CN109150965A - The anti-screen method of information resources, device, computer equipment and storage medium - Google Patents
The anti-screen method of information resources, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109150965A CN109150965A CN201810736790.8A CN201810736790A CN109150965A CN 109150965 A CN109150965 A CN 109150965A CN 201810736790 A CN201810736790 A CN 201810736790A CN 109150965 A CN109150965 A CN 109150965A
- Authority
- CN
- China
- Prior art keywords
- content
- script
- shielding
- network system
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Abstract
The invention discloses the anti-screen method of information resources, device, computer equipment and storage mediums, wherein method includes: that content distribution network system obtains the resource request from browser end, and the resource request is to be generated according to the encryption result of the uniform resource locator of requested information resources;Content distribution network system restores uniform resource locator from resource request, obtains information resources from server end according to the uniform resource locator restored, returns to browser end.Using scheme of the present invention, it is able to ascend anti-shield effectiveness etc..
Description
[technical field]
The present invention relates to Computer Applied Technology, in particular to the anti-screen method of information resources, device, computer equipment and
Storage medium.
[background technique]
Currently, some information resources are additionally often shown by certain mode when browser end carries out page presentation,
For example, one independent wicket of load, for showing advertising resource etc..
Correspondingly, also there are various information resources shielding softwares, such as ADBlock, these softwares can be to upper
It states information resources to be intercepted and hidden on a large scale, to realize the shielding for above- mentioned information resource.
Information resources, which shield software, to intercept resource request, the uniform resource locator of detection information resource in browser end
(URL, Uniform Resoure Locator) content, if the characteristic matching of uniform resource locator, terminates resource request,
So that resource request can not normally be sent, so that information resources can not normal presentation.Current many information resources
All there is obviously feature in uniform resource locator, it is easy to be identified by information resources shielding software, to terminate
Resource request.
Information resources shield the masking operation of software, although bringing certain convenience to some users, can also lead
Some legal, normal content information resources are caused to be shielded, for this purpose, in certain situations it is desirable to carrying out information resources
Anti- shielding processing.
For example, can add script in the page shields software for detection information resource, if discovery information resources shield software
In the presence of, then prompt user's closing information resource shielding software or wish user actively by respective site be added to information resources shielding
The white list of software is medium, but this mode needs user to be operated manually, to bring extra workload for user
Deng.
For another example, the domain name intercepted by information resources shielding software can be also replaced in time, such as carried out using a domain name pond
Rotation, but this is a kind of of short duration effective solution mode not can solve resource shielding software and intercept its in addition to domain name
Its feature, practical application effect are very poor.
[summary of the invention]
In view of this, the present invention provides the anti-screen method of information resources, device, computer equipment and storage mediums.
Specific technical solution is as follows:
A kind of anti-screen method of information resources, comprising:
Content distribution network system obtains the resource request from browser end, and the resource request is according to requested
What the encryption result of the uniform resource locator of information resources generated;
The content distribution network system restores the uniform resource locator from the resource request;
The content distribution network system obtains the information resources from server end according to the uniform resource locator,
And return to the browser end.
A kind of anti-screen method of information resources, comprising:
Browser end is requested to content distributing network system transmission resources, and the resource request is according to requested information
What the encryption result of the uniform resource locator of resource generated;
The browser end obtains the information resources that the content distribution network system returns, and the information resources are
The content distribution network system is after restoring the uniform resource locator in the resource request, according to the unified money
Source finger URL is obtained from server end.
A kind of anti-screening arrangement of information resources, comprising: first acquisition unit, information reduction unit and second obtain single
Member;
The first acquisition unit, for obtaining the resource request from browser end, the resource request is according to institute
What the encryption result of the uniform resource locator of the information resources of request generated;
The information reduction unit, for restoring the uniform resource locator from the resource request;
The second acquisition unit is provided for obtaining the information from server end according to the uniform resource locator
Source, and return to the browser end.
A kind of anti-screening arrangement of information resources, comprising: the first transmission unit and the 4th acquiring unit;
First transmission unit, for requesting to content distributing network system transmission resources, the resource request is root
It is generated according to the encryption result of the uniform resource locator of requested information resources;
4th acquiring unit, the information resources returned for obtaining the content distribution network system are described
Information resources are the content distribution network system after restoring the uniform resource locator in the resource request, according to
The uniform resource locator is obtained from server end.
A kind of computer equipment, including memory, processor and be stored on the memory and can be in the processor
The computer program of upper operation, the processor realize method as described above when executing described program.
A kind of computer readable storage medium is stored thereon with computer program, real when described program is executed by processor
Now method as described above.
It can be seen that based on above-mentioned introduction using scheme of the present invention, from the working principle of information resources shielding software
It sets out, is encrypted by the uniform resource locator to information resources, eliminate original uniform resource locator
Existing characteristic information, rather than just domain name replacement is simply carried out, so that information resources shielding software can not be by
The shielding of information resources is carried out according to original feature detection mode, and then improves anti-shield effectiveness, and is carried out without artificial
Operation, to reduce the workload etc. of user.
[Detailed description of the invention]
Fig. 1 is the flow chart of the anti-screen method first embodiment of information resources of the present invention.
Fig. 2 is the flow chart of the anti-screen method second embodiment of information resources of the present invention.
Interactive process of the Fig. 3 between browser end of the present invention, content distribution network system and server end is shown
It is intended to.
Fig. 4 is the composed structure schematic diagram of the anti-screening arrangement first embodiment of information resources of the present invention.
Fig. 5 is the composed structure schematic diagram of the anti-screening arrangement second embodiment of information resources of the present invention.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
[specific embodiment]
For user after browser end inputs network address, browser end can send page request, received server-side according to network address
To after page request, corresponding content of pages, the content of pages that browser end is analyzed and acquired by can be returned to, and then show us
The page seen.
Accelerate currently, carrying out caching using content distributing network (CDN, Content Delivery Network) system
Through very universal.If there is content distribution network system, then the page request that browser end issues can first be sent to content
Distributing network system obtains content of pages from server end by content distribution network system, then will by content distribution network system
The content of pages got returns to browser end.
The displaying process of information resources such as advertisement also complies with above-mentioned process, and the request for information resources can be described as resource and ask
It asks.As previously mentioned, information resources shielding software can intercept resource request in browser end, the unified resource of detection information resource is fixed
Position symbol content, if the characteristic matching of uniform resource locator, terminates resource request, so that resource request can not normally be sent out
It send, so that information resources can not normal presentation.The uniform resource locator of many information resources all exists very bright at present
Aobvious feature, it is easy to be identified by information resources shielding software, to terminate resource request.
Under above-mentioned network environment, combined content distributing network system of the present invention proposes that a kind of information resources are counter to be shielded
Mode targetedly carries out anti-shielding processing from the working principle of information resources shielding software.
In order to be clearer and more clear technical solution of the present invention, hereinafter, referring to the drawings and the embodiments, to institute of the present invention
The scheme of stating is further described.
Obviously, described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on the present invention
In embodiment, those skilled in the art's all other embodiment obtained without creative efforts, all
Belong to the scope of protection of the invention.
Fig. 1 is the flow chart of the anti-screen method first embodiment of information resources of the present invention.As shown in Figure 1, include with
Lower specific implementation.
In 101, content distribution network system obtains the resource request from browser end, according to the resource request
What the encryption result of the uniform resource locator of requested information resources generated.
In 102, content distribution network system restores the uniform resource locator of information resources from resource request.
In 103, content distribution network system obtains information from server end according to the uniform resource locator restored
Resource, and return to browser end.
User is after browser end inputs network address, and browser end can send page request according to network address, and page request is first
Content distribution network system is reached, content distribution network system can obtain page request pair from server end according to existing way
The content of pages answered, later, content distribution network system can inject anti-shielding script in content of pages, and then can be anti-by injection
Content of pages after shielding script returns to browser end, so that browser end runs anti-screen when parsing to content of pages
Script is covered, by the anti-script that shields to uniform resource locator (the i.e. original unified resource for needing to load the information resources shown
Finger URL) be encrypted, and will encryption result coding after be spliced to predetermined domain name after, generate resource request.
Optionally, the anti-shielding script of content distribution network system injection is JavaScript script, also, can be incited somebody to action
JavaScript script is injected into the front end of content of pages, so that browser end is when parsing content of pages, in time
It parses and runs JavaScript script.
Content distribution network system is injected into the content of pages got except anti-shielding script, can also be injected with confidence
Breath.
Which content is specifically included in configuration information can be determined according to actual needs, such as, it may include predetermined domain name, this is pre-
Localization name can be provided for information resources provider and is linked into content distribution network system.In addition, may be used also in configuration information
Further comprise: Encryption Algorithm used by anti-shielding script.
Content of pages after the anti-shielding script of injection and configuration information can be returned to browsing by content distribution network system
Device end, the anti-shielding script of browser end operation are shielded script and are kidnapped the part DOM function of browser end, i.e., will by counter
The external request hook of the page is lived, using the Encryption Algorithm specified in configuration information, to the letter for needing to load displaying in the page
The uniform resource locator of breath resource is encrypted, and then will be spliced in configuration information after encryption result coding
After predetermined domain name, to generate resource request.
Anti- shielding script can also first judge the system before the uniform resource locator to information resources is encrypted
Whether one Resource Locator meets encryption condition, if it is, the uniform resource locator is encrypted.
How to judge whether to meet encryption condition with no restriction.For example, the configuration information of content distribution network system injection
In can also further comprise: conditional information.In this way, script is instead shielded before uniform resource locator is encrypted,
First it can determine whether the uniform resource locator meets encryption condition according to the conditional information, if so, to the unified resource
Finger URL is encrypted.For example, conditional information can be configuration domain name list information, it can match and be set in configuration domain name list
The shielded uniform resource locator of meeting in list is encrypted in the uniform resource locator set.
Domain name of the domain name that use information resource provider provides as new uniform resource locator, by original unification
After being spliced to new domain name after Resource Locator encryption, coding.Due to newly-generated uniform resource locator eliminate it is original
Characteristic information present in uniform resource locator, information resources shielding software such as ADBlock will be unable to according to original feature
Detection mode carries out the shielding of information resources, to reach anti-shield effectiveness.
Since the domain name of new uniform resource locator has already accessed to content distribution network system, then resource request at
Function can be sent on content distribution network system after browser end sending, new unification can be carried in resource request
Resource Locator, content distribution network system can restore original unified resource by decryption oprerations etc. from resource request
Finger URL.Specifically, it can be restored original according to decipherment algorithm corresponding with Encryption Algorithm used by anti-shielding script etc.
Uniform resource locator.
Later, content distribution network system can be according to the uniform resource locator restored, according to existing way from service
Device end obtains corresponding information resources, and then the information resources that will acquire return to browser end, by browser end to information
Resource is shown.
By above-mentioned processing, information resources are that can bypass the interception of information resources shielding software, are normally presented on browsing
Device end, is seen by user.
Fig. 2 is the flow chart of the anti-screen method second embodiment of information resources of the present invention.As shown in Fig. 2, include with
Lower specific implementation.
In 201, browser end is requested to content distributing network system transmission resources, and the resource request is according to being asked
What the encryption result of the uniform resource locator for the information resources asked generated.
In 202, browser end obtains the information resources that content distribution network system returns, and the information resources are content
Distributing network system is after restoring uniform resource locator in resource request, according to the uniform resource locator restored from clothes
It is engaged in what device end obtained.
Before 201, browser end can send page request to content distribution network system, and obtain content distributing network
The content of pages that system returns, the content of pages are that content distribution network system is corresponding from server end acquisition page request
After content of pages, the content of pages after anti-shielding script etc. is injected into content of pages, further, browser end can be run
Anti- shielding script, by the anti-script that shields to needing the uniform resource locator for loading the information resources shown to be encrypted,
And after predetermined domain name being spliced to after encryption result coding, resource request is generated.
Based on above-mentioned introduction, Fig. 3 is between browser end of the present invention, content distribution network system and server end
Interactive process schematic diagram.
As shown in figure 3, browser end sends page request to content distribution network system in 301.
In 302~303, content distribution network system carries out the processing such as domain name identification to the page request got, and
Corresponding content of pages is obtained from server end.
In 304, content distribution network system injects anti-shielding script into the content of pages got and with confidence
Breath, and the content of pages after the anti-shielding script of injection and configuration information is sent to browser end.
In 305, browser end parses content of pages, runs anti-shielding script, by the anti-script that shields according to configuration information,
The uniform resource locator for needing the information resources for loading displaying is encrypted, and generates resource request, is sent to interior
Content distributing network system.
In 306, content distribution network system restores information resources by the operation such as decryption processing from resource request
Uniform resource locator.
In 307~308, content distribution network system is obtained according to the uniform resource locator restored from server end
Information resources, and the information resources that will acquire are sent to browser end.
In 309, browser end is shown the information resources got.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, certain steps can use other sequences or carry out simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
In short, from the working principle of information resources shielding software, being led to using scheme described in embodiment of the present invention method
It crosses and the uniform resource locator of information resources is encrypted, eliminate present in original uniform resource locator
Characteristic information, rather than just domain name replacement is simply carried out, so that information resources shielding software can not be according to original
Feature detection mode carries out the shielding of information resources, and then improves anti-shield effectiveness, and without manually being operated, thus
Reduce the workload etc. of user.
In addition, in scheme described in embodiment of the present invention method, content distribution network system and browser end are essentially consisted in
Cooperation, without carrying out additional modification to server end, the operations such as script injection and decryption are on content distribution network system
It carries out, the update and upgrading for system are also extremely convenient.
In addition, due to setting Encryption Algorithm and being decrypted in content distribution in scheme described in embodiment of the present invention method
It is carried out in network system, as long as the two is consistent, then encipherment scheme very easily can be periodically or non-periodically updated,
To reduce a possibility that information resources shielding software is shielded using the feature of encrypted uniform resource locator.
Further more, in scheme described in embodiment of the present invention method, since the anti-shielding script of injection is run in browser end,
Encipherment scheme used by being equivalent to is open source, has quick replaceability also and can weaken Encryption Algorithm and be cracked institute's band
The influence power come.
Moreover, scheme described in embodiment of the present invention method is applicable to various information resources templates, there is broad applicability.
The introduction about embodiment of the method above, below by way of Installation practice, to scheme of the present invention carry out into
One step explanation.
Fig. 4 is the composed structure schematic diagram of the anti-screening arrangement first embodiment of information resources of the present invention.Such as Fig. 4 institute
Show, comprising: first acquisition unit 401, information reduction unit 402 and second acquisition unit 403.
First acquisition unit 401, for obtaining the resource request from browser end, the resource request is according to being asked
What the encryption result of the uniform resource locator for the information resources asked generated.
Information reduction unit 402, for restoring uniform resource locator from resource request.
Second acquisition unit 403, for obtaining information resources from server end according to the uniform resource locator restored,
And return to browser end.
As shown in figure 4, can also further comprise in described device: third acquiring unit 404, information injection unit 405 with
And content return unit 406.
Third acquiring unit 404 obtains page request from server end for obtaining the page request from browser end
Corresponding content of pages.
Information injection unit 405, for injecting anti-shielding script in the content of pages got.
Content return unit 406, for the content of pages after the anti-shielding script of injection to be returned to browser end, so as to clear
Device end operation of looking at instead shields script, by the anti-uniform resource locator progress for shielding script to needing to load the information resources shown
Encryption, and will encryption result coding after be spliced to predetermined domain name after, generate resource request.
For user after browser end inputs network address, browser end can send page request, third acquiring unit according to network address
After 404 get page request, the corresponding content of pages of page request can be obtained from server end according to existing way, later,
Information injection unit 405 can inject anti-shielding script in content of pages, and further, content return unit 406 can will be injected
Content of pages after anti-shielding script returns to browser end, so that browser end is run instead when parsing to content of pages
Script is shielded, by the anti-script that shields to the uniform resource locator (unified resource originally for needing to load the information resources shown
Finger URL) be encrypted, and will encryption result coding after be spliced to predetermined domain name after, generate resource request.
Optionally, the anti-shielding script of injection is JavaScript script.
Information injection unit 405 is being injected into the content of pages got except anti-shielding script, can also inject configuration
Information.
Which content is specifically included in configuration information can be determined according to actual needs, such as, it may include predetermined domain name, this is pre-
Localization name can be provided for information resources provider and is linked into the anti-screening arrangement of information resources.In addition, in configuration information also
Can further comprise: Encryption Algorithm used by anti-shielding script.
Anti- shielding script can the part DOM function to browser end kidnap, i.e., the external request hook of the page is lived,
Uniform resource locator using the Encryption Algorithm specified in configuration information, to the information resources for needing to load displaying in the page
After the predetermined domain name for being encrypted, and then being spliced in configuration information after encryption result is encoded, to generate money
Source request.
Can also further comprise in above-mentioned configuration information: conditional information.In this way, anti-shielding script is positioned to unified resource
Before symbol is encrypted, also first it can determine whether uniform resource locator meets encryption condition according to conditional information, if so,
Then uniform resource locator is encrypted.
It, can be by 402 basis of information reduction unit after first acquisition unit 401 gets the resource request from browser end
Decipherment algorithm corresponding with Encryption Algorithm used by anti-shielding script, restores the uniform resource locator of information resources,
And then second acquisition unit 403 can obtain information resources from server end according to the uniform resource locator restored, and return
To browser end, information resources are shown by browser end.
Fig. 5 is the composed structure schematic diagram of the anti-screening arrangement second embodiment of information resources of the present invention.As shown in figure 5, packet
It includes: the first transmission unit 501 and the 4th acquiring unit 502.
First transmission unit 501, for being requested to content distributing network system transmission resources, according to the resource request
What the encryption result of the uniform resource locator of requested information resources generated.
4th acquiring unit 502, for obtaining the information resources of content distribution network system return, the information resources are
Content distribution network system is after restoring uniform resource locator in resource request, according to the uniform resource locator restored
It is obtained from server end.
As shown in figure 5, can also further comprise in described device: the second transmission unit 503, the 5th acquiring unit 504 with
And script running unit 505.
Second transmission unit 503, for sending page request to content distribution network system.
5th acquiring unit 504, for obtaining the content of pages of content distribution network system return, the content of pages is
Content distribution network system injects anti-shielding into content of pages after the corresponding content of pages of server end acquisition page request
Content of pages after script.
Script running unit 505, for running anti-shielding script, by the anti-script that shields to the information money for needing to load displaying
The uniform resource locator in source is encrypted, and will encryption result coding after be spliced to predetermined domain name after, generate money
Source request.
The specific workflow of Fig. 4 and Fig. 5 shown device embodiment please refers to the related description in preceding method embodiment,
It repeats no more.
In short, from the working principle of information resources shielding software, being led to using scheme described in apparatus of the present invention embodiment
It crosses and the uniform resource locator of information resources is encrypted, eliminate present in original uniform resource locator
Characteristic information, rather than just domain name replacement is simply carried out, so that information resources shielding software can not be according to original
Feature detection mode carries out the shielding of information resources, and then improves anti-shield effectiveness, and without manually being operated, thus
Reduce the workload etc. of user.
In addition, in scheme described in apparatus of the present invention embodiment, content distribution network system and browser end are essentially consisted in
Cooperation, without carrying out additional modification to server end, the operations such as script injection and decryption are on content distribution network system
It carries out, the update and upgrading for system are also extremely convenient.
In addition, due to setting Encryption Algorithm and being decrypted in content distribution in scheme described in apparatus of the present invention embodiment
It is carried out in network system, as long as the two is consistent, then encipherment scheme very easily can be periodically or non-periodically updated,
To reduce a possibility that information resources shielding software is shielded using the feature of encrypted uniform resource locator.
Further more, in scheme described in apparatus of the present invention embodiment, since the anti-shielding script of injection is run in browser end,
Encipherment scheme used by being equivalent to is open source, has quick replaceability also and can weaken Encryption Algorithm and be cracked institute's band
The influence power come.
Moreover, scheme described in apparatus of the present invention embodiment is applicable to various information resources templates, there is broad applicability.
Fig. 6 shows the block diagram for being suitable for the exemplary computer system/server 12 for being used to realize embodiment of the present invention.
The computer system/server 12 that Fig. 6 is shown is only an example, should not function and use scope to the embodiment of the present invention
Bring any restrictions.
As shown in fig. 6, computer system/server 12 is showed in the form of universal computing device.Computer system/service
The component of device 12 can include but is not limited to: one or more processor (processing unit) 16, memory 28, connect not homology
The bus 18 of system component (including memory 28 and processor 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 12 typically comprises a variety of computer system readable media.These media, which can be, appoints
What usable medium that can be accessed by computer system/server 12, including volatile and non-volatile media, it is moveable and
Immovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memory
Device (RAM) 30 and/or cache memory 32.Computer system/server 12 may further include it is other it is removable/no
Movably, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing
Immovable, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can although being not shown in Fig. 6
To provide the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk "), and it is non-volatile to moving
Property CD (such as CD-ROM, DVD-ROM or other optical mediums) read and write CD drive.In these cases, each drive
Dynamic device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform the present invention
The function of each embodiment.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28
In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs
It may include the realization of network environment in module and program data, each of these examples or certain combination.Program mould
Block 42 usually executes function and/or method in embodiment described in the invention.
Computer system/server 12 can also be (such as keyboard, sensing equipment, aobvious with one or more external equipments 14
Show device 24 etc.) communication, it is logical that the equipment interacted with the computer system/server 12 can be also enabled a user to one or more
Letter, and/or with the computer system/server 12 any is set with what one or more of the other calculating equipment was communicated
Standby (such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.And
And computer system/server 12 can also pass through network adapter 20 and one or more network (such as local area network
(LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown in fig. 6, network adapter 20 passes through bus
18 communicate with other modules of computer system/server 12.It should be understood that although not shown in the drawings, computer can be combined
Systems/servers 12 use other hardware and/or software module, including but not limited to: microcode, device driver, at redundancy
Manage unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
The program that processor 16 is stored in memory 28 by operation, at various function application and data
Reason, such as realize the method in Fig. 1 or embodiment illustrated in fig. 2.
The present invention discloses a kind of computer readable storage mediums, are stored thereon with computer program, the program quilt
Processor will realize the method in embodiment as shown in Figure 1 or 2 when executing.
It can be using any combination of one or more computer-readable media.Computer-readable medium can be calculating
Machine readable signal medium or computer readable storage medium.Computer readable storage medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example (non exhaustive list) of machine readable storage medium storing program for executing includes: electrical connection with one or more conducting wires, just
Taking formula computer disk, hard disk, random access memory (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In this document, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be
Any computer-readable medium other than computer readable storage medium, which can send, propagate or
Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service
It is connected for quotient by internet).
In several embodiments provided by the present invention, it should be understood that disclosed device and method etc. can pass through
Other modes are realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various
It can store the medium of program code.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.
Claims (18)
1. a kind of anti-screen method of information resources characterized by comprising
Content distribution network system obtains the resource request from browser end, and the resource request is according to requested information
What the encryption result of the uniform resource locator of resource generated;
The content distribution network system restores the uniform resource locator from the resource request;
The content distribution network system obtains the information resources from server end according to the uniform resource locator, and returns
Back to the browser end.
2. the method according to claim 1, wherein
This method further comprises:
Before the content distribution network system obtains the resource request, the page request from the browser end is obtained,
The corresponding content of pages of the page request is obtained from the server end;
The content distribution network system injects anti-shielding script in the content of pages;
Content of pages after injecting the anti-shielding script is returned to the browser end by the content distribution network system, with
Toilet states browser end and runs the anti-shielding script, by the anti-shielding script to the information resources for needing to load displaying
Uniform resource locator be encrypted, and will encryption result coding after be spliced to predetermined domain name after, described in generation
Resource request.
3. according to the method described in claim 2, it is characterized in that,
This method further comprises:
The content distribution network system injects configuration information into the content of pages;
It include: the predetermined domain name in the configuration information;
The predetermined domain name is provided for the information resources provider and is linked into the content distribution network system.
4. according to the method described in claim 3, it is characterized in that,
The configuration information further comprises: Encryption Algorithm used by the anti-shielding script;
The content distribution network system restores the uniform resource locator from the resource request
The content distribution network system according to decipherment algorithm corresponding with Encryption Algorithm used by the anti-shielding script,
Restore the uniform resource locator.
5. according to the method described in claim 3, it is characterized in that,
The configuration information further comprises: conditional information, so that the anti-shielding script is positioned to the unified resource
Before symbol is encrypted, determine whether the uniform resource locator meets encryption condition according to the conditional information, if
It is that then the uniform resource locator is encrypted.
6. according to the method described in claim 2, it is characterized in that,
The anti-shielding script includes: JavaScript script;
The JavaScript script is injected into the front end of the content of pages.
7. a kind of anti-screen method of information resources characterized by comprising
Browser end is requested to content distributing network system transmission resources, and the resource request is according to requested information resources
Uniform resource locator encryption result generate;
The browser end obtains the information resources that the content distribution network system returns, and the information resources are described
Content distribution network system is fixed according to the unified resource after restoring the uniform resource locator in the resource request
Position symbol is obtained from server end.
8. the method according to the description of claim 7 is characterized in that
This method further comprises:
The browser end sends page request to the content distribution network system;
The browser end obtains the content of pages that the content distribution network system returns, and the content of pages is the content
Distributing network system injects anti-after the corresponding content of pages of the server end acquisition page request into the content of pages
Content of pages after shielding script;
The browser end runs the anti-shielding script, by the anti-shielding script to the information resources for needing to load displaying
Uniform resource locator is encrypted, and will encryption result coding after be spliced to predetermined domain name after, generate resource ask
It asks.
9. a kind of anti-screening arrangement of information resources characterized by comprising first acquisition unit, information reduction unit and
Two acquiring units;
The first acquisition unit, for obtaining the resource request from browser end, the resource request is according to being requested
Information resources uniform resource locator encryption result generate;
The information reduction unit, for restoring the uniform resource locator from the resource request;
The second acquisition unit, for obtaining the information resources from server end according to the uniform resource locator, and
Return to the browser end.
10. device according to claim 9, which is characterized in that
Described device further comprises: third acquiring unit, information injection unit and content return unit;
The third acquiring unit obtains institute from the server end for obtaining the page request from the browser end
State the corresponding content of pages of page request;
The information injection unit, for injecting anti-shielding script in the content of pages;
The content return unit, for by inject it is described it is anti-shielding script after content of pages return to the browser end,
So that the browser end runs the anti-shielding script, provided by the anti-shielding script to needing to load the information shown
The uniform resource locator in source is encrypted, and will encryption result coding after be spliced to predetermined domain name after, generate institute
State resource request.
11. device according to claim 10, which is characterized in that
The information injection unit is further used for, and injects configuration information into the content of pages;
It include: the predetermined domain name in the configuration information;
The predetermined domain name is provided for the information resources provider and is linked into the anti-screening arrangement of the information resources.
12. device according to claim 11, which is characterized in that
The configuration information further comprises: Encryption Algorithm used by the anti-shielding script;
The information reduction unit is according to decipherment algorithm corresponding with Encryption Algorithm used by the anti-shielding script, reduction
The uniform resource locator out.
13. device according to claim 11, which is characterized in that
The configuration information further comprises: conditional information, so that the anti-shielding script is positioned to the unified resource
Before symbol is encrypted, determine whether the uniform resource locator meets encryption condition according to the conditional information, if
It is that then the uniform resource locator is encrypted.
14. device according to claim 10, which is characterized in that
The anti-shielding script includes: JavaScript script;
The JavaScript script is injected into the front end of the content of pages.
15. a kind of anti-screening arrangement of information resources characterized by comprising the first transmission unit and the 4th acquiring unit;
First transmission unit, for requesting to content distributing network system transmission resources, the resource request is according to institute
What the encryption result of the uniform resource locator of the information resources of request generated;
4th acquiring unit, the information resources returned for obtaining the content distribution network system, the information
Resource is the content distribution network system after restoring the uniform resource locator in the resource request, according to described
Uniform resource locator is obtained from server end.
16. device according to claim 15, which is characterized in that
Described device further comprises: the second transmission unit, the 5th acquiring unit and script running unit;
Second transmission unit, for sending page request to the content distribution network system;
5th acquiring unit, the content of pages returned for obtaining the content distribution network system, the content of pages
It is the content distribution network system after the corresponding content of pages of the server end acquisition page request, into the page
Content of pages after injecting anti-shielding script in appearance;
The script running unit loads displaying to needs by the anti-shielding script for running the anti-shielding script
The uniform resource locator of information resources is encrypted, and will encryption result coding after be spliced to predetermined domain name after,
Generate resource request.
17. a kind of computer equipment, including memory, processor and it is stored on the memory and can be on the processor
The computer program of operation, which is characterized in that the processor is realized when executing described program as any in claim 1~8
Method described in.
18. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed
Such as method according to any one of claims 1 to 8 is realized when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810736790.8A CN109150965B (en) | 2018-07-06 | 2018-07-06 | Information resource anti-shielding method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810736790.8A CN109150965B (en) | 2018-07-06 | 2018-07-06 | Information resource anti-shielding method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109150965A true CN109150965A (en) | 2019-01-04 |
CN109150965B CN109150965B (en) | 2021-09-21 |
Family
ID=64799824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810736790.8A Active CN109150965B (en) | 2018-07-06 | 2018-07-06 | Information resource anti-shielding method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150965B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263533A (en) * | 2019-04-28 | 2019-09-20 | 清华大学 | Safe web page means of defence |
CN111177702A (en) * | 2019-12-12 | 2020-05-19 | 北京百度网讯科技有限公司 | Webpage content anti-shielding method, device, equipment and computer storage medium |
CN111488540A (en) * | 2019-01-29 | 2020-08-04 | 百度在线网络技术(北京)有限公司 | Information shielding monitoring method, device, equipment and computer readable medium |
CN112948727A (en) * | 2021-03-30 | 2021-06-11 | 平安科技(深圳)有限公司 | WebView-based data injection method, device, equipment and storage medium |
CN113688339A (en) * | 2021-07-26 | 2021-11-23 | 珠海金山办公软件有限公司 | Information loading method and device, electronic equipment and computer storage medium |
CN114816558A (en) * | 2022-03-07 | 2022-07-29 | 深圳开源互联网安全技术有限公司 | Script injection method and device and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309275A (en) * | 2008-06-27 | 2008-11-19 | 武汉烽火网络有限责任公司 | File name protection method for stream media service |
US20110131408A1 (en) * | 2009-12-01 | 2011-06-02 | International Business Machines Corporation | Document link security |
CN102801810A (en) * | 2012-08-24 | 2012-11-28 | 乐视网信息技术(北京)股份有限公司 | Method for hiding URL (Uniform Resource Locator) in content delivery network |
CN103229181A (en) * | 2010-10-13 | 2013-07-31 | 阿卡麦科技公司 | Protecting websites and website users by obscuring URLs |
CN103902667A (en) * | 2014-03-14 | 2014-07-02 | 浪潮电子信息产业股份有限公司 | Simple network information collector achieving method based on meta-search |
CN107465722A (en) * | 2017-07-04 | 2017-12-12 | 阿里巴巴集团控股有限公司 | The implementation method and device of web access |
-
2018
- 2018-07-06 CN CN201810736790.8A patent/CN109150965B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309275A (en) * | 2008-06-27 | 2008-11-19 | 武汉烽火网络有限责任公司 | File name protection method for stream media service |
US20110131408A1 (en) * | 2009-12-01 | 2011-06-02 | International Business Machines Corporation | Document link security |
CN103229181A (en) * | 2010-10-13 | 2013-07-31 | 阿卡麦科技公司 | Protecting websites and website users by obscuring URLs |
CN102801810A (en) * | 2012-08-24 | 2012-11-28 | 乐视网信息技术(北京)股份有限公司 | Method for hiding URL (Uniform Resource Locator) in content delivery network |
CN103902667A (en) * | 2014-03-14 | 2014-07-02 | 浪潮电子信息产业股份有限公司 | Simple network information collector achieving method based on meta-search |
CN107465722A (en) * | 2017-07-04 | 2017-12-12 | 阿里巴巴集团控股有限公司 | The implementation method and device of web access |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111488540A (en) * | 2019-01-29 | 2020-08-04 | 百度在线网络技术(北京)有限公司 | Information shielding monitoring method, device, equipment and computer readable medium |
CN111488540B (en) * | 2019-01-29 | 2024-04-02 | 百度在线网络技术(北京)有限公司 | Information shielding monitoring method, device, equipment and computer readable medium |
CN110263533A (en) * | 2019-04-28 | 2019-09-20 | 清华大学 | Safe web page means of defence |
CN111177702A (en) * | 2019-12-12 | 2020-05-19 | 北京百度网讯科技有限公司 | Webpage content anti-shielding method, device, equipment and computer storage medium |
CN112948727A (en) * | 2021-03-30 | 2021-06-11 | 平安科技(深圳)有限公司 | WebView-based data injection method, device, equipment and storage medium |
CN113688339A (en) * | 2021-07-26 | 2021-11-23 | 珠海金山办公软件有限公司 | Information loading method and device, electronic equipment and computer storage medium |
CN114816558A (en) * | 2022-03-07 | 2022-07-29 | 深圳开源互联网安全技术有限公司 | Script injection method and device and computer readable storage medium |
CN114816558B (en) * | 2022-03-07 | 2023-06-30 | 深圳市九州安域科技有限公司 | Script injection method, equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109150965B (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150965A (en) | The anti-screen method of information resources, device, computer equipment and storage medium | |
US20170041341A1 (en) | Polymorphic Treatment of Data Entered At Clients | |
CN105940409A (en) | Web service sandbox system | |
US20070130327A1 (en) | Browser system and method for warning users of potentially fraudulent websites | |
CN104737175A (en) | Method and system for browser identity | |
CN107665303A (en) | By sandbox from retrieved web content | |
CN108141478A (en) | Server end detection and subduction to customer end contents filter | |
CN112055064B (en) | Data synchronization method, device, equipment and storage medium | |
CN109446823A (en) | Preview file method, apparatus, electronic equipment and readable storage medium storing program for executing | |
CN111400704A (en) | Method, device and equipment for realizing web access security audit and computer readable medium | |
CN110708335A (en) | Access authentication method and device and terminal equipment | |
CN106817388A (en) | The system that virtual machine, host obtain the method, device and access data of data | |
CN110472178A (en) | A kind of probe method for implanting, device, computer equipment and storage medium | |
CN111083093A (en) | Method and device for calling terminal capability | |
CN111814166A (en) | Data encryption method and device and electronic equipment | |
CN109325192A (en) | A kind of method and apparatus of the anti-shielding of advertisement | |
CN114697304A (en) | Gray scale publishing method, system, device, equipment and storage medium | |
CN110333866B (en) | Method and device for generating receiving page and electronic equipment | |
CN111935092A (en) | Information interaction method and device based on third-party application and electronic equipment | |
US20130024505A1 (en) | System, method and computer program product for reconstructing data received by a computer in a manner that is independent of the computer | |
CN112115738A (en) | Image identification method and device applied to browser end | |
CN109901934A (en) | The method and apparatus for generating interface help document | |
US8683452B1 (en) | Dynamically obfuscated javascript | |
CN109462604B (en) | Data transmission method, device, equipment and storage medium | |
CN114329535A (en) | File encryption method and device, electronic equipment and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |