CN109450885B - Network data interception method and device, electronic equipment and storage medium - Google Patents
Network data interception method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN109450885B CN109450885B CN201811274660.3A CN201811274660A CN109450885B CN 109450885 B CN109450885 B CN 109450885B CN 201811274660 A CN201811274660 A CN 201811274660A CN 109450885 B CN109450885 B CN 109450885B
- Authority
- CN
- China
- Prior art keywords
- sub
- network
- network request
- request
- response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a network data interception method, which is applied to the field of computers and comprises the following steps: when receiving a network request, an objective function acquires a sub-method of a network request method in a system, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, monitoring of the network can be achieved only by exchanging the sub-method of the network request method, and when receiving a network data interception instruction, the new sub-method is triggered to intercept request data of the network request along with the sub-method, and/or a server responds to response data sent by the network request. The invention also discloses a network data interception device, electronic equipment and a storage medium, which can successfully intercept network data without third-party software.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a network data interception method, a network data interception device, electronic equipment and a storage medium.
Background
With the rapid development of intelligent mobile terminals, in mobile development, a mobile terminal needs to make a network request to a background, and when the network request is made, no matter network packet capturing or network data changing is performed, the network request needs to be intercepted at first.
In the prior art, in order to intercept a network request, a third party interception software is usually needed, and an ip is modified and an agent is set by using the interception software in the same local area network, so that the network request is intercepted, and conditions are limited more and the process is complicated.
Disclosure of Invention
The invention mainly aims to provide a network data intercepting method, a network data intercepting device, electronic equipment and a storage medium, and a third-party intercepting software is not required to be used for intercepting a network request.
In order to achieve the above object, a first aspect of embodiments of the present invention provides a network data intercepting method, including:
when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and the return parameter of the new sub-method comprises request data of the network request and/or response data sent by a server in response to the network request;
when a network data interception instruction is received, the new sub-method is triggered to intercept the request data of the network request and/or the response data sent by the server in response to the network request along with the sub-method.
A second aspect of the embodiments of the present invention provides an apparatus, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a sub-method of a network request method in the system when an objective function receives a network request, and the objective function is used for receiving the network request initiated by an application program;
the conversion module is used for obtaining a new sub-method according to the sub-method through a preset conversion rule, and the return parameters of the new sub-method comprise request data of the network request and/or response data sent by the server in response to the network request;
an adding module, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method;
and the interception module is used for intercepting the request data of the network request and/or responding the response data sent by the server in response to the network request when the new sub-method is triggered along with the sub-method when a network data interception instruction is received.
A third aspect of an embodiment of the present invention provides an electronic device, including:
the network data interception method includes a memory, a processor and a computer program stored in the memory and capable of running on the processor, and is characterized in that when the processor executes the program, the network data interception method provided by the first aspect of the embodiment of the invention is implemented.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the network data intercepting method provided in the first aspect of the embodiments of the present invention.
It can be seen from the foregoing embodiments of the present invention that, according to the network data interception method, apparatus, electronic device and storage medium provided by the present invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used to receive the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, and the new sub-method is added to the sub-method, and only by exchanging the sub-methods of the network request method, network monitoring can be achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a network data interception method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a network data intercepting method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a network data intercepting apparatus according to a third embodiment of the present invention;
fig. 4 shows a hardware configuration diagram of an electronic device.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flow chart illustrating a network data intercepting method according to a first embodiment of the present invention, where the method may be applied to an electronic Device, and the electronic Device may be a mobile phone, a tablet Device (PAD), a notebook computer, a Personal Digital Assistant (PDA), and other devices, which are not limited herein. The method comprises the following steps:
s101, when a target function receives a network request, acquiring a sub-method of a network request method in a system, wherein the target function is used for receiving the network request initiated by an application program;
an interface (API) function provided in the operating system gives a corresponding engine to a program to be executed, and then the program is executed through the engine. The network connection request sent by the application program is also processed through a specific objective function.
The terminal supported by the operating system can be a smart phone, a tablet personal computer and the like, an operating system program for managing and controlling hardware and software resources in the terminal is installed in the terminal, the operating system is the most basic system software for ensuring data interaction of the terminal, and any other application program can be operated under the support of the operating system. If an application program in the terminal needs to send a network connection request through a network (including a wireless fidelity WiFi network, a wireless wide area communication network such as CDMA, GPRS, 3G, 4G, and the like), the application program needs to call a related objective function provided by a terminal operating system to send the network connection request.
When the system initiates a network request, a sub-method of the asynchronous network request method is obtained through the target function. Illustratively, the objective function is the @ selector function.
S102, obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and return parameters of the new sub-method comprise request data of a network request and/or response data sent by a server in response to the network request;
a new sub-method is created using the sub-method as a parameter. Specifically, the sub-method is converted into a character string by using a method of converting into a character. Then, the character strings are randomly spliced to form a random character string, and then the random character string is converted into a new sub-method by using a character string conversion method.
Wherein the return parameters of the new sub-method include request data of the network request and/or response data sent by the server in response to the network request.
S103, when a network data interception instruction is received, the new sub-method is triggered following the sub-method to intercept the request data of the network request, and/or the server responds to the response data sent by the network request.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 2, fig. 2 is a flowchart illustrating a network data intercepting method according to a second embodiment of the present invention, where the method may be applied to an electronic Device, and the electronic Device may be a mobile phone, a tablet computer (PAD), a notebook computer, a Personal Digital Assistant (PDA), and other devices, which are not limited herein. The method comprises the following steps:
s201, defining a network observation class, wherein the network observation class comprises an objective function;
defining a network observation class, wherein the network observation class can be an object, and the main function of the network observation class is to monitor the network, and the network observation class comprises an object function, an inject function, a dispatch _ once _ t function and the like. A switch can be arranged in the network observation class, network data interception is carried out when the switch is turned on, and the network data interception is cancelled when the switch is turned off. When the switch is turned on to intercept network data, an inject function is called, where the function is a custom function and is used to implement network data interception, and the dispatch _ once _ t function, the objective function, and the like are implemented in the inject function, and the implementation process is described in the following embodiment.
Further, inside the input function, firstly, a patch _ once _ t function is used to create a code block, which can ensure that the code in the code block is executed only once when the application program is started, and avoid the code block being executed repeatedly.
S202, when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
when a network request is initiated, illustratively, the objective function is the @ selector function, which receives the network request. Then, a network request method sendAsynchronousRequest is obtained, the request method is a network request method initiated by the system, and a sub-method of the sendAsynchronousRequest method is obtained through an @ selector function, and the sub-method is a selector.
S203, obtaining a new sub-method according to the sub-method through a preset conversion rule;
and obtaining a new sub-method asyn swizselector according to the sub-method selector by presetting a conversion rule. Specifically, for example, first, using the method NSStringFromSelector for converting a method into a string, the submethod selector is converted into a string, which may be a method name, for example, pushtoanothersew. Then, randomly splicing the string pushToAnotherView to obtain a random string selectrorster, and then converting the random string selectrorster into a new sub-method asynSwizselector by using a method NSSelectorFromString for converting the string into the method.
S204, calling a method for exchanging methods, and exchanging sub-methods and new sub-methods;
the class name of NSURLConnection is taken by the class method of NSURLConnection. Then, the class is taken in through the method objc _ getMetaClass of the class. Calling an addition method class _ addMethod of a function, wherein the function comprises a plurality of parameters, and the parameter 1: class name of the class where the class needs to be added, parameter 2: the noval method is asyn swizselector. Then, a method class _ getInstanceMethod is called that gets a function that includes a parameter submethod selector. And then calling a method for exchanging methods, and completing the exchange between the sub-method selector and the new sub-method asyn switzselector, so that when the sub-method selector is triggered, the sub-method asyn switzselector is triggered along with the sub-method selector, and the return parameters of the sub-method asyn switzselector comprise the equipment identification, the response and the obtained data of the network request.
Wherein, the NSURLConnection is a network access class for sending network requests.
Exemplary of a method of method exchange is method _ exchange expressions for method exchange. The method _ exchange implementations method is called to complete the exchange between the child method selector and the new child method asyn switzselector.
S205, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or the server responds to the response data sent by the network request;
the identification requestID of the network request is associated with the device sending the network request, and the identification of the device forms the identification requestID of the network request.
Furthermore, after the sending is completed, in order to ensure that the request is an authenticated request, a transaction credential transaction needs to be constructed and stored.
S206, calling a transfer function, and transferring the request data of the network request and/or the response data sent by the server in response to the network request to the application program.
After receiving the response of the network request, a code block is defined, and the code block is sendcode and is used for sending response data sent by the server in response to the network request. Request data of the network request and/or response data sent by the server in response to the network request are transferred to the application program.
Specifically, when the network request is successfully sent, after response data sent by the server in response to the network request is received, a transfer function recordReceived is called inside sendreplication to notify the application program that a response returned by the server is received. When the network request fails to be sent, the failed message is delivered to the application program by using a delivery function recordFail.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a network data intercepting apparatus according to a third embodiment of the present invention, including:
an acquisition module 301, a conversion module 302, an addition module 303 and an interception module 304.
An obtaining module 301, configured to obtain a sub-method of a network request method in a system when an objective function receives a network request, where the objective function is used to receive a network request initiated by an application program.
An interface (API) function provided in the operating system gives a corresponding engine to a program to be executed, and then the program is executed through the engine. The network connection request sent by the application program is also processed through a specific objective function.
The terminal supported by the operating system can be a smart phone, a tablet personal computer and the like, an operating system program for managing and controlling hardware and software resources in the terminal is installed in the terminal, the operating system is the most basic system software for ensuring data interaction of the terminal, and any other application program can be operated under the support of the operating system. If an application program in the terminal needs to send a network connection request through a network (including a wireless fidelity WiFi network, a wireless wide area communication network such as CDMA, GPRS, 3G, 4G, and the like), the application program needs to call a related objective function provided by a terminal operating system to send the network connection request.
When the system initiates a network request, a sub-method of the asynchronous network request method is obtained through the target function. Illustratively, the objective function is the @ selector function.
A conversion module 302, configured to obtain, according to the sub-method, a new sub-method according to a preset conversion rule, where a return parameter of the new sub-method includes request data of the network request, and/or response data sent by the server in response to the network request.
A new sub-method is created using the sub-method as a parameter. Specifically, the sub-method is converted into a character string by using a method of converting into a character. Then, the character strings are randomly spliced to form a random character string, and then the random character string is converted into a new sub-method by using a character string conversion method.
Wherein the return parameters of the new sub-method include request data of the network request and/or response data sent by the server in response to the network request.
Illustratively, the sub-method asyn switzselector is obtained according to the sub-method selector by presetting a conversion rule. Specifically, firstly, a submethod selector is converted into a character string by using a method NSStringFromSector for converting the method into the character string, then the character string is randomly spliced to obtain a random character string selectrorst, and then the random character string selectrorst is converted into a new submethod asynSwizselecter by using a method NSSelectorFromString for converting the character string into the method.
The class name of NSURLConnection is taken by the class method of NSURLConnection. Then, the class is taken in through the method objc _ getMetaClass of the class. Calling an addition method class _ addMethod of a function, wherein the function comprises a plurality of parameters, and the parameter 1: class name of the class where the class needs to be added, parameter 2: the noval method is asyn swizselector. Then, a method class _ getInstanceMethod is called that gets a function that includes a parameter submethod selector. And then calling a method for exchanging methods, and completing the exchange between the sub-method selector and the new sub-method asyn switzselector, so that when the sub-method selector is triggered, the sub-method asyn switzselector is triggered along with the sub-method selector, and the return parameters of the sub-method asyn switzselector comprise the equipment identification, the response and the obtained data of the network request.
An adding module 303, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method.
And the intercepting module 304 is used for intercepting the request data of the network request and/or the response data sent by the server in response to the network request when the new sub-method is triggered following the sub-method and the network data intercepting instruction is received.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 4, fig. 4 is a hardware structure diagram of an electronic device.
The electronic device described in this embodiment includes:
a memory 41, a processor 42 and a computer program stored on the memory 41 and executable on the processor, the processor implementing the avatar list representation method described in the embodiments of fig. 1-4 above when executing the program.
Further, the electronic device further includes:
at least one input device 43; at least one output device 44.
The memory 41, processor 42 input device 43 and output device 44 are connected by a bus 45.
The input device 43 may be a camera, a touch panel, a physical button, or a mouse. The output device 44 may specifically be a display screen.
The Memory 41 may be a high-speed Random Access Memory (RAM) Memory, or may be a non-volatile Memory (non-volatile Memory), such as a magnetic disk Memory. The memory 41 is used for storing a set of executable program code, and the processor 42 is coupled to the memory 41.
Further, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium may be disposed in the terminal in the foregoing embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 4. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the network data intercepting method described in the foregoing embodiments shown in fig. 1 or fig. 2. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that each functional module in each embodiment of the present invention may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product, or all or part of the technical solution that contributes to the prior art.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, because some steps can be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the above description, for a person skilled in the art, according to the idea of the embodiment of the present invention, there are variations in the specific implementation and application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (8)
1. A network data interception method is characterized by comprising the following steps:
when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and the return parameter of the new sub-method comprises request data of the network request and/or response data sent by a server in response to the network request;
when a network data interception instruction is received, the new sub-method is triggered to intercept the request data of the network request along with the sub-method, and/or the server responds to the response data sent by the network request;
wherein, the obtaining of the new sub-method according to the sub-method by presetting the conversion rule comprises the following steps:
calling a method for converting the method into a character string, and converting the sub-method into the character string;
randomly splicing the character strings to obtain random character strings;
calling a method for converting the character string into a method, and converting the random character string into the new sub-method;
the adding the new sub-method to the sub-method comprises:
and calling a method for exchanging the method, and exchanging the sub-method and the new sub-method.
2. The method of claim 1, wherein when the objective function receives the network request, before acquiring a sub-method of the network request method in the system, the method comprises:
defining a network observation class, wherein the objective function is included in the network observation class.
3. The method of claim 1, wherein the objective function is a message response function, and wherein a sub-method of the method for obtaining network requests in the system comprises:
and acquiring a sub-method of the network request method in the system through a message response function.
4. The method according to any one of claims 1 to 3, wherein intercepting the request data of the network request and/or after responding to the response data sent by the server in response to the network request comprises:
and calling a transfer function to transfer the request data of the network request and/or the response data sent by the server in response to the network request to the application program.
5. The method according to claim 4, wherein after the step of transferring the request data of the network request and/or the response data sent by the server in response to the network request to the application program, the method comprises:
and constructing a transaction certificate and storing the transaction certificate to the local.
6. A network data intercepting apparatus, the apparatus comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a sub-method of a network request method in the system when an objective function receives a network request, and the objective function is used for receiving the network request initiated by an application program;
the conversion module is used for obtaining a new sub-method according to the sub-method through a preset conversion rule, and the return parameters of the new sub-method comprise request data of the network request and/or response data sent by the server in response to the network request;
an adding module, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method;
the intercepting module is used for intercepting the request data of the network request and/or the response data sent by the server in response to the network request when the new sub-method is triggered along with the sub-method when a network data intercepting instruction is received;
wherein, the obtaining of the new sub-method according to the sub-method by presetting the conversion rule comprises the following steps:
calling a method for converting the method into a character string, and converting the sub-method into the character string;
randomly splicing the character strings to obtain random character strings;
calling a method for converting the character string into a method, and converting the random character string into the new sub-method;
the adding the new sub-method to the sub-method comprises:
and calling a method for exchanging the method, and exchanging the sub-method and the new sub-method.
7. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the network data interception method according to any of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the network data interception method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811274660.3A CN109450885B (en) | 2018-10-29 | 2018-10-29 | Network data interception method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811274660.3A CN109450885B (en) | 2018-10-29 | 2018-10-29 | Network data interception method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109450885A CN109450885A (en) | 2019-03-08 |
CN109450885B true CN109450885B (en) | 2021-05-28 |
Family
ID=65549521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811274660.3A Active CN109450885B (en) | 2018-10-29 | 2018-10-29 | Network data interception method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109450885B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111294338B (en) * | 2020-01-16 | 2022-05-10 | 智业互联(厦门)健康科技有限公司 | Illegal request interception method and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103605688B (en) * | 2013-11-01 | 2017-05-10 | 北京奇虎科技有限公司 | Intercept method and intercept device for homepage advertisements and browser |
US9369482B2 (en) * | 2013-12-12 | 2016-06-14 | Tinfoil Security, Inc. | Site independent system for deriving contextually tailored security vulnerability corrections for hardening solution stacks |
CN107608852B (en) * | 2017-09-01 | 2019-11-26 | 清华大学 | A kind of process monitoring method and device |
CN107864070A (en) * | 2017-10-30 | 2018-03-30 | 小草数语(北京)科技有限公司 | Network status monitoring method, equipment and system |
-
2018
- 2018-10-29 CN CN201811274660.3A patent/CN109450885B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109450885A (en) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10387856B2 (en) | Online payment method, system, and apparatus | |
CN102255887B (en) | Method and system for providing online services corresponding to multiple mobile devices | |
US10205800B2 (en) | Application takeover method and system, mobile terminal, and server | |
US20170277526A1 (en) | Software categorization method and electronic device | |
CN115951923B (en) | Subscription event management method, display system, device and storage medium | |
CN108712320A (en) | Information push method and device | |
EP2974159B1 (en) | Method, device and system for voice communication | |
CN104601448B (en) | A kind of method and apparatus handled virtual card | |
CA3011601A1 (en) | System and method for contextually based fulfillment of communication requests via a telephony platform | |
CN109391658B (en) | Account data synchronization method and equipment, storage medium and terminal thereof | |
CN114327710A (en) | Function management method, management device, terminal equipment and readable storage medium | |
CN109450885B (en) | Network data interception method and device, electronic equipment and storage medium | |
CN112804160B (en) | Application program-based current limiting method, device, equipment, medium and product | |
CN104796519A (en) | Terminal | |
CN112988426B (en) | Message processing method and device | |
CN113760487B (en) | Service processing method and device | |
CN104899730B (en) | Mobile terminal data processing method, terminal and system | |
US20170163816A1 (en) | Mobile terminal and controlling method thereof | |
CN104780252A (en) | Contact list management method | |
CN113347234A (en) | Network information acquisition method, device, system, computer equipment and storage medium | |
CN113766437B (en) | Short message sending method and device | |
CN117667141B (en) | Charging protocol software system and multiparty cooperative processing method | |
CN110876852A (en) | Network game data processing method and system of micro-service | |
CN115840604B (en) | Data processing method, device, electronic equipment and computer readable storage medium | |
US11388619B2 (en) | Method and apparatus for providing communication service based on a push |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |