CN107634969B - Data interaction method and device - Google Patents
Data interaction method and device Download PDFInfo
- Publication number
- CN107634969B CN107634969B CN201711011216.8A CN201711011216A CN107634969B CN 107634969 B CN107634969 B CN 107634969B CN 201711011216 A CN201711011216 A CN 201711011216A CN 107634969 B CN107634969 B CN 107634969B
- Authority
- CN
- China
- Prior art keywords
- access
- access request
- https protocol
- target
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the invention provides a data interaction method and device, and relates to the technical field of internet. The method comprises the following steps: acquiring an access request of a user terminal for accessing a target server through a target website; based on the access request, judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request; if so, sending feedback information needing to access the target website based on the HTTPS protocol to the user terminal so that the user terminal can access the target server based on the HTTPS protocol. Therefore, the intercepted access request is judged and protected through the network equipment, and the anti-stripping attack protection of the HTTPS protocol encryption can be effectively carried out on the access request of the user under any condition.
Description
Technical Field
The invention relates to the technical field of internet, in particular to a data interaction method and device.
Background
In the era of network popularization nowadays, people use various electronic devices to access various websites according to their own needs.
However, if the request of the user for accessing does not satisfy the database or the user is the first access, the method cannot realize the anti-stripping attack of the website accessed by the user.
Therefore, how to effectively and comprehensively realize the anti-stripping attack on the website accessed by the user is a big problem in the industry at present.
Disclosure of Invention
In view of the above, the present invention provides a data interaction method and apparatus to effectively overcome the above-mentioned drawbacks.
The embodiment of the invention is realized by the following modes:
in a first aspect, an embodiment of the present invention provides a data interaction method. The method comprises the following steps: acquiring an access request of a user terminal for accessing a target server through a target website;
based on the access request, judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request; if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request, sending feedback information that the target website needs to be accessed based on the HTTPS protocol to the user terminal, so that the user terminal accesses the target server based on the HTTPS protocol.
In a second aspect, an embodiment of the present invention provides a data interaction apparatus. The device comprises: and the acquisition module is used for acquiring an access request of the user terminal for accessing the target server through the target website. And the protection judging module is used for judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request or not based on the access request. A feedback module, configured to send, to the user terminal, feedback information that the target website needs to be accessed based on the HTTPS protocol, so that the user terminal accesses the target server based on the HTTPS protocol, if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request.
The embodiment of the invention has the beneficial effects that:
the network equipment transmits feedback information for indicating that the user terminal needs to access the target website based on the HTTPS protocol when judging that the access protection based on the HTTPS protocol is executed on the access request by intercepting the access request of the user to access the target server where the target website is located based on the access request, so that the user terminal of the user can access the target server based on the HTTPS protocol. Therefore, the intercepted access request is judged and protected through the network equipment, and the anti-stripping attack protection of the HTTPS protocol encryption can be effectively carried out on the access request of the user under any condition.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating a data interaction method according to a first embodiment of the present invention;
fig. 2 shows a first sub-flowchart of step S200 in a data interaction method according to a first embodiment of the present invention;
fig. 3 shows a second sub-flowchart of step S200 in a data interaction method according to the first embodiment of the present invention;
FIG. 4 is a first block diagram of a data interaction device according to a second embodiment of the present invention;
fig. 5 is a block diagram illustrating a protection determining module in a data interaction device according to a second embodiment of the present invention;
fig. 6 shows a second structural block diagram of a data interaction device according to a second embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. The terms "first," "second," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
First embodiment
The data interaction method provided by this embodiment is applied to a Network device, which may be an NAS device (Network Access Server), an AP device (Access Point, wireless Network Access device), an AC device (Access Controller), and an Access switch. When the internal network security can be ensured, the network device can also be a core switch, a network boundary router, a firewall, an internet behavior manager, a security gateway and the like. When the user terminal interacts with the target server through the network equipment to access the target server where the target website is located, the network equipment can intercept and capture an access request sent by the user terminal. The network equipment analyzes and judges the access request, so that the user terminal can access the target server based on the HTTP protocol by encrypting the target server based on the HTTP protocol to access the target server based on the HTTPS protocol, and the anti-stripping attack protection of the user terminal is realized.
Referring to fig. 1, an embodiment of the invention provides a data interaction method applied to a network device. The data interaction method comprises the following steps: step S100, step S200, and step S300.
Step S100: and acquiring an access request of the user terminal for accessing the target server through the target website.
The network device is capable of establishing links with the user terminal and the target server, respectively. When a user terminal needs to access a target server where a target website is located, the user terminal needs to send an access request to the target server, wherein the access request is used for representing that the user terminal needs to access the target server where the target website is located. The access request may be a plaintext access request based on an http protocol, or an encrypted access request based on an HTTPS protocol, or the like, and may also be an access request in another irregular access manner. Based on the above-mentioned link relationship, the access request can be intercepted by the network device before being transmitted to the target server. It can be understood that by intercepting the access request of the network device, the access request is effectively prevented from being directly intercepted by a hacker when the user terminal sends the access request, so that a stripping attack is directly launched to the user based on the access request, and the user is directly put to a phishing website.
Step S200: and judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request or not based on the access request.
After the network device intercepts the access request sent by the user terminal, the network device needs to analyze the access request to determine whether to execute access protection based on the HTTPS protocol based on the access request. Specifically, the network device may analyze the obtained access request according to a preset analysis program to obtain each feature data in the access request. And the network equipment judges each feature data, and when any feature data does not meet the requirement of access protection based on the HTTPS protocol in the judging process, the network equipment terminates the flow of executing the anti-stripping attack of the access request so as to ensure that the user terminal directly interacts with the target server. When the judgment of each feature data satisfies the access protection requirement based on the HTTPS protocol through the judgment, the network device may determine that the access request satisfies the access protection based on the HTTPS protocol.
Step S300: if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request, sending feedback information that the target website needs to be accessed based on the HTTPS protocol to the user terminal, so that the user terminal accesses the target server based on the HTTPS protocol.
Specifically, the feedback information generated by the network device according to the preset control program can be a redirection code, which can be, for example, 302. after the network device sends the redirection code to the user terminal, the user terminal can redirect UR L (Uniform Resource L ocator, Resource locator) in the access request to UR L based on the HTTPS protocol according to the redirection code.
Referring to fig. 2, in a data interaction method provided in the embodiment of the present invention, a method sub-process of step S200 includes: step S210 and step S220.
Step S210: and judging whether each feature data in the access request is matched with the corresponding preset feature data or not, and obtaining a judgment result.
The network device obtains each feature data in the access request by analyzing the access request. Specifically, the network device may sequentially obtain each feature data in the request header of the access request through parsing. Each of the characteristic data may be used to characterize whether the access request satisfies access protection based on the HTTPS protocol performed on the access request. The characteristic data that the network device needs to acquire includes: request method data, browser type data, access times data, webpage access representation data and the like. Then, the network device may determine whether each of the feature data in the access request matches a corresponding preset feature data.
As a first embodiment, the network device may acquire all the feature data and then perform the determination for each feature data. When the judgment is made, the network device may judge each feature data to obtain a judgment result of each feature data, and the network device may further judge whether to judge the next feature data according to the judgment result of the judgment of the feature data. As a second embodiment, the network device may also acquire each feature data one by one, and determine whether to acquire the next feature data according to the determination result of determining the feature data. It can be understood that, in order to reduce the operation load of the network device and ensure the work efficiency of the network device, the second embodiment may be selected to perform the determination.
Specifically, the characteristic data acquired by the network device in the request header is request method data, where the request method data is used to characterize a request type of the access request. The network equipment matches the request method data with preset request method data to judge whether the request type represented by the request method data is in a Post mode or a Get mode. It is understood that the Post mode or the Get mode is both the access mode satisfying the HTTPS-based protocol. By judging whether the matching is performed, the network device obtains a judgment result. And when the judgment result is negative, the network equipment terminates the flow of executing the anti-stripping attack on the access request. And when the judgment result is yes, the network equipment acquires the next feature data.
And if so, the network device acquires browser type data in the request header, for example, acquiring a User-Agent field in the request header, where the browser type data is used to represent which browser on the User terminal initiated the access request. And the network equipment matches the browser type data with preset browser type data. Since the preset browser type data is the type data of each conventional browser, for example, a QQ browser, a UC browser, a 360 browser, or the like, it can be determined whether the browser type represented by the browser type data is a conventional browser through matching. And when the judgment result is negative, the network equipment terminates the flow of executing the anti-stripping attack on the access request. And when the judgment result is yes, the network equipment acquires the next feature data.
And if so, the network device obtains access time data in the request header, for example, obtains a refer field in the request header, where the access time data is used to represent whether the user terminal accesses the target server for the first time. And the network equipment matches the access frequency data with preset access frequency data. And judging whether the access times represented by the access time data are 0 or not through matching because the preset access time data are 0. And when the judgment result is negative, for example, the access frequency data is not empty, the network device exits the process of executing the anti-stripping attack on the access request, and executes other processes to process the access request. And when the judgment result is yes, for example, the access frequency data is empty, the network equipment acquires the next feature data.
And when the judgment result is yes, the network device acquires webpage access representation data in the request header, for example, acquires an accept field in the request header, wherein the webpage access representation data is used for representing whether the access request initiated by the user terminal is an access target website. And the network equipment matches the webpage access representation data with preset webpage access representation data. And the preset webpage access representation data comprises a text/html data segment, so that whether the access type represented by the webpage access representation data is webpage access or not can be judged through matching. And if the judgment result is negative, for example, the access webpage access representation data does not contain a text/html data segment, the network equipment terminates the flow of executing the anti-stripping attack on the access request. When the judgment result is yes, the requirement of performing access protection based on the HTTPS protocol on the access request is satisfied.
It should be noted that, the above-mentioned sequence manner of obtaining and matching each feature data is only one implementation manner of this embodiment, and the specific sequence manner thereof may be adjusted according to the actual implementation situation.
Step S220: and judging whether the network equipment needs to execute the access protection based on the HTTPS protocol on the access request or not based on the judgment result.
In the above determination process, the network device may obtain a determination result for each determination. Based on the obtained judgment result, the network device judges whether the network device needs to execute access protection based on the HTTPS protocol on the access request according to a preset control program. Specifically, when all the feature data have not been matched, if the determination result obtained by the network device is negative, the network device performs obtaining and determining the next feature data according to the determination result. After all the feature data are matched, if the judgment result of the last feature data acquired by the network equipment is yes, the network equipment judges that all the feature data are matched with the corresponding preset feature data, and further judges that the network equipment needs to execute access protection based on an HTTPS protocol on the access request based on the judgment result. It can be understood that, in the process of sequentially judging whether each feature data is matched, if it is judged that a certain feature data is not matched, the process of executing the anti-stripping attack on the access request is terminated.
Referring to fig. 3, in a data interaction method provided in the embodiment of the present invention, the method sub-process of step S200 further includes: step S230, step S240, and step S250.
Step S230: when the network equipment is judged to need to execute the access protection based on the HTTPS protocol on the access request, encrypting the access request so that the access request accesses the target server based on the HTTPS protocol.
In step S220, when it is determined that access protection based on the HTTPS protocol needs to be performed on the access request, in order to improve the access success rate of the user terminal based on the HTTPS protocol, the network device encrypts the access request in advance to meet the HTTPS protocol, and accesses the target server based on the HTTPS protocol.
Step S240: and judging whether the target server is successfully accessed.
The network device can obtain a location field, such as a location field, in the returned result status code, the network device can obtain the HTTPS protocol when judging whether the UR L behind the location field is UR L meeting the HTTP protocol, such as http:// www.example.com/xxx, when judging that the UR L behind the location field is the UR L meeting the HTTP protocol, the network device can also characterize the HTTPS protocol, and further characterize the access failure, the network device can also characterize the HTTPS protocol, and when the access failure is not, the target server can also support the HTTPS protocol, and the access failure can also be characterized.
Step S250: if the target server is successfully accessed, executing the following steps: and sending feedback information of accessing the target website based on the HTTPS protocol to the user terminal.
When the network device determines that the access fails according to the determination result of step S240, the process of executing the anti-peeling attack on the access request is terminated. When the access is determined to be successful, the network device may execute step S300, so that the user terminal accesses the target server where the target website is located based on the HTTPS protocol.
As an implementation manner, when the protection success rate is ensured, in order to further reduce the operation load of the network device, each preset website is stored in the network device in advance. Each preset website can be stored in a database; or one part of each preset website is stored in the first database, and the other part of each preset website is stored in the second database. Optionally, the preset websites may be stored in the first database and the second database, where the preset websites in the first database and the second database may be updated online or offline in real time, for example, the preset websites in the first database may be updated by administrators, and the preset websites in the second database may be updated by users themselves, such as private websites of users.
After step S100 is executed, the network device matches the target website to be accessed in the acquired access request with each preset website in the first database, so as to determine whether a target preset website matches the preset website. If yes, it indicates that the target server corresponding to the access request supports access of the HTTPS protocol, and the network device executes step S300. And when the judgment result is no, the network equipment matches the target website with each preset website in the second database. And when the matching of the second database is judged to be no, the access request does not need to be protected, so that the access protection of the access request based on the HTTPS protocol is stopped, and the user terminal is enabled to interact with the target server. If it is determined as yes, it is determined that access protection according to the HTTPS protocol needs to be performed on the access request, and the network device performs step S200.
Second embodiment
Referring to fig. 4, an embodiment of the invention provides a data interaction apparatus 100, and the data interaction apparatus 100 is applied to a network device. The data interaction device 100 comprises:
the obtaining module 110 is configured to obtain an access request for the user terminal to access the target server through the target website.
A protection determining module 120, configured to determine, based on the access request, whether the network device needs to perform access protection based on an HTTPS protocol on the access request.
A feedback module 130, configured to send feedback information that the target website needs to be accessed based on the HTTPS protocol to the user terminal, so that the user terminal accesses the target server based on the HTTPS protocol, if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request.
Referring to fig. 5, in a data interaction device 100 according to an embodiment of the present invention, a protection determining module 120 includes:
the protection determining unit 121 is configured to determine whether each feature data in the access request matches with a corresponding preset feature data, and obtain a determination result.
A feedback execution unit 122, configured to determine, based on the determination result, whether the network device needs to perform access protection based on the HTTPS protocol on the access request.
An accessing unit 123, configured to encrypt the access request when it is determined that the network device needs to perform the access protection based on the HTTPS protocol on the access request, so that the access request accesses the target server based on the HTTPS protocol.
An access judging unit 124, configured to judge whether the access to the target server is successful.
A step executing unit 125, configured to, if it is determined that the target server is successfully accessed, execute the steps of: and sending feedback information of accessing the target website based on the HTTPS protocol to the user terminal.
Referring to fig. 6, in a data interaction device 100 provided in an embodiment of the present invention, the data interaction device 100 further includes:
the matching judgment module 140 is configured to, after acquiring the access request, judge, by the network device, whether a target preset website matching the target website exists in the prestored preset websites.
A protection judgment execution module 150, configured to execute the following steps if it is judged that a target preset website matching the target website exists in the prestored preset websites: and judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request or not based on the access request.
It should be noted that, as those skilled in the art can clearly understand, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In summary, the embodiments of the present invention provide a data interaction method and apparatus. The method comprises the following steps: acquiring an access request of a user terminal for accessing a target server through a target website; and based on the access request, when judging that the network equipment needs to execute access protection based on the HTTPS protocol on the access request, sending feedback information needing to access the target website based on the HTTPS protocol to the user terminal so that the user terminal can access the target server based on the HTTPS protocol. Therefore, the intercepted access request is judged and protected through the network equipment, and the anti-stripping attack protection of the HTTPS protocol encryption can be effectively carried out on the access request of the user under any condition.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (8)
1. A method of data interaction, the method comprising:
acquiring an access request of a user terminal for accessing a target server through a target website;
the network equipment judges whether a target preset website matched with the target website exists in each prestored preset website or not;
if the target preset website matched with the target website exists in the prestored preset websites, judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request or not based on the access request;
if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request, sending feedback information that the target website needs to be accessed based on the HTTPS protocol to the user terminal, so that the user terminal accesses the target server based on the HTTPS protocol.
2. The data interaction method of claim 1, wherein the determining, based on the access request, whether a network device needs to perform access protection based on an HTTPS protocol on the access request comprises:
judging whether each feature data in the access request is matched with corresponding preset feature data or not, and obtaining a judgment result;
and judging whether the network equipment needs to execute the access protection based on the HTTPS protocol on the access request or not based on the judgment result.
3. The data interaction method of claim 2, wherein each feature data comprises: request method data, browser type data, or access times data.
4. The data interaction method according to claim 2 or 3, wherein after determining whether the network device needs to perform the access protection based on the HTTPS protocol on the access request based on the determination result, the method further comprises:
when the network equipment is judged to need to execute the access protection based on the HTTPS protocol on the access request, encrypting the access request so that the access request accesses the target server based on the HTTPS protocol;
judging whether the target server is successfully accessed;
if the target server is successfully accessed, executing the following steps: and sending feedback information of accessing the target website based on the HTTPS protocol to the user terminal.
5. A data interaction apparatus, the apparatus comprising:
the acquisition module is used for acquiring an access request of a user terminal for accessing a target server through a target website;
the matching judgment module is used for judging whether a target preset website matched with the target website exists in each pre-stored preset website or not;
the protection judging module is used for judging whether the network equipment needs to execute access protection based on an HTTPS protocol on the access request or not based on the access request when judging that the target preset website matched with the target website exists in the prestored preset websites;
a feedback module, configured to send, to the user terminal, feedback information that the target website needs to be accessed based on the HTTPS protocol, so that the user terminal accesses the target server based on the HTTPS protocol, if it is determined that the network device needs to perform access protection based on the HTTPS protocol on the access request.
6. The data interaction device of claim 5, wherein the protection determining module comprises:
the protection judging unit is used for judging whether each feature data in the access request is matched with the corresponding preset feature data or not and obtaining a judging result;
and the feedback execution unit is used for judging whether the network equipment needs to execute the access protection based on the HTTPS protocol on the access request or not based on the judgment result.
7. The data interaction device of claim 6, wherein each feature data comprises: request method data, browser type data, or access times data.
8. The data interaction device according to claim 6 or 7, wherein the protection determining module further comprises:
an access unit, configured to encrypt the access request when it is determined that the network device needs to perform access protection based on an HTTPS protocol on the access request, so that the access request accesses the target server based on the HTTPS protocol;
an access judging unit for judging whether the target server is successfully accessed;
a step executing unit, configured to, if it is determined that the target server is successfully accessed, execute the steps of: and sending feedback information of accessing the target website based on the HTTPS protocol to the user terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711011216.8A CN107634969B (en) | 2017-10-26 | 2017-10-26 | Data interaction method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711011216.8A CN107634969B (en) | 2017-10-26 | 2017-10-26 | Data interaction method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107634969A CN107634969A (en) | 2018-01-26 |
CN107634969B true CN107634969B (en) | 2020-07-10 |
Family
ID=61105147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711011216.8A Active CN107634969B (en) | 2017-10-26 | 2017-10-26 | Data interaction method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107634969B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981779B (en) * | 2019-03-27 | 2022-02-22 | 掌阅科技股份有限公司 | Service providing method, server and computer storage medium |
CN111988317B (en) * | 2020-08-20 | 2023-03-14 | 郑州昂视信息科技有限公司 | Judgment method and device based on network information analysis result |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101119274A (en) * | 2007-09-12 | 2008-02-06 | 杭州华三通信技术有限公司 | Method for improving treatment efficiency of SSL gateway and SSL gateway |
US7610400B2 (en) * | 2004-11-23 | 2009-10-27 | Juniper Networks, Inc. | Rule-based networking device |
CN101594261A (en) * | 2008-05-28 | 2009-12-02 | 北京百问百答网络技术有限公司 | Method and system for monitoring counterfeit website |
CN102196434A (en) * | 2010-03-10 | 2011-09-21 | 中国移动通信集团公司 | Authentication method and system for wireless local area network terminal |
CN106961439A (en) * | 2017-03-31 | 2017-07-18 | 杭州迪普科技股份有限公司 | A kind of HTTPS encrypted transmission methods and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007213397A (en) * | 2006-02-10 | 2007-08-23 | Fuji Xerox Co Ltd | Data management program, data management device and switching method of protocol |
-
2017
- 2017-10-26 CN CN201711011216.8A patent/CN107634969B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7610400B2 (en) * | 2004-11-23 | 2009-10-27 | Juniper Networks, Inc. | Rule-based networking device |
CN101119274A (en) * | 2007-09-12 | 2008-02-06 | 杭州华三通信技术有限公司 | Method for improving treatment efficiency of SSL gateway and SSL gateway |
CN101594261A (en) * | 2008-05-28 | 2009-12-02 | 北京百问百答网络技术有限公司 | Method and system for monitoring counterfeit website |
CN102196434A (en) * | 2010-03-10 | 2011-09-21 | 中国移动通信集团公司 | Authentication method and system for wireless local area network terminal |
CN106961439A (en) * | 2017-03-31 | 2017-07-18 | 杭州迪普科技股份有限公司 | A kind of HTTPS encrypted transmission methods and device |
Also Published As
Publication number | Publication date |
---|---|
CN107634969A (en) | 2018-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2078260B1 (en) | Detecting stolen authentication cookie attacks | |
CN105450582B (en) | Service processing method, terminal, server and system | |
US10419431B2 (en) | Preventing cross-site request forgery using environment fingerprints of a client device | |
EP3249877A1 (en) | Redirection method, apparatus, and system | |
WO2014172956A1 (en) | Login method,apparatus, and system | |
CN106559405B (en) | Portal authentication method and equipment | |
CN111104675A (en) | Method and device for detecting system security vulnerability | |
CN106375348B (en) | Portal authentication method and device | |
CN107508822B (en) | Access control method and device | |
US20140041012A1 (en) | System for the management of access points | |
CN105162802B (en) | Portal authentication method and certificate server | |
US20210006592A1 (en) | Phishing Detection based on Interaction with End User | |
CN107046544A (en) | A method and device for identifying an illegal access request to a website | |
CN110557358A (en) | Honeypot server communication method, SSLStrip man-in-the-middle attack perception method and related device | |
CN106550056A (en) | A kind of domain name analytic method and device | |
CN105991640B (en) | Handle the method and device of HTTP request | |
JP2023516621A (en) | Web attack detection and blocking system and method by artificial intelligence machine learning behavior-based web protocol analysis | |
CN109495362B (en) | Access authentication method and device | |
CN104837134B (en) | A kind of web authentication user login method, equipment and system | |
CN107634969B (en) | Data interaction method and device | |
CN102404345A (en) | Distributed attack prevention method and device | |
CN109561010B (en) | Message processing method, electronic equipment and readable storage medium | |
WO2017181800A1 (en) | Adaptive portal authentication page system based on operating system, and method for same | |
CN102510386B (en) | Distributed attack prevention method and device | |
CN106789884A (en) | A kind of portal authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |