CN108011927A - The method, apparatus and storage medium and electronic equipment of request data - Google Patents
The method, apparatus and storage medium and electronic equipment of request data Download PDFInfo
- Publication number
- CN108011927A CN108011927A CN201711093531.XA CN201711093531A CN108011927A CN 108011927 A CN108011927 A CN 108011927A CN 201711093531 A CN201711093531 A CN 201711093531A CN 108011927 A CN108011927 A CN 108011927A
- Authority
- CN
- China
- Prior art keywords
- request
- data
- browser
- request response
- target data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
- H04L69/162—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/18—Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This disclosure relates to the method, apparatus and storage medium and electronic equipment of a kind of request data, this method include:Receive the first data request information for acquisition request target data that browser is sent;First data request information is packaged into corresponding second data request information of the first transport protocol, and the second data request information is sent to server;First transport protocol is the lower-layer protocols of application layer protocol;Receive the first request response that server is sent according to the second data request information;Parse the first request response and obtain target data, and the second request response is obtained according to the second transport protocol encapsulation target data;Second transport protocol is application layer protocol;Second request response is sent to browser, so that the second request response of browser resolves obtains target data.
Description
Technical field
This disclosure relates to data processing field, and in particular, to the method, apparatus and storage medium of a kind of request data
And electronic equipment.
Background technology
In mobile application, browser may be kidnapped to the page data request of server transport by network, that is, be robbed
The side of holding by abduction plug-in unit interception service request of data in the network range of abduction for being arranged on gateway or router, and
Page data request is parsed, so that the domain name of analysis request, and the access of the domain name can be transferred to by former IP address
To amended specified IP, the page is caused to be redirected to the website of vacation, in addition, kidnapping plug-in unit can also ask according to page data
Ask and the fallacious messages such as advertisement are added in the page data that server returns, alternatively, forcing to cache the page data so that the page
It can not show.
In the prior art, usually the page data request is encrypted, even if being kidnapped so that kidnapping plug-in unit
To the service data request, the page data request can not also be parsed, still, abduction side is inserted in abduction to the abduction
Part, if finding, the page data request is encrypted message, may force to intercept the page data request so that the page number
Server can not be sent to according to request, causes the page of request can not show.
The content of the invention
To solve the above-mentioned problems, the purpose of the disclosure is to provide a kind of method, apparatus of request data and storage is situated between
Matter and electronic equipment.
To achieve these goals, the disclosure provides a kind of method of request data, including:Receive the use that browser is sent
In the first data request information of acquisition request target data;First data request information is packaged into the first transport protocol
Corresponding second data request information, and second data request information is sent to server;First transport protocol
For the lower-layer protocols of application layer protocol;The first request that the server is sent according to second data request information is received to ring
Answer message;Parse first request response and obtain the target data, and institute is encapsulated according to second transport protocol
State target data and obtain second request response;Second transport protocol is application layer protocol;Please by described second
Response message is asked to send to browser, so that the second request response obtains the number of targets described in the browser resolves
According to.
Alternatively, after parsing first request response obtains the target data, the method is also wrapped
Include:According to target data described in preset buffer memory rule cache.
Alternatively, second request response is sent to browser described, the method further includes:To institute
The second request response is stated to be encrypted;Described send second request response to browser includes:Will encryption
The second request response afterwards is sent to the browser, so that the browser responds encrypted second request
Message is decrypted to obtain second request response.
Alternatively, first transport protocol includes socket agreement.
The disclosure also provides a kind of device of request data, including:First receiving module, for receiving browser transmission
The first data request information for acquisition request target data;First package module, for first request of data to be disappeared
Breath is packaged into corresponding second data request information of the first transport protocol, and second data request information is sent to service
Device;First transport protocol is the lower-layer protocols of application layer protocol;First receiving module, for receive the server according to
The first request response that second data request information is sent;Second package module, for parsing first request
Response message obtains the target data, and obtains described second according to second transport protocol encapsulation target data and ask
Seek response message;Second transport protocol is application layer protocol;Sending module, for second request response to be sent out
Send to browser, so that the second request response obtains the target data described in the browser resolves.
Alternatively, the method further includes:Cache module, for according to target data described in preset buffer memory rule cache.
Alternatively, described device further includes:Encrypting module, for second request response to be encrypted;Institute
Sending module is stated, for sending encrypted second request response to the browser, so that the browser is to institute
Encrypted second request response is stated to be decrypted to obtain second request response.
Alternatively, first transport protocol includes socket agreement.
The embodiment of the present disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program, the program
The step of above method is realized when being executed by processor.
The embodiment of the present disclosure also provides a kind of electronic equipment, including:Above computer readable storage medium storing program for executing;And one or
Person is to a processor, for performing the program in the computer-readable recording medium.
Using the above scheme, the first data request information for being used to obtain target data that browser is sent is received;By institute
State the first data request information and be packaged into corresponding second data request information of the first transport protocol, and please by second data
Message is asked to send to server;First transport protocol is the lower-layer protocols of application layer protocol;Receive the server according to
The first request response that second data request information is sent;First request response is packaged into the second biography
Corresponding second request response of defeated agreement;Second transport protocol is application layer protocol;Described second request is responded
Message is sent to browser, so that the second request response obtains the target data described in the browser resolves.In this way,
The disclosure is encapsulated as the corresponding data of lower-layer protocols of application layer protocol by the first data request information for sending browser
After request message, server is transmitted to, since abduction side can only parse the message of application layer protocol, the encapsulation can not be parsed
Data request information afterwards, so that it is guaranteed that the message is securely sent to server, avoids network abduction.
Other feature and advantage of the disclosure will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Attached drawing is for providing further understanding of the disclosure, and a part for constitution instruction, with following tool
Body embodiment is used to explain the disclosure together, but does not form the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of flow diagram of the method for request data that the embodiment of the present disclosure provides;
Fig. 2 is the flow diagram of the method for another request data that the embodiment of the present disclosure provides;
Fig. 3 is a kind of structure diagram of the device for request data that the embodiment of the present disclosure provides;
Fig. 4 is the structure diagram for a kind of electronic equipment that the embodiment of the present disclosure provides.
Embodiment
The embodiment of the disclosure is described in detail below in conjunction with attached drawing.It should be appreciated that this place is retouched
The embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
First, the application scenarios of the disclosure are illustrated, the disclosure can be applied between browser and server into
The scene of row page data request, under the scene, in order to ensure the speed of data transfer, is generally carried out using application layer protocol
Communication between browser and server, the application layer protocol can be HTTP (HyperText Transfer Protocol,
Hypertext transfer protocol) agreement is to improve the efficiency of data transfer, specifically, TCP can be established between browser and server
(Transmission Control Protocol transmission control protocols) connects, and browser is connected to server based on the TCP and sent out
The HTTP request message for request data is sent, server returns to HTTP after the HTTP request message is received, to browser
Request response, so that by the data sending of browse request to browser.
Based on this, the abduction side that network is kidnapped generally also supports application layer protocol, so that base to be parsed to data
Parsing to above-mentioned request message and response message is realized in application layer protocol, and malice behaviour is waited to the data of abduction distort
Make, to solve the above-mentioned problems, the disclosure can set a browser plug-in, which passes through the data that send browser
Request message is encapsulated as the protocol message (such as transport layer message) that the abduction side of network abduction can not parse, it is ensured that should in transmission
During data request information so that abduction side can not parse the data request information, kidnapped so as to avoid network, ensure that data
Safe transmission.
The disclosure is described in detail with reference to specific embodiment.
Fig. 1 is a kind of method for request data that the embodiment of the present disclosure provides, as shown in Figure 1, this method is applied to one kind
The device of request data, the device can be a kind of browser plug-ins, and this method includes:
S101, receive the first data request information for being used to obtain target data that browser is sent.
First data request information, is packaged into corresponding second data request information of the first transport protocol by S102, and
Second data request information is sent to server.
Wherein, which is the lower-layer protocols of application layer protocol, and illustratively, which can be transmission
Layer protocol, for example, socket (socket) agreement.
In this step, transport layer packet header can be being added for first data request information, which includes
The identification information (such as port numbers) of server.
S103, receive the first request response that the server is sent according to second data request information.
S104, parse first request response and obtain the target data, and should according to second transport protocol encapsulation
Target data obtains second request response.
Wherein, which is application layer protocol.
In this step, first request response can be parsed according to first transport protocol and obtains target data,
And encapsulate the target data according to second transport protocol and obtain second request response.
S105, send second request response to browser, so as to the browser resolves the second request response
Message obtains the target data.
Using the above method, the lower floor of application layer protocol is encapsulated as by the first data request information for sending browser
After the corresponding data request information of agreement, server is transmitted to, since abduction side can only parse the message of application layer protocol,
The data request information after the encapsulation can not be parsed, so that it is guaranteed that the message is securely sent to server, avoids network misfortune
Hold.
Fig. 2 is a kind of method for request data that the embodiment of the present disclosure provides, as shown in Fig. 2, this method is applied to one kind
The device of request data, the device can be a kind of browser plug-ins, be using the application layer protocol as HTTP in the present embodiment
Agreement, the lower-layer protocols of the application layer protocol are what is illustrated exemplified by socket agreements, and the disclosure is not construed as limiting this, the party
Method includes:
S201, receive the first data request information that browser is sent.
Wherein, which can be HTTP request message, first for acquisition request target data
Data request information.
First data request information, is packaged into corresponding second data request information of socket agreements by S202.
In this step, can be the packet header of first data request information addition socket agreements, which includes should
The information such as the port numbers of server and address, so that first data request information to be packaged into the request under socket agreements
Message.
S203, send second data request information to server.
In this step, server parses second data request information after second data request information is received,
And determine the target data of browse request, and send the first request response for including the target data.
S204, receive the first request response that server is sent.
It should be noted that what is received due to server is the second data request information under socket agreements,
Server still can be sent under socket agreements after being parsed according to socket agreements to second data request information
Response message (equivalent to the first request response), and the response message due to be non-application layer protocol message, it is clear
Device of looking at can not directly parse the response message, therefore, in the present embodiment, can pass through subsequent step S205 and step
The response message is Resealed into the response message of application layer protocol by S206, so that browser is receiving the response message
Afterwards, which can be parsed.
S205, parse first request response and obtain target data.
In this step, the first request response is parsed according to socket agreements, obtains target data.
It should be noted that in the prior art, server can also consult caching rule (such as the caching time limit with browser
With the information such as address), browser caches the target data in response message according to the caching rule, so as to complete HTTP
The foundation of caching mechanism, in this way, in the browser subsequent request target data, can directly read the target data of caching,
Without being made requests on again to server, so as to improve the efficiency of data acquisition;But since the caching mechanism of HTTP is to apply
What layer protocol was established, and the disclosure is the request of data carried out by socket agreements, therefore, in order to establish the caching machine of HTTP
System, in a kind of possible implementation of the present embodiment, after target data is obtained, can be somebody's turn to do according to preset buffer memory rule cache
Target data, and the cache informations such as the mark of the address of caching and time limit and the data of caching are sent to browser, so that
In the browser subsequent request target data, the target data of caching is directly read according to the cache information;In the present embodiment
In alternatively possible implementation, the caching of data can also be carried out by browser, can be by advance after target data is obtained
If caching rule is sent to browser, browser caches target data according to the preset buffer memory rule, so as to browse
During the device subsequent request target data, target data is read from the data of caching.
Wherein, which can include the information such as caching time limit, the buffer address consulted in advance with server,
The target data can include text, picture and the data such as JS files and htm files.
The target data, is encapsulated as corresponding second request response of http protocol by S206.
S207, send second request response to browser, so as to the browser resolves the second request response
Message obtains the target data.
In this step, if establishing caching mechanism in above-mentioned steps S205, which further includes
Preset buffer memory rule, in this way, browser is in the subsequent request target data, can be according to the preset buffer memory rule from caching
Obtain the target data.
It should be noted that in view of during the second request response is sent to browser, it is also possible to deposit
In the risk that message is held as a hostage, therefore, in order to ensure the security of data, in the alternatively possible implementation of the present embodiment
In, after the second request response is obtained, second request response can also be encrypted, and will be encrypted
Second request response is sent to the browser, so that the browser is to encrypted second request response
It is decrypted, and obtains second request response, so as to avoids the target data side of being held as a hostage in response message from distorting.
Using the above method, the lower floor of application layer protocol is encapsulated as by the first data request information for sending browser
After the corresponding data request information of agreement, server is transmitted to, since abduction side can only parse the message of application layer protocol,
The data request information after the encapsulation can not be parsed, so that it is guaranteed that the message is securely sent to server, avoids network misfortune
Hold.
Fig. 3 is a kind of device for request data that the embodiment of the present disclosure provides, as shown in figure 3, the device includes:
First receiving module 301, the first data for acquisition request target data for receiving browser transmission please
Seek message;
First package module 302, for first data request information to be packaged into the first transport protocol corresponding second
Data request information, and second data request information is sent to server;First transport protocol is application layer protocol
Lower-layer protocols;
First receiving module 303, the first request sent for receiving the server according to second data request information
Response message;
Second package module 304, the target data is obtained for parsing first request response, and according to this second
Transport protocol encapsulates the target data and obtains second request response;Second transport protocol is application layer protocol;
Sending module 305, for sending second request response to browser, so as to the browser resolves this
Two request responses obtain the target data.
Alternatively, which further includes:Cache module 306, for according to the preset buffer memory rule cache target data.
Alternatively, which further includes:
Encrypting module 307, for second request response to be encrypted;
The sending module 305, for sending encrypted second request response to the browser, so that this is browsed
Device is decrypted to obtain second request response to encrypted second request response.
Alternatively, which includes socket agreement.
Using above device, the lower floor of application layer protocol is encapsulated as by the first data request information for sending browser
After the corresponding data request information of agreement, server is transmitted to, since abduction side can only parse the message of application layer protocol,
The data request information after the encapsulation can not be parsed, so that it is guaranteed that the message is securely sent to server, avoids network misfortune
Hold.
It should be noted that affiliated those skilled in the art can be understood that, for convenience and simplicity of description,
The specific work process of the device of foregoing description and description, may be referred to the corresponding process in above method embodiment, herein not
Repeat again.
Fig. 4 is the block diagram of a kind of electronic equipment 400 according to an exemplary embodiment.As shown in figure 4, the electronics is set
Standby 400 can include:Processor 401, memory 402, multimedia component 403, input/output (I/O) interface 404, Yi Jitong
Believe component 405.
Wherein, processor 401 is used for the integrated operation for controlling the electronic equipment 400, to complete above-mentioned request data
All or part of step in method.Memory 402 is used to store various types of data to support in the electronic equipment 400
Operation, these data can for example include the instruction of any application program or method for being operated on the electronic equipment 400,
And the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory
402 can be realized by any kind of volatibility or non-volatile memory device or combinations thereof, such as static random is deposited
Access to memory (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory
(Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmable
Read-only storage (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory
(Programmable Read-Only Memory, abbreviation PROM), and read-only storage (Read-Only Memory, referred to as
ROM), magnetic memory, flash memory, disk or CD.Multimedia component 403 can include screen and audio component.Wherein
Screen for example can be touch-screen, and audio component is used to export and/or input audio signal.For example, audio component can include
One microphone, microphone are used to receive external audio signal.The received audio signal can be further stored in storage
Device 402 is sent by communication component 405.Audio component further includes at least one loudspeaker, for exports audio signal.I/O
Interface 404 provides interface between processor 401 and other interface modules, other above-mentioned interface modules can be keyboard, mouse,
Button etc..These buttons can be virtual push button or entity button.Communication component 405 is used for the electronic equipment 400 and other
Wired or wireless communication is carried out between equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near Field
Communication, abbreviation NFC), 2G, 3G or 4G, or one or more of combinations in them, therefore the corresponding communication
Component 405 can include:Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, electronic equipment 400 can be by one or more application application-specific integrated circuit
(Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (Digital
Signal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device,
Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array
(Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics member
Part realization, the method for performing above-mentioned request data.
In a further exemplary embodiment, a kind of computer-readable recording medium including programmed instruction, example are additionally provided
Such as include the memory 402 of programmed instruction, above procedure instruction can be performed with completion by the processor 401 of electronic equipment 400
The method for the request data stated.
The preferred embodiment of the disclosure is described in detail above in association with attached drawing, still, the disclosure is not limited to above-mentioned reality
The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure
Monotropic type, these simple variants belong to the protection domain of the disclosure.
It is further to note that each particular technique feature described in above-mentioned embodiment, in not lance
In the case of shield, can be combined by any suitable means, in order to avoid unnecessary repetition, the disclosure to it is various can
The combination of energy no longer separately illustrates.
In addition, it can also be combined between a variety of embodiments of the disclosure, as long as it is without prejudice to originally
Disclosed thought, it should equally be considered as disclosure disclosure of that.
Claims (10)
- A kind of 1. method of request data, it is characterised in that including:Receive the first data request information for acquisition request target data that browser is sent;First data request information is packaged into corresponding second data request information of the first transport protocol, and by described Two data request informations are sent to server;First transport protocol is the lower-layer protocols of application layer protocol;Receive the first request response that the server is sent according to second data request information;Parse first request response and obtain the target data, and the mesh is encapsulated according to second transport protocol Mark data obtain second request response;Second transport protocol is application layer protocol;Second request response is sent to browser, so as to the second request response described in the browser resolves Obtain the target data.
- 2. according to the method described in claim 1, it is characterized in that, obtain institute in parsing first request response After stating target data, the method further includes:According to target data described in preset buffer memory rule cache.
- 3. according to the method described in claim 1, it is characterized in that, second request response is sent to clear described Look at before device, the method further includes:Second request response is encrypted;Described send second request response to browser includes:Encrypted second request response is sent to the browser, so that the browser is to described encrypted Two request responses are decrypted to obtain second request response.
- 4. method according to any one of claims 1 to 3, it is characterised in that first transport protocol includes socket Socket agreements.
- A kind of 5. device of request data, it is characterised in that including:First receiving module, for receiving the first data request information for acquisition request target data of browser transmission;First package module, please for first data request information to be packaged into corresponding second data of the first transport protocol Message is sought, and second data request information is sent to server;First transport protocol is under application layer protocol Layer protocol;First receiving module, responds for receiving the first request that the server is sent according to second data request information Message;Second package module, the target data is obtained for parsing first request response, and according to described second Transport protocol encapsulates the target data and obtains second request response;Second transport protocol is assisted for application layer View;Sending module, for sending second request response to browser, so as to described in the browser resolves Two request responses obtain the target data.
- 6. device according to claim 5, it is characterised in that described device further includes:Cache module, for according to default Cache target data described in rule cache.
- 7. device according to claim 5, it is characterised in that described device further includes:Encrypting module, for second request response to be encrypted;The sending module, for sending encrypted second request response to the browser, browses so as to described Device is decrypted to obtain second request response to encrypted second request response.
- 8. according to claim 5 to 7 any one of them device, it is characterised in that first transport protocol includes socket Socket agreements.
- 9. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor The step of any one of Claims 1-4 the method is realized during row.
- 10. a kind of electronic equipment, it is characterised in that including:Computer-readable recording medium described in claim 9;AndOne or to a processor, for performing the program in the computer-readable recording medium.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711093531.XA CN108011927A (en) | 2017-11-08 | 2017-11-08 | The method, apparatus and storage medium and electronic equipment of request data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711093531.XA CN108011927A (en) | 2017-11-08 | 2017-11-08 | The method, apparatus and storage medium and electronic equipment of request data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108011927A true CN108011927A (en) | 2018-05-08 |
Family
ID=62052192
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711093531.XA Pending CN108011927A (en) | 2017-11-08 | 2017-11-08 | The method, apparatus and storage medium and electronic equipment of request data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108011927A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198345A (en) * | 2019-05-06 | 2019-09-03 | 视联动力信息技术股份有限公司 | A kind of data request method, system and device and storage medium |
CN110519367A (en) * | 2019-08-27 | 2019-11-29 | 中国银联股份有限公司 | A kind of application management method and device |
CN110995798A (en) * | 2019-11-21 | 2020-04-10 | 上海龙旗科技股份有限公司 | Data communication method and system for functional mobile phone network application |
CN111885048A (en) * | 2020-07-21 | 2020-11-03 | 湖南九章智云科技有限责任公司 | Method, system and device for data interaction between different systems |
CN113065049A (en) * | 2021-03-19 | 2021-07-02 | 深圳市腾讯网域计算机网络有限公司 | Data capture method and device, storage medium and electronic equipment |
CN113783914A (en) * | 2020-09-01 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Data processing method, device and equipment |
CN114221995A (en) * | 2021-11-11 | 2022-03-22 | 中国建设银行股份有限公司 | Service calling method and device and electronic equipment |
CN114338094A (en) * | 2021-12-09 | 2022-04-12 | 北京五八信息技术有限公司 | Method and device for acquiring request header information, electronic equipment and readable medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130179981A1 (en) * | 2012-01-09 | 2013-07-11 | Ezshield, Inc. | Computer Implemented Method, Computer System And Nontransitory Computer Readable Storage Medium Having HTTP Module |
CN103516673A (en) * | 2012-06-21 | 2014-01-15 | 腾讯科技(深圳)有限公司 | Network data communication method, network data communication system, network data communication client and network data communication server |
CN103685470A (en) * | 2013-11-19 | 2014-03-26 | Tcl光电科技(惠州)有限公司 | Browser-based remote control method and system, and browser and application server |
CN106713355A (en) * | 2017-01-23 | 2017-05-24 | 绿网天下(福建)网络科技股份有限公司 | PC-based network filtering method and client PC |
-
2017
- 2017-11-08 CN CN201711093531.XA patent/CN108011927A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130179981A1 (en) * | 2012-01-09 | 2013-07-11 | Ezshield, Inc. | Computer Implemented Method, Computer System And Nontransitory Computer Readable Storage Medium Having HTTP Module |
CN103516673A (en) * | 2012-06-21 | 2014-01-15 | 腾讯科技(深圳)有限公司 | Network data communication method, network data communication system, network data communication client and network data communication server |
CN103685470A (en) * | 2013-11-19 | 2014-03-26 | Tcl光电科技(惠州)有限公司 | Browser-based remote control method and system, and browser and application server |
CN106713355A (en) * | 2017-01-23 | 2017-05-24 | 绿网天下(福建)网络科技股份有限公司 | PC-based network filtering method and client PC |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198345A (en) * | 2019-05-06 | 2019-09-03 | 视联动力信息技术股份有限公司 | A kind of data request method, system and device and storage medium |
CN110198345B (en) * | 2019-05-06 | 2021-07-20 | 视联动力信息技术股份有限公司 | Data request method, system and device and storage medium |
CN110519367A (en) * | 2019-08-27 | 2019-11-29 | 中国银联股份有限公司 | A kind of application management method and device |
CN110995798A (en) * | 2019-11-21 | 2020-04-10 | 上海龙旗科技股份有限公司 | Data communication method and system for functional mobile phone network application |
CN111885048A (en) * | 2020-07-21 | 2020-11-03 | 湖南九章智云科技有限责任公司 | Method, system and device for data interaction between different systems |
CN113783914A (en) * | 2020-09-01 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Data processing method, device and equipment |
CN113065049A (en) * | 2021-03-19 | 2021-07-02 | 深圳市腾讯网域计算机网络有限公司 | Data capture method and device, storage medium and electronic equipment |
CN114221995A (en) * | 2021-11-11 | 2022-03-22 | 中国建设银行股份有限公司 | Service calling method and device and electronic equipment |
CN114221995B (en) * | 2021-11-11 | 2024-04-09 | 中国建设银行股份有限公司 | Service calling method and device and electronic equipment |
CN114338094A (en) * | 2021-12-09 | 2022-04-12 | 北京五八信息技术有限公司 | Method and device for acquiring request header information, electronic equipment and readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108011927A (en) | The method, apparatus and storage medium and electronic equipment of request data | |
US8676260B2 (en) | Method of managing information by a large capacity UICC | |
US10069800B2 (en) | Scalable intermediate network device leveraging SSL session ticket extension | |
US8429301B2 (en) | Method and apparatus for resource locator identifier rewrite | |
US11689514B2 (en) | User authentication in communication systems | |
CN105791451B (en) | Message response method and device | |
CN106209838B (en) | IP access method and device of SSL VPN | |
US9674142B2 (en) | Monitoring network traffic | |
JP2018534852A (en) | Internet Key Exchange (IKE) for secure association between devices | |
CN106714154B (en) | Proxy server, method and system for generic bootstrapping architecture protocol | |
JP2014160942A (en) | Authentication method, transfer device, and authentication server | |
US10341286B2 (en) | Methods and systems for updating domain name service (DNS) resource records | |
US11418951B2 (en) | Method for identifying encrypted data stream, device, storage medium and system | |
US20230164119A1 (en) | Network device protection | |
EP3235188B1 (en) | Method for resolving a host name, related system and computer program product | |
CN107547564A (en) | A kind of method and device of Message processing | |
CN104509046B (en) | A kind of data communications method, equipment and system | |
CN113014490A (en) | IP message forwarding method and device | |
Sahraoui et al. | Securing human‐to‐thing interactions in the Internet of Things with asymmetric and selective mechanism | |
EP4109828B1 (en) | Method for communicating with a remote dns server | |
CN114978643B (en) | Communication method, network equipment and storage medium | |
Santos et al. | Feedback to the European Data Protection Board's Guidelines 2/2023 on Technical Scope of Art. 5 (3) of ePrivacy Directive | |
EP3202173B1 (en) | Method of sending a data from a secure token to a server | |
Ma et al. | Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle | |
CN118631518A (en) | Data processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180508 |