CN109150965B - Information resource anti-shielding method and device, computer equipment and storage medium - Google Patents

Information resource anti-shielding method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109150965B
CN109150965B CN201810736790.8A CN201810736790A CN109150965B CN 109150965 B CN109150965 B CN 109150965B CN 201810736790 A CN201810736790 A CN 201810736790A CN 109150965 B CN109150965 B CN 109150965B
Authority
CN
China
Prior art keywords
information
script
resource
shielding
network system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810736790.8A
Other languages
Chinese (zh)
Other versions
CN109150965A (en
Inventor
白宇
张子秋
焦腾飞
韦俊琳
段海新
彭坚
郑晓峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Original Assignee
Baidu Online Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baidu Online Network Technology Beijing Co Ltd filed Critical Baidu Online Network Technology Beijing Co Ltd
Priority to CN201810736790.8A priority Critical patent/CN109150965B/en
Publication of CN109150965A publication Critical patent/CN109150965A/en
Application granted granted Critical
Publication of CN109150965B publication Critical patent/CN109150965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention discloses an information resource anti-shielding method, an information resource anti-shielding device, computer equipment and a storage medium, wherein the method comprises the following steps: the content distribution network system acquires a resource request from a browser end, wherein the resource request is generated according to an encryption processing result of a uniform resource locator of the requested information resource; the content distribution network system restores the uniform resource locator from the resource request, acquires the information resource from the server side according to the restored uniform resource locator and returns the information resource to the browser side. By applying the scheme of the invention, the anti-shielding effect can be improved.

Description

Information resource anti-shielding method and device, computer equipment and storage medium
[ technical field ] A method for producing a semiconductor device
The present invention relates to computer application technologies, and in particular, to a method and an apparatus for information resource anti-shielding, a computer device, and a storage medium.
[ background of the invention ]
At present, when a browser-side performs page display, some information resources are often additionally displayed in some way, for example, an independent small window is loaded for displaying advertisement resources and the like.
Accordingly, various information resource blocking software, such as ADBlock, has appeared, which can perform large-scale interception and hiding on the information resource, thereby achieving blocking of the information resource.
The information resource shielding software can intercept the resource request at the browser end, detect the content of a Uniform Resource Locator (URL) of the information resource, and terminate the resource request if the characteristics of the URL are matched, so that the resource request cannot be normally sent, and the information resource cannot be normally displayed. At present, the uniform resource locators of a plurality of information resources have very obvious characteristics and are easily identified by information resource shielding software, so that the resource request is terminated.
Although the shielding operation of the information resource shielding software brings certain convenience to some users, some information resources which meet the rules and have normal contents are shielded, and therefore, in some cases, the information resources need to be subjected to anti-shielding processing.
For example, a script may be added to a page to detect the information resource shielding software, and if the information resource shielding software is found to exist, the user is prompted to close the information resource shielding software or hopes to actively add the corresponding site to a white list of the information resource shielding software, but this method requires the user to perform manual operation, thereby bringing additional workload to the user.
For another example, the domain name intercepted by the information resource shielding software can be replaced in time, for example, a domain name pool is used for rotation, but the method is a short effective solution, cannot solve the problem that the resource shielding software intercepts other features except the domain name, and has a poor practical application effect.
[ summary of the invention ]
In view of the above, the invention provides an information resource anti-shielding method, an information resource anti-shielding device, a computer device and a storage medium.
The specific technical scheme is as follows:
an information resource anti-shielding method comprises the following steps:
the content distribution network system acquires a resource request from a browser end, wherein the resource request is generated according to an encryption processing result of a uniform resource locator of the requested information resource;
the content delivery network system restores the uniform resource locator from the resource request;
and the content distribution network system acquires the information resource from the server side according to the uniform resource locator and returns the information resource to the browser side.
An information resource anti-shielding method comprises the following steps:
the method comprises the steps that a browser end sends a resource request to a content distribution network system, wherein the resource request is generated according to an encryption processing result of a uniform resource locator of a requested information resource;
and the browser end acquires the information resource returned by the content distribution network system, wherein the information resource is acquired from a server end according to the uniform resource locator after the content distribution network system restores the uniform resource locator from the resource request.
An information resource anti-shield apparatus, comprising: the device comprises a first acquisition unit, an information restoration unit and a second acquisition unit;
the first acquiring unit is used for acquiring a resource request from a browser end, wherein the resource request is generated according to an encryption processing result of a uniform resource locator of a requested information resource;
the information recovery unit is used for recovering the uniform resource locator from the resource request;
and the second acquisition unit is used for acquiring the information resource from the server side according to the uniform resource locator and returning the information resource to the browser side.
An information resource anti-shield apparatus, comprising: a first sending unit and a fourth obtaining unit;
the first sending unit is used for sending a resource request to the content distribution network system, wherein the resource request is generated according to the encryption processing result of the uniform resource locator of the requested information resource;
the fourth obtaining unit is configured to obtain the information resource returned by the content distribution network system, where the information resource is obtained from a server side according to the uniform resource locator after the content distribution network system restores the uniform resource locator from the resource request.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method as described above when executing the program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method as set forth above.
Based on the above description, it can be seen that, according to the scheme of the present invention, based on the working principle of the information resource shielding software, by performing encryption processing and the like on the uniform resource locator of the information resource, the feature information of the original uniform resource locator is eliminated, instead of simply performing domain name replacement, so that the information resource shielding software cannot shield the information resource according to the original feature detection mode, thereby improving the anti-shielding effect, and without manual operation, thereby reducing the workload of the user, and the like.
[ description of the drawings ]
Fig. 1 is a flowchart of a first embodiment of an information resource unmasking method according to the present invention.
Fig. 2 is a flowchart of a second embodiment of the information resource unmasking method according to the present invention.
Fig. 3 is a schematic diagram of an interaction process between the browser side, the content distribution network system and the server side according to the present invention.
Fig. 4 is a schematic structural diagram of a first embodiment of an information resource anti-shielding apparatus according to the present invention.
Fig. 5 is a schematic structural diagram of a second embodiment of an information resource anti-shielding apparatus according to the present invention.
FIG. 6 illustrates a block diagram of an exemplary computer system/server 12 suitable for use in implementing embodiments of the present invention.
[ detailed description ] embodiments
After a user inputs a website at a browser end, the browser end sends a page request according to the website, a server end returns corresponding page content after receiving the page request, and the browser end analyzes the obtained page content to show the page seen by the user.
Currently, it is very common to use a Content Delivery Network (CDN) system for cache acceleration. If the content distribution network system exists, the page request sent by the browser end is sent to the content distribution network system firstly, the content distribution network system obtains the page content from the server end, and then the content distribution network system returns the obtained page content to the browser end.
The process of displaying information resources such as advertisements also follows the above-mentioned flow, and the request for information resources may be referred to as a resource request. As described above, the information resource shielding software intercepts the resource request at the browser end, detects the content of the uniform resource locator of the information resource, and terminates the resource request if the characteristics of the uniform resource locator are matched, so that the resource request cannot be normally sent, and the information resource cannot be normally displayed. At present, the uniform resource locators of a plurality of information resources have very obvious characteristics and are easily identified by information resource shielding software, so that the resource request is terminated.
Under the network environment, the invention combines with a content distribution network system to provide an information resource anti-shielding mode, and performs anti-shielding processing in a targeted manner from the working principle of information resource shielding software.
In order to make the technical solution of the present invention clearer and more obvious, the solution of the present invention is further described below by referring to the drawings and examples.
It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of a first embodiment of an information resource unmasking method according to the present invention. As shown in fig. 1, the following detailed implementation is included.
In 101, the content delivery network system obtains a resource request from a browser, the resource request being generated based on a result of an encryption process of a uniform resource locator of a requested information resource.
At 102, the content distribution network system restores a uniform resource locator of the information resource from the resource request.
In 103, the content delivery network system obtains the information resource from the server according to the restored uniform resource locator and returns the information resource to the browser.
After a user inputs a website at a browser end, the browser end sends a page request according to the website, the page request firstly reaches a content distribution network system, the content distribution network system can obtain page content corresponding to the page request from a server end according to the existing mode, then the content distribution network system can inject a reverse shielding script into the page content, and further can return the page content after the reverse shielding script is injected to the browser end, so that the browser end runs the reverse shielding script when analyzing the page content, the reverse shielding script encrypts a uniform resource locator (namely the original uniform resource locator) of an information resource to be loaded and displayed, codes an encryption processing result and splices the encrypted result to a preset domain name to generate the resource request.
Optionally, the anti-shielding script injected by the content distribution network system is a JavaScript script, and the JavaScript script may be injected to the frontmost end of the page content, so that the JavaScript script is timely analyzed and run when the browser analyzes the page content.
Besides injecting the anti-shielding script into the obtained page content, the content distribution network system can also inject configuration information.
The specific content included in the configuration information may be determined according to actual needs, for example, a predetermined domain name may be included, and the predetermined domain name may be provided by the information resource provider and accessed to the content distribution network system. In addition, the configuration information may further include: and (4) anti-shielding the encryption algorithm adopted by the script.
The content distribution network system can return the page content after the anti-shielding script and the configuration information are injected to the browser end, the browser end runs the anti-shielding script, the anti-shielding script hijacks partial DOM functions of the browser end, namely the outward request hook of the page is held, the uniform resource locator of the information resource needing to be loaded and displayed in the page is encrypted by using the specified encryption algorithm in the configuration information, and the encrypted processing result is coded and spliced to the preset domain name in the configuration information, so that the resource request is generated.
Before encrypting the uniform resource locator of the information resource, the anti-shielding script can also judge whether the uniform resource locator meets the encryption condition, if so, the uniform resource locator is encrypted.
How to judge whether the encryption condition is met is not limited. For example, the configuration information injected by the content distribution network system may further include: condition information. In this way, before encrypting the uniform resource locator, the anti-shielding script may determine whether the uniform resource locator meets the encryption condition according to the condition information, and if so, encrypt the uniform resource locator. For example, the condition information may be configured domain name list information, and may match the uniform resource locator set in the configured domain name list, and perform encryption processing on the uniform resource locator to be masked in the list.
And using the domain name provided by the information resource provider as the domain name of the new uniform resource locator, and splicing the original uniform resource locator after encrypting and coding the original uniform resource locator to the new domain name. Because the newly generated uniform resource locator eliminates the characteristic information of the original uniform resource locator, information resource shielding software such as ADBlock can not shield the information resource according to the original characteristic detection mode, thereby achieving the anti-shielding effect.
Because the domain name of the new uniform resource locator is already accessed to the content distribution network system, the resource request can be sent to the content distribution network system after being successfully sent from the browser end, the resource request can carry the new uniform resource locator, and the content distribution network system can restore the original uniform resource locator from the resource request through decryption operation and the like. Specifically, the original uniform resource locator may be restored according to a decryption algorithm or the like corresponding to the encryption algorithm employed by the anti-shadow script.
And then, the content distribution network system can acquire the corresponding information resource from the server side according to the restored uniform resource locator in the existing mode, and further return the acquired information resource to the browser side, and the browser side displays the information resource.
Through the processing, the information resource can bypass the interception of the information resource shielding software, and is normally presented at the browser end and seen by a user.
Fig. 2 is a flowchart of a second embodiment of the information resource unmasking method according to the present invention. As shown in fig. 2, the following detailed implementation is included.
In 201, a browser side sends a resource request to a content distribution network system, the resource request being generated according to an encryption processing result of a uniform resource locator of a requested information resource.
In 202, the browser side obtains the information resource returned by the content delivery network system, where the information resource is obtained from the server side according to the reduced uniform resource locator after the content delivery network system reduces the uniform resource locator from the resource request.
Before 201, a browser end may send a page request to a content distribution network system and obtain page content returned by the content distribution network system, where the page content is page content obtained by the content distribution network system from a server end and then a reverse blocking script is injected into the page content, and further, the browser end may run the reverse blocking script, encrypt a uniform resource locator of an information resource to be loaded and displayed by the reverse blocking script, encode an encryption processing result and splice the encrypted result to a predetermined domain name, and generate a resource request.
Based on the above description, fig. 3 is a schematic diagram of an interaction process between the browser end, the content distribution network system, and the server end according to the present invention.
As shown in fig. 3, a browser side sends a page request to a content distribution network system in 301.
In 302-303, the content delivery network system performs domain name recognition and other processing on the acquired page request, and acquires corresponding page content from the server side.
In 304, the content delivery network system injects the anti-shadow script and the configuration information into the acquired page content, and sends the page content with the anti-shadow script and the configuration information injected to the browser end.
In 305, the browser parses the page content, runs the anti-shadow script, and the anti-shadow script encrypts the uniform resource locator of the information resource to be loaded and displayed according to the configuration information, generates a resource request, and sends the resource request to the content distribution network system.
At 306, the content delivery network system restores the uniform resource locator of the information resource from the resource request by decryption processing or the like.
307-308, the content delivery network system obtains the information resource from the server according to the restored uniform resource locator, and sends the obtained information resource to the browser.
In 309, the browser side displays the acquired information resource.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In short, by adopting the scheme of the embodiment of the method of the invention, based on the working principle of the information resource shielding software, the characteristic information of the original uniform resource locator is eliminated by encrypting the uniform resource locator of the information resource and the like, rather than simply performing domain name replacement, so that the information resource shielding software cannot shield the information resource according to the original characteristic detection mode, the anti-shielding effect is improved, manual operation is not needed, and the workload of a user is reduced.
In addition, in the scheme of the embodiment of the method, the content distribution network system is matched with the browser end, additional modification on the server end is not needed, operations such as script injection, decryption and the like are all performed on the content distribution network system, and the system is very convenient to update and upgrade.
In addition, in the scheme of the embodiment of the method, as the encryption algorithm and the decryption are both arranged on the content distribution network system, the encryption scheme can be updated regularly or irregularly conveniently as long as the encryption algorithm and the decryption are consistent, so that the possibility that the information resource shielding software is shielded by using the characteristics of the encrypted uniform resource locator is reduced.
Furthermore, in the scheme of the embodiment of the method, because the injected anti-shielding script runs at the browser end, the adopted encryption scheme is open, and the method has quick replaceability and can also weaken the influence caused by the decryption of the encryption algorithm.
Moreover, the scheme of the method embodiment of the invention can be suitable for various information resource templates and has wide applicability.
The above is a description of method embodiments, and the embodiments of the present invention are further described below by way of apparatus embodiments.
Fig. 4 is a schematic structural diagram of a first embodiment of an information resource anti-shielding apparatus according to the present invention. As shown in fig. 4, includes: a first acquisition unit 401, an information restoration unit 402, and a second acquisition unit 403.
A first obtaining unit 401, configured to obtain a resource request from a browser, where the resource request is generated according to an encryption processing result of a uniform resource locator of a requested information resource.
An information recovering unit 402, configured to recover the uniform resource locator from the resource request.
A second obtaining unit 403, configured to obtain the information resource from the server according to the restored uniform resource locator, and return the information resource to the browser.
As shown in fig. 4, the apparatus may further include: a third acquisition unit 404, an information injection unit 405, and a content return unit 406.
A third obtaining unit 404, configured to obtain a page request from a browser, and obtain page content corresponding to the page request from a server.
An information injection unit 405, configured to inject an anti-mask script into the acquired page content.
And the content returning unit 406 is configured to return the page content into which the anti-shadow script is injected to the browser end, so that the browser end runs the anti-shadow script, encrypts the uniform resource locator of the information resource to be loaded and displayed by the anti-shadow script, encodes the encryption processing result, splices the encryption processing result to a predetermined domain name, and generates a resource request.
After a user inputs a website at a browser end, the browser end sends a page request according to the website, after the third obtaining unit 404 obtains the page request, the third obtaining unit can obtain page content corresponding to the page request from a server end according to the existing mode, then, the information injection unit 405 can inject a reverse shielding script into the page content, further, the content return unit 406 can return the page content into which the reverse shielding script is injected to the browser end, so that the browser end runs the reverse shielding script when analyzing the page content, the reverse shielding script encrypts a uniform resource locator (an original uniform resource locator) of an information resource to be loaded and displayed, codes an encryption processing result and splices the encrypted result to a preset domain name to generate the resource request.
Optionally, the injected anti-shielding script is a JavaScript script.
The information injection unit 405 may inject configuration information in addition to injecting the anti-mask script into the acquired page content.
The specific content included in the configuration information may be determined according to actual needs, for example, a predetermined domain name may be included, and the predetermined domain name may be provided by the information resource provider and accessed to the information resource anti-screening device. In addition, the configuration information may further include: and (4) anti-shielding the encryption algorithm adopted by the script.
The anti-shielding script can hijack partial DOM functions of the browser end, namely, an external request hook of a page is taken, a uniform resource locator of an information resource needing to be loaded and displayed in the page is encrypted by using an encryption algorithm specified in the configuration information, and then an encryption processing result is coded and spliced to a preset domain name in the configuration information, so that a resource request is generated.
The configuration information may further include: condition information. In this way, before the anti-shielding script encrypts the uniform resource locator, whether the uniform resource locator meets the encryption condition or not can be determined according to the condition information, and if yes, the uniform resource locator is encrypted.
After the first obtaining unit 401 obtains the resource request from the browser, the information restoring unit 402 restores the uniform resource locator of the information resource according to the decryption algorithm corresponding to the encryption algorithm adopted by the anti-shadow script, and the second obtaining unit 403 obtains the information resource from the server according to the restored uniform resource locator and returns the information resource to the browser, so that the browser displays the information resource.
Fig. 5 is a schematic structural diagram of a second embodiment of an information resource anti-shielding apparatus according to the present invention. As shown in fig. 5, includes: a first sending unit 501 and a fourth acquiring unit 502.
A first sending unit 501, configured to send a resource request to the content distribution network system, where the resource request is generated according to an encryption processing result of a uniform resource locator of the requested information resource.
A fourth obtaining unit 502, configured to obtain an information resource returned by the content distribution network system, where the information resource is obtained from the server side according to the reduced uniform resource locator after the content distribution network system reduces the uniform resource locator from the resource request.
As shown in fig. 5, the apparatus may further include: a second sending unit 503, a fifth acquiring unit 504, and a script running unit 505.
A second sending unit 503, configured to send the page request to the content distribution network system.
A fifth obtaining unit 504, configured to obtain page content returned by the content distribution network system, where the page content is obtained by the content distribution network system after obtaining page content corresponding to the page request from the server, and injecting an anti-mask script into the page content.
The script running unit 505 is configured to run an inverse mask script, encrypt the uniform resource locator of the information resource to be loaded and displayed by the inverse mask script, encode the encryption result, and splice the encoded encryption result to a predetermined domain name to generate a resource request.
For a specific work flow of the device embodiments shown in fig. 4 and fig. 5, reference is made to the related description in the foregoing method embodiments, and details are not repeated.
In summary, according to the scheme of the embodiment of the present invention, based on the working principle of the information resource shielding software, by performing encryption processing and the like on the uniform resource locator of the information resource, the feature information of the original uniform resource locator is eliminated, instead of simply performing domain name replacement, so that the information resource shielding software cannot shield the information resource according to the original feature detection method, thereby improving the anti-shielding effect, and without manual operation, thereby reducing the workload of the user, and the like.
In addition, in the solution of the embodiment of the apparatus of the present invention, the content distribution network system is mainly matched with the browser side, no additional modification is required to be performed on the server side, operations such as script injection and decryption are performed on the content distribution network system, and the system is also very convenient to update and upgrade.
In addition, in the scheme of the embodiment of the device, the encryption algorithm and the decryption are both arranged on the content distribution network system, and the encryption scheme can be conveniently updated regularly or irregularly as long as the encryption algorithm and the decryption are consistent, so that the possibility that the information resource shielding software is shielded by using the characteristics of the encrypted uniform resource locator is reduced.
Furthermore, in the scheme of the embodiment of the device of the invention, because the injected anti-mask script runs at the browser end, which is equivalent to that the adopted encryption scheme is open source, the anti-mask script has quick replaceability and can also weaken the influence caused by the decryption of the encryption algorithm.
Moreover, the scheme of the embodiment of the device can be suitable for various information resource templates and has wide applicability.
FIG. 6 illustrates a block diagram of an exemplary computer system/server 12 suitable for use in implementing embodiments of the present invention. The computer system/server 12 shown in FIG. 6 is only one example and should not be taken to limit the scope of use or functionality of embodiments of the present invention.
As shown in FIG. 6, computer system/server 12 is in the form of a general purpose computing device. The components of computer system/server 12 may include, but are not limited to: one or more processors (processing units) 16, a memory 28, and a bus 18 that connects the various system components, including the memory 28 and the processors 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. The computer system/server 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 6, and commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The computer system/server 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display, etc.), with one or more devices that enable a user to interact with the computer system/server 12, and/or with any devices (e.g., network card, modem, etc.) that enable the computer system/server 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the computer system/server 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet) via the network adapter 20. As shown in FIG. 6, network adapter 20 communicates with the other modules of computer system/server 12 via bus 18. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computer system/server 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 16 executes various functional applications and data processing by executing programs stored in the memory 28, for example, implementing the methods in the embodiments shown in fig. 1 or fig. 2.
The invention also discloses a computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, will carry out the method as in the embodiments of fig. 1 or 2.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method, etc., can be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (18)

1. An information resource anti-shielding method, comprising:
the content distribution network system acquires a resource request from a browser end, wherein the resource request is generated by encoding an encryption processing result of a uniform resource locator of a requested information resource by a reverse shielding script of the browser end and splicing the encoded result to a preset domain name, and the preset domain name is provided by an information resource provider and is accessed into the content distribution network system;
the content delivery network system restores the uniform resource locator from the resource request;
and the content distribution network system acquires the information resource from the server side according to the uniform resource locator and returns the information resource to the browser side.
2. The method of claim 1,
the method further comprises the following steps:
before the content distribution network system acquires the resource request, acquiring a page request from the browser end, and acquiring page content corresponding to the page request from the server end;
the content distribution network system injects an anti-shielding script into the page content;
and the content distribution network system returns the page content injected with the anti-shielding script to the browser end so that the browser end runs the anti-shielding script, the anti-shielding script encrypts the uniform resource locator of the information resource to be loaded and displayed, codes the encryption processing result and splices the encrypted result to a preset domain name to generate the resource request.
3. The method of claim 2,
the method further comprises the following steps:
the content distribution network system injects configuration information into the page content;
the configuration information includes: the predetermined domain name.
4. The method of claim 3,
the configuration information further includes: the encryption algorithm adopted by the anti-shielding script;
the content delivery network system restoring the uniform resource locator from the resource request comprises:
and the content distribution network system restores the uniform resource locator according to a decryption algorithm corresponding to the encryption algorithm adopted by the anti-shielding script.
5. The method of claim 3,
the configuration information further includes: and condition information, so that the anti-shielding script determines whether the uniform resource locator meets the encryption condition according to the condition information before encrypting the uniform resource locator, and if so, the uniform resource locator is encrypted.
6. The method of claim 2,
the anti-shadow script includes: JavaScript script;
the JavaScript script is injected to the forefront of the page content.
7. An information resource anti-shielding method, comprising:
a browser end sends a resource request to a content distribution network system, wherein the resource request is generated by encoding an encryption processing result of a uniform resource locator of a requested information resource by an anti-shielding script of the browser end and splicing the encoded result to a preset domain name, and the preset domain name is provided by an information resource provider and is accessed to the content distribution network system;
and the browser end acquires the information resource returned by the content distribution network system, wherein the information resource is acquired from a server end according to the uniform resource locator after the content distribution network system restores the uniform resource locator from the resource request.
8. The method of claim 7,
the method further comprises the following steps:
the browser end sends a page request to the content distribution network system;
the browser end acquires page content returned by the content distribution network system, wherein the page content is the page content which is obtained by injecting a reverse shielding script into the page content after the content distribution network system acquires the page content corresponding to the page request from a server end;
and the browser side runs the anti-shielding script, encrypts the uniform resource locator of the information resource to be loaded and displayed by the anti-shielding script, codes the encryption processing result and splices the encryption processing result to a preset domain name to generate a resource request.
9. An information resource anti-shielding device applied to a content distribution network system is characterized by comprising: the device comprises a first acquisition unit, an information restoration unit and a second acquisition unit;
the first acquiring unit is used for acquiring a resource request from a browser end, wherein the resource request is generated by encoding an encryption processing result of a uniform resource locator of a requested information resource by an anti-shielding script of the browser end and splicing the encoded result to a preset domain name, and the preset domain name is provided by an information resource provider and is accessed to the content distribution network system;
the information recovery unit is used for recovering the uniform resource locator from the resource request;
and the second acquisition unit is used for acquiring the information resource from the server side according to the uniform resource locator and returning the information resource to the browser side.
10. The apparatus of claim 9,
the device further comprises: the device comprises a third acquisition unit, an information injection unit and a content return unit;
the third obtaining unit is configured to obtain a page request from the browser end, and obtain page content corresponding to the page request from the server end;
the information injection unit is used for injecting an anti-shielding script into the page content;
the content returning unit is used for returning the page content injected with the anti-shielding script to the browser end so that the browser end runs the anti-shielding script, the anti-shielding script encrypts the uniform resource locator of the information resource to be loaded and displayed, codes the encryption processing result and splices the encrypted result to a preset domain name to generate the resource request.
11. The apparatus of claim 10,
the information injection unit is further used for injecting configuration information into the page content;
the configuration information includes: the predetermined domain name.
12. The apparatus of claim 11,
the configuration information further includes: the encryption algorithm adopted by the anti-shielding script;
and the information restoring unit restores the uniform resource locator according to a decryption algorithm corresponding to the encryption algorithm adopted by the anti-shielding script.
13. The apparatus of claim 11,
the configuration information further includes: and condition information, so that the anti-shielding script determines whether the uniform resource locator meets the encryption condition according to the condition information before encrypting the uniform resource locator, and if so, the uniform resource locator is encrypted.
14. The apparatus of claim 10,
the anti-shadow script includes: JavaScript script;
the JavaScript script is injected to the forefront of the page content.
15. An information resource anti-shielding apparatus, comprising: a first sending unit and a fourth obtaining unit;
the first sending unit is used for sending a resource request to a content distribution network system, wherein the resource request is generated by encoding an encryption processing result of a uniform resource locator of a requested information resource by a reverse screening script and splicing the encoded result to a predetermined domain name, and the predetermined domain name is provided by an information resource provider and is accessed to the content distribution network system;
the fourth obtaining unit is configured to obtain the information resource returned by the content distribution network system, where the information resource is obtained from a server side according to the uniform resource locator after the content distribution network system restores the uniform resource locator from the resource request.
16. The apparatus of claim 15,
the device further comprises: the system comprises a second sending unit, a fifth acquiring unit and a script running unit;
the second sending unit is used for sending a page request to the content distribution network system;
the fifth obtaining unit is configured to obtain page content returned by the content distribution network system, where the page content is obtained by the content distribution network system from a server side and then a reverse blocking script is injected into the page content;
the script running unit is used for running the anti-shielding script, the anti-shielding script encrypts the uniform resource locator of the information resource to be loaded and displayed, codes the encryption processing result and then splices the encryption processing result to a preset domain name to generate a resource request.
17. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the method of any one of claims 1 to 8.
18. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1 to 8.
CN201810736790.8A 2018-07-06 2018-07-06 Information resource anti-shielding method and device, computer equipment and storage medium Active CN109150965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810736790.8A CN109150965B (en) 2018-07-06 2018-07-06 Information resource anti-shielding method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810736790.8A CN109150965B (en) 2018-07-06 2018-07-06 Information resource anti-shielding method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109150965A CN109150965A (en) 2019-01-04
CN109150965B true CN109150965B (en) 2021-09-21

Family

ID=64799824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810736790.8A Active CN109150965B (en) 2018-07-06 2018-07-06 Information resource anti-shielding method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109150965B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488540B (en) * 2019-01-29 2024-04-02 百度在线网络技术(北京)有限公司 Information shielding monitoring method, device, equipment and computer readable medium
CN110263533A (en) * 2019-04-28 2019-09-20 清华大学 Safe web page means of defence
CN111177702B (en) * 2019-12-12 2023-01-13 北京百度网讯科技有限公司 Webpage content anti-shielding method, device, equipment and computer storage medium
CN112948727A (en) * 2021-03-30 2021-06-11 平安科技(深圳)有限公司 WebView-based data injection method, device, equipment and storage medium
CN113688339A (en) * 2021-07-26 2021-11-23 珠海金山办公软件有限公司 Information loading method and device, electronic equipment and computer storage medium
CN114816558B (en) * 2022-03-07 2023-06-30 深圳市九州安域科技有限公司 Script injection method, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309275A (en) * 2008-06-27 2008-11-19 武汉烽火网络有限责任公司 File name protection method for stream media service
CN102801810A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Method for hiding URL (Uniform Resource Locator) in content delivery network
CN103229181A (en) * 2010-10-13 2013-07-31 阿卡麦科技公司 Protecting websites and website users by obscuring URLs
CN107465722A (en) * 2017-07-04 2017-12-12 阿里巴巴集团控股有限公司 The implementation method and device of web access

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131408A1 (en) * 2009-12-01 2011-06-02 International Business Machines Corporation Document link security
CN103902667A (en) * 2014-03-14 2014-07-02 浪潮电子信息产业股份有限公司 Simple network information collector achieving method based on meta-search

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309275A (en) * 2008-06-27 2008-11-19 武汉烽火网络有限责任公司 File name protection method for stream media service
CN103229181A (en) * 2010-10-13 2013-07-31 阿卡麦科技公司 Protecting websites and website users by obscuring URLs
CN102801810A (en) * 2012-08-24 2012-11-28 乐视网信息技术(北京)股份有限公司 Method for hiding URL (Uniform Resource Locator) in content delivery network
CN107465722A (en) * 2017-07-04 2017-12-12 阿里巴巴集团控股有限公司 The implementation method and device of web access

Also Published As

Publication number Publication date
CN109150965A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN109150965B (en) Information resource anti-shielding method and device, computer equipment and storage medium
US11165820B2 (en) Web injection protection method and system
US9608881B2 (en) Service compliance enforcement using user activity monitoring and work request verification
KR20110087195A (en) Apparatus and method for marking documents with executable text
JP2014203464A (en) Client based local malware detection method
US8433906B2 (en) Method and system for microlocking web content
US20150319189A1 (en) Protecting websites from cross-site scripting
CN108141478A (en) Server end detection and subduction to customer end contents filter
US20200021564A9 (en) Mention identification for untrusted content
CN111309578A (en) Method and device for identifying object
CN109088872B (en) Using method and device of cloud platform with service life, electronic equipment and medium
CN114978605A (en) Page access method and device, electronic equipment and storage medium
CN113946870A (en) Privacy protection method, system, equipment and storage medium for shared interface
CN110263533A (en) Safe web page means of defence
EP3195171B1 (en) Detecting and removing injected elements from content interfaces
Kerschbaumer et al. Towards precise and efficient information flow control in web browsers
CN113992345A (en) Method and device for encrypting and decrypting webpage sensitive data, electronic equipment and storage medium
KR20160135207A (en) Persistent bookmarklet authorization
CN114978934A (en) Information desensitization method and apparatus, electronic device, and computer-readable storage medium
JP2010535373A (en) Computer-implemented method and system enabling out-of-band tracking of digital distribution
US11347849B2 (en) Ransomware detection and prevention
CN114205156A (en) Message detection method and device for tangent plane technology, electronic equipment and medium
WO2018053988A1 (en) Secure input system and method, intelligent terminal, and storage medium
CN112883397A (en) Data storage method, data reading method, device, equipment and storage medium
CN109462604B (en) Data transmission method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant