal display data screening method of webpage, it is characterised in that including:
Obtain the target web that network operator server is issued;
The target data formation request data in the target web is transferred, the target data at least includes the target
The object address of object is shown in webpage;
The request data is sent to the data examination server matched with the target web.
A kind of data examination server, it is characterised in that including:
Data acquisition unit, the request data for obtaining user terminal upload, the request data includes:In target web
Show the object address of object;
Legal address transfers unit, the default legal displaying object address for transferring target web;
Matching unit, for judging in the request data, if exist with the default legal displaying object address not
The object address of matching;If there is the unmatched object address, by the unmatched object address labeled as illegal exhibition
Show object address.
A kind of browser, it is characterised in that including:
Object address placement unit, for transfer the target data in the target web that network operator server is issued with
Request data is formed, the target data at least includes the object address that object is shown in the target web;
Data outputting unit, matches for controlling user terminal to be sent to the request data with the target web
Data examination server.
A kind of illegal display data screening system of webpage, it is characterised in that including:User terminal and data examination server;
The user terminal is configured as:When obtaining the target web that network operator server is issued, the target is transferred
Target data formation request data in webpage;The request data is sent to the data matched with the target web to sieve
Server is looked into, the target data at least includes the object address that object is shown in the target web;
The data examination server is configured as:The request data that user terminal is uploaded is obtained, the target web is transferred
Default legal displaying object address;Judge in the request data, if exist and preset legal displaying object address with described
Unmatched object address;If there is the unmatched object address, by the unmatched object address labeled as illegal
Show object address.
Based on above-mentioned technical proposal, the illegal display data screening method of webpage provided in an embodiment of the present invention is obtained by working as
When getting the request data of user terminal upload, the default legal displaying object address matched with the targeted website is transferred, will
Object address in the request data is compared one by one with the default legal displaying object address, will be pre- with any one
If legal displaying object address inconsistent object address is labeled as illegal displaying object address, it is achieved thereby that detection user
Whether occur illegally showing object in the target web got.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the illegal display data screening method of webpage disclosed in the embodiment of the present application;
Fig. 2 is the webpage schematic diagram that there is illegal displaying object;
Fig. 3 is a kind of schematic flow sheet of the illegal display data screening method of webpage disclosed in another embodiment of the application;
Fig. 4 is a kind of schematic flow sheet of the illegal display data screening method of webpage disclosed in the another embodiment of the application;
Fig. 5 is a kind of structural representation of data examination server disclosed in the embodiment of the present application;
Fig. 6 is a kind of structural representation of browser disclosed in the embodiment of the present application;
Fig. 7 is a kind of structural representation of the illegal display data screening system of webpage disclosed in the embodiment of the present application;
Fig. 8 is the workflow schematic diagram of the illegal display data screening system of webpage disclosed in the application Fig. 7.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
A kind of flow chart for webpage invalid data screening method that Fig. 1 provides for the present invention, this method can be applied to network
Server end, referring to Fig. 1, this method can include:
Step S101:Obtain the request data that user terminal is uploaded;
Wherein, the request data includes:The object address of object is shown in target web;Disclosed in the embodiment of the present application
Technical scheme in, each advertisement in webpage is regarded as a displaying object, the displaying in the webpage shown to user
Object includes the ISP's accreditation and embedded legal displaying in the target web of the targeted website
Object, it is also possible to including for example shown in Fig. 2, Virtual network operator by it is embedded in network operator server, without
Each displaying object in the illegal displaying object of ISP license, target web is one unique to that should have
Object address, the object address may be considered the URL addresses (URL) of displaying object, be provided in the application
Scheme in, can be by judging the object in the target web that user gets with the presence or absence of unauthorized displaying object
The mode of location, certainly, ISP judges it is which webpage illegal displaying object, the request occurs for convenience
Other assistance datas can also be included in data, for example, the access IP of target web and access URL addresses etc..
Step S102:Transfer the default legal displaying object address of target web;
In scheme disclosed in the embodiment of the present application, portal service provider embedded legal displaying pair in target web
As when, ibid the legal displaying object on each webpage can be counted, by the default legal displaying object of legal object
Location is stored in database corresponding with the target web, in this step, when the request data for getting user terminal upload
Afterwards, judge the target web corresponding to the request data according to the request data, transfer with corresponding to the target web
Legal displaying object default legal displaying object address, certainly, if each target web correspond to respectively it is different
(the presetting database internal memory contains the default legal exhibition of legal displaying object embedded in correspondence target web to presetting database
Show object address) when, can directly it transfer and the presetting database corresponding to the target web.
Step S103:Judge in the request data, if exist and mismatched with the default legal displaying object address
Object address;If fruit is, step S104 is performed;
In this step, when the default legal displaying object for getting the legal displaying object corresponding to the target web
It is behind address or the corresponding presetting database of the target web, the object address in the request data got is legal with each
The default legal displaying object address of object is compared one by one, you can to the legitimacy of the object address in the request data
Judged, i.e. if it find that some object address in the request data is different from any one default legal displaying pair
As address, then it is assumed that the corresponding displaying object of the object address is illegal displaying object;If, the object in the request data
Address is identical with some default legal object address, then it is believed that the corresponding displaying object of the object address is legal object.
Step S104:By the unmatched object address labeled as illegal displaying object address;
In this step, when discovery and any one of default legal displaying unmatched object address of object address
When, the corresponding displaying object of the object address is regarded as into illegal object, the object address is marked, is marked as non-
Method shows object address, in order to which the ISP to the targeted website is pointed out.
The technical scheme disclosed in the above embodiments of the present application, this programme gets asking for user terminal upload by working as
When seeking data, the default legal displaying object address matched with the targeted website is transferred, by pair in the request data
As address is compared one by one with the default legal displaying object address, legal displaying object address will be preset with any one
Inconsistent object address is labeled as illegal displaying object address, it is achieved thereby that in the target web that detection user gets
Whether occur illegally showing object, and when illegal displaying object occurs in target web, can be in time to the targeted website
ISP reminded.
When by a certain object address in target web labeled as illegal displaying object address, in order to which Internet service is carried
Judge it is which website is embedded into the illegal displaying object address, the technical scheme disclosed in another embodiment of the application for business
In, the request data also includes:Access IP and access the URL address of target web;When by the unmatched object address
After illegal displaying object address, it can also include:Set up and store the access IP and access URL addresses with it is described
Mapping relations between illegal displaying object address.Thus, ISP described in this area be able to can directly obtain
Know it is which website has illegal displaying object, and specifically there is which illegal displaying object in the website.
When the ISP is embedded in legal displaying object in target web, some legal displaying objects
Domain name in object address is the domain name that the Internet Server is configured to the target web, with possessing the object of the domain name
Displaying object corresponding to location necessarily legal displaying object, therefore, can be by request data in order to improve analyze speed
Object address with the default legal displaying object address contrast one by one before, data screening is carried out, to screen out
Object address necessarily legal in request data is stated, the data processing speed of system is improved, specifically, referring to Fig. 3, above-mentioned side
Method get user terminal upload request data after, judge in the request data, if exist with it is described preset it is legal
Show before the unmatched object address of object address, can also include:
Step S301:Obtain the domain name of the Internet service provider corresponding to the target web;
Step S302:The object address for including domain name in request data is filtered out, step S102 is performed;
Certainly, in the technical scheme that the application is provided, not to described step S301, S302 and step S102 execution
Order is defined, and said sequence introduction in the present embodiment is only a kind of embodiment, and it can also be first carried out
Step S102, then step S301, S302 is performed, and then perform step S103.
Corresponding with the illegal display data screening method of the above-mentioned webpage applied to server end, referring to Fig. 3, the application is also
A kind of illegal display data screening method of webpage applied to user terminal is disclosed, the user terminal is also referred to apply and browsed
Computer, mobile phone, tablet personal computer, PC of device etc., specifically, referring to Fig. 4, the illegal display data sieve of webpage disclosed in the present embodiment
Checking method can specifically include:
Step S401:Web-page requests are sent to network operator server;
Step S402:Obtain the target web that network operator server is issued according to the web-page requests;
The network operator server, please according to the webpage after the web-page requests that the user terminal is sent are got
Ask and the target web data (web page code) matched with the web-page requests are extracted by Website server, by the target got
Webpage is transmitted to user terminal, certainly, during the network operator server forwards target web to user terminal, may
There can be the behavior that hijacking data is carried out to the target web, the network operator server kidnaps target web data
Afterwards, illegal displaying object address is implanted into the target web data, the target web of illegal displaying object address will be implanted into
It is sent to user terminal;
Step S403:The target data formation request data in the target web is transferred, the target data is at least wrapped
Include the object address that object is shown in the target web;
In this step, because ISP is not known in the target web that user gets with the presence or absence of non-
Method displaying object (ISP can not monitor the behavior that network operator server kidnaps target web) is, it is necessary to adjust
The object address of each displaying object in the webpage that family is got is taken, to form request data, facilitates Internet service to carry
Judge for business in target web with the presence or absence of illegal displaying object;
Step S404:The request data is sent to the data examination server matched with the target web;
In this step, after the request data is generated, the request data is sent to ISP,
The ISP can receive the number of request by a default webserver (data examination server)
According to the webserver can be a server individually set up, it is of course also possible to using Website server as obtaining
The server of the request data.Wherein, the data examination server may refer to the processing procedure of the request data
It is that the application station is introduced in network server end, on disclosed in an embodiment the illegal display data screening method of webpage data point
Analyse processing procedure.
It is corresponding in the illegal display data screening method of webpage that server end is write with above-mentioned station, in this method, in order to
It is easy to obtain and presets legal displaying object address, and facilitates ISP to judge which webpage has illegal displaying
There is which illegal displaying object in object, webpage, the target data can also include:The target web of the target web
Access IP and access URL addresses, i.e., the described target data transferred in the target web forms request data package and included:Transfer
Object address, access IP and access URL addresses in the target web, by the object address, with accessing IP and access URL
Location is imported in request data.
The illegal display data screening method of webpage opened altogether in the embodiment of the present application, filters out and includes described in request data
The action of the object address of domain name can be performed in network server end, can also be performed in user terminal, when the action exists
When network server end is performed, its specific method can be found in shown in the embodiment introduction in the application Fig. 3, when the action is in user
When end is performed, the application station is sent in the illegal display data screening method of webpage of user terminal introduction by the request data
Before the data examination server matched with the target web, it can also include:
Obtain the domain name of the Internet service provider corresponding to the target web;
The object address for including domain name in the request data is filtered out, step S404 is being performed.
In technical scheme disclosed in the embodiment of the present application, when extracting the request data, screening, filtering etc. act, need
Specifically to apply or script file, these script files can be realized by JS (JavaScript), these script files
It can be directly embedded in card format on the browser of user terminal, naturally it is also possible to be embedded in the webpage generation of the target web
In code, when these script files are embedded on a web browser, the browser can be triggered with often getting during a target web
The once script file, when in the web page code that these script files are embedded in the target web, the browser is in solution
The script file can be triggered automatically during analysis web page code, stand illegal in the webpage for stating user terminal introduction in the application so as to perform
Display data screening method, specifically, in the above-mentioned illegal display data screening method of webpage disclosed in the embodiment of the present application, institute
The target data formation request data transferred in the target web is stated, the request data is sent to and the target web
The data examination server matched, can specifically include:In the web page code of the target web or browser is performed to insert
Default script file in part;
The target data formation request data that the default script file is used to transfer in the target web, obtains described
The domain name of Internet service provider corresponding to target web, filters out pair for including domain name in the request data
As address, bag will be filtered except the request data after the object address containing domain name is sent to data examination server.
Corresponding to above-mentioned station in the illegal display data screening method of webpage that network server end is introduced, the application is also disclosed
A kind of data examination server, referring to Fig. 5, the data examination server can include:
Data acquisition unit 510, the request data for obtaining user terminal upload, the request data includes:Target network
The object address of object is shown in page;
Legal address transfers unit 520, the default legal displaying object address for transferring target web;
Matching unit 530, for judging in the request data, if exist and preset legal displaying object address with described
Unmatched object address;If there is the unmatched object address, by the unmatched object address labeled as illegal
Show object address.
It is corresponding with method disclosed in above-described embodiment, when the request data includes:The visit of object address, target web
When asking IP and accessing URL addresses, the legal address transfers unit 520, specifically for the access IP according to the target web
The default legal displaying object address corresponding with transferring target web is transferred with URL addresses are accessed, the matching unit 530,
It specifically can be used for, judge in the request data, if it is unmatched right with the default legal displaying object address to exist
As address;If there is the unmatched object address, by the unmatched object address labeled as with illegally showing object
Location, sets up and stores the access IP and access the mapping relations between URL addresses and the illegal displaying object address.
Corresponding with method disclosed in above-described embodiment, the data examination server can also include:
The filter element between data acquisition unit 510 and matching unit 530 is arranged at, the filter element is used to obtain
The domain name of Internet service provider corresponding to the target web, according to domain name to pair in the request data
As address is filtered, the object address for including domain name is filtered out, it is single that remaining object address is sent into the matching
Member 530.
Corresponding in the webpage invalid data screening method that user terminal is introduced with above-mentioned station, disclosed herein as well is one kind is clear
Look at device, referring to Fig. 6, the browser can include:
Object address placement unit 610, for transferring the number of targets in the target web that network operator server is issued
Request data is formed according to this, and the target data at least includes the object address that object is shown in the target web;
Data outputting unit 620, for controlling user terminal to be sent to the request data and the target web phase
The data examination server of matching.
Corresponding with above-mentioned webpage invalid data screening method, the browser can also include:It is arranged at the object
Filter element 630 between address placement unit 610 and data outputting unit 620, is used for:
The domain name of the Internet service provider corresponding to the target web is obtained, filters out in the request data and wraps
After object address containing domain name, the request data after filtering is sent to the data outputting unit 620.
In scheme disclosed in the above embodiments of the present application, the object address placement unit 610, data outputting unit
620 and filter element 630 can be the plug-in unit being arranged in browser, when the object address placement unit 610, data output
When unit 620 and filter element 630 are arranged in browser, user terminal can provide for the corresponding Internet service of each webpage
Business provides the service with the presence or absence of illegal displaying object in searching web pages, certainly, needs exist for ISP's needs
Pre-set the supporting server for being used to carry out above-mentioned illegal displaying object analysis.
In technical scheme disclosed in the embodiment of the present application, the demand of different ISPs is inconsistent, makes
, some ISPs are without the function, and some ISPs then need the function, if directly
The object address placement unit 610, data outputting unit 620 and filter element 630 are configured on a web browser, and user is daily
The ISP of the target web browsed does not need the function, then the object address in the browser can be caused to grab
Take unit 610, data outputting unit 620 and filter element 630 to flog a dead horse, increase the data processing amount of user terminal, make in it
Deposit occupancy increase, therefore, the object address placement unit 610, the and of data outputting unit 620 in the above embodiments of the present application
Filter element 630 can be the default script file got in the web page code of the target web, browser and user
End only carries out the default script file and it is not stored, it is achieved thereby that ISP is according to itself
Demand, judges whether to load the default script file in the web page code issued to user terminal by Website server.This
When, the browser is configured as getting after the web page code of the target web, parses and performs the web page code, holds
Default script file in the row web page code is (if be loaded with the default script in the web page code of the target web
File), and then realize object address placement unit, data outputting unit and the filter element introduced in the above embodiments of the present application
The function of being configured.
It is directed to the above method disclosed in the above embodiments of the present application and browser and data examination server, the application
A kind of invalid data screening system is also disclosed, referring to Fig. 7, the system can include user terminal 710 and data examination server
720;
The browser disclosed in the above-mentioned any one embodiment of the application is configured with the user terminal 710, for example, it can
To be configured as:When obtaining the target web that network operator server 730 is issued, the number of targets in the target web is transferred
According to formation request data;The request data is sent to the data examination server 720 matched with the target web, institute
State the object address that target data at least includes showing object in the target web;
The data examination server 720 can be that data examination disclosed in the above-mentioned any one embodiment of the application is serviced
Device, for example its can be configured as:The request data that user terminal is uploaded is obtained, the default legal displaying of the target web is transferred
Object address;Judge in the request data, if with existing with the default legal displaying unmatched object of object address
Location;If there is the unmatched object address, by the unmatched object address labeled as illegal displaying object address.
Certainly, because the browser end and the end of data examination server 720 can be with configurating filtered units, if two
The configurating filtered unit in end, can cause one of filter element to flog a dead horse, thus, in the invalid data screening system
In, the browser end and the end of data examination server 720 can select a setting filter element.
Certainly, in technical scheme disclosed in the above embodiments of the present application, if the object address placement unit 610,
When data outputting unit 620 and filter element 630 are the default script file in web page code, the website clothes of the target web
Be engaged in device 640 can also as the invalid data screening system a part, the Website server is configured as, and is getting net
During the web-page requests data that network carrier server 630 is uploaded, the corresponding web page code of web-page requests data is transferred, certainly,
Default script file can be loaded with when developing design in the web page code, can also be based on existing target web generation
Load default script file on the basis of code in the web page code by the Website server.
Referring to Fig. 8, the idiographic flow of the invalid data screening system can be:
Step S801:User terminal sends web-page requests to network operator server;
Step S802:Network operator server forwards the web-page requests to Website server;
Step S803:Website server transfers web page code according to the web-page requests, to the network operator services
Device issues the web page code for being loaded with default script file;
Step S804:Network operator server sends the web page code got to user terminal;
Step S805:User terminal obtains the web page code, and web page code is parsed and target network is shown to user
Page, performs the default script file in the web page code, extracts the target data in the target web, generates number of request
According to the request data is sent into network operator server;
Step S806:The request data is sent to data examination server by network operator server,
Step S807:The data examination server carries out the object of illegal displaying object according to the request data got
The markers work of address.
Certainly, the data examination server and the Website server in the system can use same service
Device, i.e. the data examination server is integrated in the Website server.
Certainly, data management for convenience, the data examination server can also be with the ISP
Displaying object jettison system (advertisement delivery system) be connected, be used to store each in the displaying object jettison system for obtaining
The presetting database of the default legal displaying object address of the displaying object of individual webpage.
For convenience of description, it is divided into various modules during description system above with function to describe respectively.Certainly, this is being implemented
The function of each module can be realized in same or multiple softwares and/or hardware during application.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for system or
For system embodiment, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to method
The part explanation of embodiment.System and system embodiment described above is only schematical, wherein the conduct
The unit that separating component illustrates can be or may not be it is physically separate, the part shown as unit can be or
Person may not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can root
Some or all of module therein is factually selected to realize the purpose of this embodiment scheme the need for border.Ordinary skill
Personnel are without creative efforts, you can to understand and implement.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These
Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can realize described function to each specific application using distinct methods, but this realization should not
Think beyond the scope of this invention.
Directly it can be held with reference to the step of the method or algorithm that the embodiments described herein is described with hardware, processor
Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
It should also be noted that, herein, such as first and second or the like relational terms are used merely to one
Entity or operation make a distinction with another entity or operation, and not necessarily require or imply between these entities or operation
There is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to contain
Lid nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those
Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that
Also there is other identical element in process, method, article or equipment including the key element.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (17)
1. a kind of illegal display data screening method of webpage, it is characterised in that including:
The request data that user terminal is uploaded is obtained, the request data includes:The object address of object is shown in target web;
Transfer the default legal displaying object address of target web;
Judge in the request data, if exist and the default legal displaying unmatched object address of object address;
If there is the unmatched object address, by the unmatched object address labeled as illegal displaying object address.
2. the illegal display data screening method of webpage according to claim 1, it is characterised in that including:The displaying pair
As for the insertion advertisement in webpage, the object address is the URL of embedded advertisement in webpage.
3. the illegal display data screening method of webpage according to claim 1, it is characterised in that the request data is also wrapped
Include:Access IP and access the URL address of target web;
It is described that the unmatched object address is labeled as after illegal displaying object address, in addition to:
Set up and store the access IP and access the mapping relations between URL addresses and the illegal displaying object address.
4. the illegal display data screening method of webpage according to claim 1, it is characterised in that on the acquisition user terminal
After the request data of biography, judge in the request data, if exist and mismatched with the default legal displaying object address
Object address before, in addition to:
Obtain the domain name of the Internet service provider corresponding to the target web;
Filter out the object address for including domain name.
5. a kind of illegal display data screening method of webpage, it is characterised in that including:
Obtain the target web that network operator server is issued;
The target data formation request data in the target web is transferred, the target data at least includes the target web
The object address of middle displaying object;
The request data is sent to the data examination server matched with the target web.
6. the illegal display data screening method of webpage according to claim 5, it is characterised in that the target data is also wrapped
Include:
Access IP and access the URL address of the target web of the target web.
7. the illegal display data screening method of webpage according to claim 5, it is characterised in that send out the request data
Before giving the data examination server matched with the target web, in addition to:
Obtain the domain name of the Internet service provider corresponding to the target web;
Filter out the object address for including domain name in the request data.
8. the illegal display data screening method of webpage according to claim 5, it is characterised in that described to transfer the target
Target data formation request data in webpage, the request data is sent to the data matched with the target web and sieved
Server is looked into, is specifically included:
Perform default script file in the web page code of the target web or in browser plug-in;
The target data formation request data that the default script file is used to transfer in the target web, obtains the target
The domain name of Internet service provider corresponding to webpage, with filtering out the object that includes domain name in the request data
Location, will filter bag except the request data after the object address containing domain name is sent to data examination server.
9. a kind of data examination server, it is characterised in that including:
Data acquisition unit, the request data for obtaining user terminal upload, the request data includes:Shown in target web
The object address of object;
Legal address transfers unit, the default legal displaying object address for transferring target web;
Matching unit, for judging in the request data, if exist and mismatched with the default legal displaying object address
Object address;If there is the unmatched object address, by the unmatched object address labeled as illegal displaying pair
As address.
10. data examination server according to claim 9, it is characterised in that the request data also includes:Target network
Access IP and access the URL address of page;
The matching unit, specifically for judging in the request data, if with existing with the default legal displaying object
The unmatched object address in location;If there is the unmatched object address, by the unmatched object address labeled as non-
Method shows object address, sets up and stores the access IP and access between URL addresses and the illegal displaying object address
Mapping relations.
11. data examination server according to claim 9, it is characterised in that also include:
The filter element between data acquisition unit and matching unit is arranged at, it is mutual corresponding to the target web for obtaining
The domain name of networked server provider, filters to the object address in the request data according to domain name, filters out bag
Object address containing domain name, the matching unit is sent to by remaining object address.
12. a kind of browser, it is characterised in that including:
Object address placement unit, for transferring the target data in the target web that network operator server is issued to be formed
Request data, the target data at least includes the object address that object is shown in the target web;
Data outputting unit, the number matched with the target web is sent to for controlling user terminal by the request data
According to examination server.
13. browser according to claim 12, it is characterised in that the target data also includes the target web
Access IP and access the URL address of target web.
14. browser according to claim 12, it is characterised in that also include:It is arranged at the object address crawl single
Filter element between member and data outputting unit, is used for:
The domain name of the Internet service provider corresponding to the target web is obtained, filters out and includes in the request data
After the object address of domain name, the request data is sent to the data outputting unit.
15. browser according to claim 14, it is characterised in that the object address placement unit, data output list
Member and filter element are the default script file being configured in the target web, and the browser is configured as getting described
After target web, parse the web page code of the target web, obtain the object address placement unit, data outputting unit and
Filter element.
16. browser according to claim 14, it is characterised in that the object address placement unit, data output list
Member and filter element are the plug-in unit being arranged in browser.
17. a kind of illegal display data screening system of webpage, it is characterised in that including:User terminal and data examination server;
The user terminal is configured as:When obtaining the target web that network operator server is issued, the target web is transferred
In target data formation request data;The request data is sent to the data examination clothes matched with the target web
Business device, the target data at least includes the object address that object is shown in the target web;
The data examination server is configured as:The request data that user terminal is uploaded is obtained, the pre- of the target web is transferred
If legal displaying object address;Judge in the request data, if do not exist with the default legal displaying object address not
The object address matched somebody with somebody;If there is the unmatched object address, by the unmatched object address labeled as illegal displaying
Object address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710048244.0A CN107070873B (en) | 2017-01-20 | 2017-01-20 | Webpage illegal data screening method and system, data screening server and browser |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710048244.0A CN107070873B (en) | 2017-01-20 | 2017-01-20 | Webpage illegal data screening method and system, data screening server and browser |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107070873A true CN107070873A (en) | 2017-08-18 |
CN107070873B CN107070873B (en) | 2020-08-04 |
Family
ID=59598744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710048244.0A Active CN107070873B (en) | 2017-01-20 | 2017-01-20 | Webpage illegal data screening method and system, data screening server and browser |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070873B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282786A (en) * | 2018-04-13 | 2018-07-13 | 上海连尚网络科技有限公司 | A kind of method and apparatus for detecting DNS spoofing attacks in WLAN |
CN109190074A (en) * | 2018-08-02 | 2019-01-11 | 北京北信源信息安全技术有限公司 | WEB application automatic discovering method and system based on terminal internet behavior data |
CN109948025A (en) * | 2019-03-20 | 2019-06-28 | 上海古鳌电子科技股份有限公司 | A kind of data referencing recording method |
CN111488511A (en) * | 2019-01-25 | 2020-08-04 | 深信服科技股份有限公司 | Website theme extraction method and system, electronic equipment and storage medium |
CN113094619A (en) * | 2021-04-22 | 2021-07-09 | 杭州推啊网络科技有限公司 | Method and system for detecting cheating returned by advertisement landing page |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1094413A2 (en) * | 1999-10-19 | 2001-04-25 | Yu, Eun YOung | Internet based advertising system |
CN1723525A (en) * | 2002-07-25 | 2006-01-18 | Google公司 | Method and system for providing filtered and/or masked advertisements over the Internet |
CN103152347A (en) * | 2013-03-13 | 2013-06-12 | 珠海市君天电子科技有限公司 | Method for prompting microblog false advertisements |
CN103605688A (en) * | 2013-11-01 | 2014-02-26 | 北京奇虎科技有限公司 | Intercept method and intercept device for homepage advertisements and browser |
US20150082426A1 (en) * | 2013-09-19 | 2015-03-19 | Acxiom Corporation | Method and System for Inferring Risk of Data Leakage from Third-Party Tags |
CN105138639A (en) * | 2015-08-24 | 2015-12-09 | 成都秋雷科技有限责任公司 | Webpage advertisement screening method |
CN106227847A (en) * | 2016-07-27 | 2016-12-14 | 宁波圆形网络科技有限公司 | One goes ad system and method |
-
2017
- 2017-01-20 CN CN201710048244.0A patent/CN107070873B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1094413A2 (en) * | 1999-10-19 | 2001-04-25 | Yu, Eun YOung | Internet based advertising system |
CN1723525A (en) * | 2002-07-25 | 2006-01-18 | Google公司 | Method and system for providing filtered and/or masked advertisements over the Internet |
CN103152347A (en) * | 2013-03-13 | 2013-06-12 | 珠海市君天电子科技有限公司 | Method for prompting microblog false advertisements |
US20150082426A1 (en) * | 2013-09-19 | 2015-03-19 | Acxiom Corporation | Method and System for Inferring Risk of Data Leakage from Third-Party Tags |
CN103605688A (en) * | 2013-11-01 | 2014-02-26 | 北京奇虎科技有限公司 | Intercept method and intercept device for homepage advertisements and browser |
CN105138639A (en) * | 2015-08-24 | 2015-12-09 | 成都秋雷科技有限责任公司 | Webpage advertisement screening method |
CN106227847A (en) * | 2016-07-27 | 2016-12-14 | 宁波圆形网络科技有限公司 | One goes ad system and method |
Non-Patent Citations (2)
Title |
---|
万立夫: "过滤手机网页中的广告信息", 《电脑迷》 * |
刘巍: "基于内容的不良网页信息过滤方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108282786A (en) * | 2018-04-13 | 2018-07-13 | 上海连尚网络科技有限公司 | A kind of method and apparatus for detecting DNS spoofing attacks in WLAN |
CN108282786B (en) * | 2018-04-13 | 2020-10-16 | 上海连尚网络科技有限公司 | Method and equipment for detecting DNS spoofing attack in wireless local area network |
CN109190074A (en) * | 2018-08-02 | 2019-01-11 | 北京北信源信息安全技术有限公司 | WEB application automatic discovering method and system based on terminal internet behavior data |
CN109190074B (en) * | 2018-08-02 | 2020-12-08 | 北京北信源信息安全技术有限公司 | WEB application automatic discovery method and system based on terminal internet behavior data |
CN111488511A (en) * | 2019-01-25 | 2020-08-04 | 深信服科技股份有限公司 | Website theme extraction method and system, electronic equipment and storage medium |
CN111488511B (en) * | 2019-01-25 | 2024-04-09 | 深信服科技股份有限公司 | Website theme extraction method and system, electronic equipment and storage medium |
CN109948025A (en) * | 2019-03-20 | 2019-06-28 | 上海古鳌电子科技股份有限公司 | A kind of data referencing recording method |
CN109948025B (en) * | 2019-03-20 | 2023-10-20 | 上海古鳌电子科技股份有限公司 | Data reference recording method |
CN113094619A (en) * | 2021-04-22 | 2021-07-09 | 杭州推啊网络科技有限公司 | Method and system for detecting cheating returned by advertisement landing page |
Also Published As
Publication number | Publication date |
---|---|
CN107070873B (en) | 2020-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107070873A (en) | Webpage invalid data screening method, system, data examination server and browser | |
US9477968B2 (en) | Collecting information regarding consumer click-through traffic | |
Cohen | PyFlag–An advanced network forensic framework | |
US8180376B1 (en) | Mobile analytics tracking and reporting | |
CN104216921B (en) | A kind of addition reminding method, apparatus and system for realizing quick links in browser | |
CN102239673B (en) | Method and system for profiling data traffic in telecommunications networks | |
CN110119469A (en) | A kind of data collection and transmission and method towards darknet | |
CN106254325B (en) | The display methods and browser of website authentication information | |
CN102868773B (en) | Method, device and system for detecting domain name system (DNS) black hole hijack | |
CN103888490A (en) | Automatic WEB client man-machine identification method | |
US20080294997A1 (en) | Contextually Aware Client Application | |
US9021085B1 (en) | Method and system for web filtering | |
CN107508903A (en) | The access method and terminal device of a kind of web page contents | |
CN104125121A (en) | Network hijacking behavior detecting system and method | |
CN105959371A (en) | Webpage sharing system | |
CN104363252B (en) | Website security detection method and device | |
CN106790593B (en) | Page processing method and device | |
CN106993009A (en) | A kind of method and apparatus for loading webpage in a browser | |
CN105282096A (en) | XSS vulnerability detection method and device | |
CN110430188A (en) | A kind of quick url filtering method and device | |
CN100550015C (en) | Improved user interface | |
CN103618696A (en) | Method and server for processing cookie information | |
CN105337776B (en) | Method and device for generating website fingerprint and electronic equipment | |
CN111541672A (en) | Method and system for detecting security of HTTP (hyper text transport protocol) request | |
CN103618761B (en) | Method and browser for processing cookie information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |