CN109450885B - Network data interception method and device, electronic equipment and storage medium - Google Patents

Network data interception method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109450885B
CN109450885B CN201811274660.3A CN201811274660A CN109450885B CN 109450885 B CN109450885 B CN 109450885B CN 201811274660 A CN201811274660 A CN 201811274660A CN 109450885 B CN109450885 B CN 109450885B
Authority
CN
China
Prior art keywords
sub
network
network request
request
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811274660.3A
Other languages
Chinese (zh)
Other versions
CN109450885A (en
Inventor
汪刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201811274660.3A priority Critical patent/CN109450885B/en
Publication of CN109450885A publication Critical patent/CN109450885A/en
Application granted granted Critical
Publication of CN109450885B publication Critical patent/CN109450885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a network data interception method, which is applied to the field of computers and comprises the following steps: when receiving a network request, an objective function acquires a sub-method of a network request method in a system, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, monitoring of the network can be achieved only by exchanging the sub-method of the network request method, and when receiving a network data interception instruction, the new sub-method is triggered to intercept request data of the network request along with the sub-method, and/or a server responds to response data sent by the network request. The invention also discloses a network data interception device, electronic equipment and a storage medium, which can successfully intercept network data without third-party software.

Description

Network data interception method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a network data interception method, a network data interception device, electronic equipment and a storage medium.
Background
With the rapid development of intelligent mobile terminals, in mobile development, a mobile terminal needs to make a network request to a background, and when the network request is made, no matter network packet capturing or network data changing is performed, the network request needs to be intercepted at first.
In the prior art, in order to intercept a network request, a third party interception software is usually needed, and an ip is modified and an agent is set by using the interception software in the same local area network, so that the network request is intercepted, and conditions are limited more and the process is complicated.
Disclosure of Invention
The invention mainly aims to provide a network data intercepting method, a network data intercepting device, electronic equipment and a storage medium, and a third-party intercepting software is not required to be used for intercepting a network request.
In order to achieve the above object, a first aspect of embodiments of the present invention provides a network data intercepting method, including:
when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and the return parameter of the new sub-method comprises request data of the network request and/or response data sent by a server in response to the network request;
when a network data interception instruction is received, the new sub-method is triggered to intercept the request data of the network request and/or the response data sent by the server in response to the network request along with the sub-method.
A second aspect of the embodiments of the present invention provides an apparatus, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a sub-method of a network request method in the system when an objective function receives a network request, and the objective function is used for receiving the network request initiated by an application program;
the conversion module is used for obtaining a new sub-method according to the sub-method through a preset conversion rule, and the return parameters of the new sub-method comprise request data of the network request and/or response data sent by the server in response to the network request;
an adding module, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method;
and the interception module is used for intercepting the request data of the network request and/or responding the response data sent by the server in response to the network request when the new sub-method is triggered along with the sub-method when a network data interception instruction is received.
A third aspect of an embodiment of the present invention provides an electronic device, including:
the network data interception method includes a memory, a processor and a computer program stored in the memory and capable of running on the processor, and is characterized in that when the processor executes the program, the network data interception method provided by the first aspect of the embodiment of the invention is implemented.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the network data intercepting method provided in the first aspect of the embodiments of the present invention.
It can be seen from the foregoing embodiments of the present invention that, according to the network data interception method, apparatus, electronic device and storage medium provided by the present invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used to receive the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, and the new sub-method is added to the sub-method, and only by exchanging the sub-methods of the network request method, network monitoring can be achieved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a network data interception method according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a network data intercepting method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a network data intercepting apparatus according to a third embodiment of the present invention;
fig. 4 shows a hardware configuration diagram of an electronic device.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flow chart illustrating a network data intercepting method according to a first embodiment of the present invention, where the method may be applied to an electronic Device, and the electronic Device may be a mobile phone, a tablet Device (PAD), a notebook computer, a Personal Digital Assistant (PDA), and other devices, which are not limited herein. The method comprises the following steps:
s101, when a target function receives a network request, acquiring a sub-method of a network request method in a system, wherein the target function is used for receiving the network request initiated by an application program;
an interface (API) function provided in the operating system gives a corresponding engine to a program to be executed, and then the program is executed through the engine. The network connection request sent by the application program is also processed through a specific objective function.
The terminal supported by the operating system can be a smart phone, a tablet personal computer and the like, an operating system program for managing and controlling hardware and software resources in the terminal is installed in the terminal, the operating system is the most basic system software for ensuring data interaction of the terminal, and any other application program can be operated under the support of the operating system. If an application program in the terminal needs to send a network connection request through a network (including a wireless fidelity WiFi network, a wireless wide area communication network such as CDMA, GPRS, 3G, 4G, and the like), the application program needs to call a related objective function provided by a terminal operating system to send the network connection request.
When the system initiates a network request, a sub-method of the asynchronous network request method is obtained through the target function. Illustratively, the objective function is the @ selector function.
S102, obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and return parameters of the new sub-method comprise request data of a network request and/or response data sent by a server in response to the network request;
a new sub-method is created using the sub-method as a parameter. Specifically, the sub-method is converted into a character string by using a method of converting into a character. Then, the character strings are randomly spliced to form a random character string, and then the random character string is converted into a new sub-method by using a character string conversion method.
Wherein the return parameters of the new sub-method include request data of the network request and/or response data sent by the server in response to the network request.
S103, when a network data interception instruction is received, the new sub-method is triggered following the sub-method to intercept the request data of the network request, and/or the server responds to the response data sent by the network request.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 2, fig. 2 is a flowchart illustrating a network data intercepting method according to a second embodiment of the present invention, where the method may be applied to an electronic Device, and the electronic Device may be a mobile phone, a tablet computer (PAD), a notebook computer, a Personal Digital Assistant (PDA), and other devices, which are not limited herein. The method comprises the following steps:
s201, defining a network observation class, wherein the network observation class comprises an objective function;
defining a network observation class, wherein the network observation class can be an object, and the main function of the network observation class is to monitor the network, and the network observation class comprises an object function, an inject function, a dispatch _ once _ t function and the like. A switch can be arranged in the network observation class, network data interception is carried out when the switch is turned on, and the network data interception is cancelled when the switch is turned off. When the switch is turned on to intercept network data, an inject function is called, where the function is a custom function and is used to implement network data interception, and the dispatch _ once _ t function, the objective function, and the like are implemented in the inject function, and the implementation process is described in the following embodiment.
Further, inside the input function, firstly, a patch _ once _ t function is used to create a code block, which can ensure that the code in the code block is executed only once when the application program is started, and avoid the code block being executed repeatedly.
S202, when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
when a network request is initiated, illustratively, the objective function is the @ selector function, which receives the network request. Then, a network request method sendAsynchronousRequest is obtained, the request method is a network request method initiated by the system, and a sub-method of the sendAsynchronousRequest method is obtained through an @ selector function, and the sub-method is a selector.
S203, obtaining a new sub-method according to the sub-method through a preset conversion rule;
and obtaining a new sub-method asyn swizselector according to the sub-method selector by presetting a conversion rule. Specifically, for example, first, using the method NSStringFromSelector for converting a method into a string, the submethod selector is converted into a string, which may be a method name, for example, pushtoanothersew. Then, randomly splicing the string pushToAnotherView to obtain a random string selectrorster, and then converting the random string selectrorster into a new sub-method asynSwizselector by using a method NSSelectorFromString for converting the string into the method.
S204, calling a method for exchanging methods, and exchanging sub-methods and new sub-methods;
the class name of NSURLConnection is taken by the class method of NSURLConnection. Then, the class is taken in through the method objc _ getMetaClass of the class. Calling an addition method class _ addMethod of a function, wherein the function comprises a plurality of parameters, and the parameter 1: class name of the class where the class needs to be added, parameter 2: the noval method is asyn swizselector. Then, a method class _ getInstanceMethod is called that gets a function that includes a parameter submethod selector. And then calling a method for exchanging methods, and completing the exchange between the sub-method selector and the new sub-method asyn switzselector, so that when the sub-method selector is triggered, the sub-method asyn switzselector is triggered along with the sub-method selector, and the return parameters of the sub-method asyn switzselector comprise the equipment identification, the response and the obtained data of the network request.
Wherein, the NSURLConnection is a network access class for sending network requests.
Exemplary of a method of method exchange is method _ exchange expressions for method exchange. The method _ exchange implementations method is called to complete the exchange between the child method selector and the new child method asyn switzselector.
S205, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or the server responds to the response data sent by the network request;
the identification requestID of the network request is associated with the device sending the network request, and the identification of the device forms the identification requestID of the network request.
Furthermore, after the sending is completed, in order to ensure that the request is an authenticated request, a transaction credential transaction needs to be constructed and stored.
S206, calling a transfer function, and transferring the request data of the network request and/or the response data sent by the server in response to the network request to the application program.
After receiving the response of the network request, a code block is defined, and the code block is sendcode and is used for sending response data sent by the server in response to the network request. Request data of the network request and/or response data sent by the server in response to the network request are transferred to the application program.
Specifically, when the network request is successfully sent, after response data sent by the server in response to the network request is received, a transfer function recordReceived is called inside sendreplication to notify the application program that a response returned by the server is received. When the network request fails to be sent, the failed message is delivered to the application program by using a delivery function recordFail.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a network data intercepting apparatus according to a third embodiment of the present invention, including:
an acquisition module 301, a conversion module 302, an addition module 303 and an interception module 304.
An obtaining module 301, configured to obtain a sub-method of a network request method in a system when an objective function receives a network request, where the objective function is used to receive a network request initiated by an application program.
An interface (API) function provided in the operating system gives a corresponding engine to a program to be executed, and then the program is executed through the engine. The network connection request sent by the application program is also processed through a specific objective function.
The terminal supported by the operating system can be a smart phone, a tablet personal computer and the like, an operating system program for managing and controlling hardware and software resources in the terminal is installed in the terminal, the operating system is the most basic system software for ensuring data interaction of the terminal, and any other application program can be operated under the support of the operating system. If an application program in the terminal needs to send a network connection request through a network (including a wireless fidelity WiFi network, a wireless wide area communication network such as CDMA, GPRS, 3G, 4G, and the like), the application program needs to call a related objective function provided by a terminal operating system to send the network connection request.
When the system initiates a network request, a sub-method of the asynchronous network request method is obtained through the target function. Illustratively, the objective function is the @ selector function.
A conversion module 302, configured to obtain, according to the sub-method, a new sub-method according to a preset conversion rule, where a return parameter of the new sub-method includes request data of the network request, and/or response data sent by the server in response to the network request.
A new sub-method is created using the sub-method as a parameter. Specifically, the sub-method is converted into a character string by using a method of converting into a character. Then, the character strings are randomly spliced to form a random character string, and then the random character string is converted into a new sub-method by using a character string conversion method.
Wherein the return parameters of the new sub-method include request data of the network request and/or response data sent by the server in response to the network request.
Illustratively, the sub-method asyn switzselector is obtained according to the sub-method selector by presetting a conversion rule. Specifically, firstly, a submethod selector is converted into a character string by using a method NSStringFromSector for converting the method into the character string, then the character string is randomly spliced to obtain a random character string selectrorst, and then the random character string selectrorst is converted into a new submethod asynSwizselecter by using a method NSSelectorFromString for converting the character string into the method.
The class name of NSURLConnection is taken by the class method of NSURLConnection. Then, the class is taken in through the method objc _ getMetaClass of the class. Calling an addition method class _ addMethod of a function, wherein the function comprises a plurality of parameters, and the parameter 1: class name of the class where the class needs to be added, parameter 2: the noval method is asyn swizselector. Then, a method class _ getInstanceMethod is called that gets a function that includes a parameter submethod selector. And then calling a method for exchanging methods, and completing the exchange between the sub-method selector and the new sub-method asyn switzselector, so that when the sub-method selector is triggered, the sub-method asyn switzselector is triggered along with the sub-method selector, and the return parameters of the sub-method asyn switzselector comprise the equipment identification, the response and the obtained data of the network request.
An adding module 303, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method.
And the intercepting module 304 is used for intercepting the request data of the network request and/or the response data sent by the server in response to the network request when the new sub-method is triggered following the sub-method and the network data intercepting instruction is received.
In the embodiment of the invention, when an objective function receives a network request, a sub-method of a network request method in a system is obtained, the objective function is used for receiving the network request initiated by an application program, then, a new sub-method is obtained according to the sub-method through a preset conversion rule, the new sub-method is added to the sub-method, the network monitoring can be realized only by exchanging the sub-method of the network request method, when a network data interception instruction is received, the new sub-method is triggered along with the sub-method to intercept the request data of the network request, and/or a server responds to response data sent by the network request to successfully intercept the network data, and the process is simple and convenient.
Referring to fig. 4, fig. 4 is a hardware structure diagram of an electronic device.
The electronic device described in this embodiment includes:
a memory 41, a processor 42 and a computer program stored on the memory 41 and executable on the processor, the processor implementing the avatar list representation method described in the embodiments of fig. 1-4 above when executing the program.
Further, the electronic device further includes:
at least one input device 43; at least one output device 44.
The memory 41, processor 42 input device 43 and output device 44 are connected by a bus 45.
The input device 43 may be a camera, a touch panel, a physical button, or a mouse. The output device 44 may specifically be a display screen.
The Memory 41 may be a high-speed Random Access Memory (RAM) Memory, or may be a non-volatile Memory (non-volatile Memory), such as a magnetic disk Memory. The memory 41 is used for storing a set of executable program code, and the processor 42 is coupled to the memory 41.
Further, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium may be disposed in the terminal in the foregoing embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 4. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the network data intercepting method described in the foregoing embodiments shown in fig. 1 or fig. 2. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that each functional module in each embodiment of the present invention may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product, or all or part of the technical solution that contributes to the prior art.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, because some steps can be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the above description, for a person skilled in the art, according to the idea of the embodiment of the present invention, there are variations in the specific implementation and application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

1. A network data interception method is characterized by comprising the following steps:
when an objective function receives a network request, acquiring a sub-method of a network request method in a system, wherein the objective function is used for receiving the network request initiated by an application program;
obtaining a new sub-method according to the sub-method through a preset conversion rule, and adding the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered along with the sub-method, and the return parameter of the new sub-method comprises request data of the network request and/or response data sent by a server in response to the network request;
when a network data interception instruction is received, the new sub-method is triggered to intercept the request data of the network request along with the sub-method, and/or the server responds to the response data sent by the network request;
wherein, the obtaining of the new sub-method according to the sub-method by presetting the conversion rule comprises the following steps:
calling a method for converting the method into a character string, and converting the sub-method into the character string;
randomly splicing the character strings to obtain random character strings;
calling a method for converting the character string into a method, and converting the random character string into the new sub-method;
the adding the new sub-method to the sub-method comprises:
and calling a method for exchanging the method, and exchanging the sub-method and the new sub-method.
2. The method of claim 1, wherein when the objective function receives the network request, before acquiring a sub-method of the network request method in the system, the method comprises:
defining a network observation class, wherein the objective function is included in the network observation class.
3. The method of claim 1, wherein the objective function is a message response function, and wherein a sub-method of the method for obtaining network requests in the system comprises:
and acquiring a sub-method of the network request method in the system through a message response function.
4. The method according to any one of claims 1 to 3, wherein intercepting the request data of the network request and/or after responding to the response data sent by the server in response to the network request comprises:
and calling a transfer function to transfer the request data of the network request and/or the response data sent by the server in response to the network request to the application program.
5. The method according to claim 4, wherein after the step of transferring the request data of the network request and/or the response data sent by the server in response to the network request to the application program, the method comprises:
and constructing a transaction certificate and storing the transaction certificate to the local.
6. A network data intercepting apparatus, the apparatus comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a sub-method of a network request method in the system when an objective function receives a network request, and the objective function is used for receiving the network request initiated by an application program;
the conversion module is used for obtaining a new sub-method according to the sub-method through a preset conversion rule, and the return parameters of the new sub-method comprise request data of the network request and/or response data sent by the server in response to the network request;
an adding module, configured to add the new sub-method to the sub-method, so that when the sub-method is triggered, the new sub-method is triggered following the sub-method;
the intercepting module is used for intercepting the request data of the network request and/or the response data sent by the server in response to the network request when the new sub-method is triggered along with the sub-method when a network data intercepting instruction is received;
wherein, the obtaining of the new sub-method according to the sub-method by presetting the conversion rule comprises the following steps:
calling a method for converting the method into a character string, and converting the sub-method into the character string;
randomly splicing the character strings to obtain random character strings;
calling a method for converting the character string into a method, and converting the random character string into the new sub-method;
the adding the new sub-method to the sub-method comprises:
and calling a method for exchanging the method, and exchanging the sub-method and the new sub-method.
7. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the network data interception method according to any of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the network data interception method according to any one of claims 1 to 5.
CN201811274660.3A 2018-10-29 2018-10-29 Network data interception method and device, electronic equipment and storage medium Active CN109450885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811274660.3A CN109450885B (en) 2018-10-29 2018-10-29 Network data interception method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811274660.3A CN109450885B (en) 2018-10-29 2018-10-29 Network data interception method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109450885A CN109450885A (en) 2019-03-08
CN109450885B true CN109450885B (en) 2021-05-28

Family

ID=65549521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811274660.3A Active CN109450885B (en) 2018-10-29 2018-10-29 Network data interception method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109450885B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111294338B (en) * 2020-01-16 2022-05-10 智业互联(厦门)健康科技有限公司 Illegal request interception method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605688B (en) * 2013-11-01 2017-05-10 北京奇虎科技有限公司 Intercept method and intercept device for homepage advertisements and browser
US9369482B2 (en) * 2013-12-12 2016-06-14 Tinfoil Security, Inc. Site independent system for deriving contextually tailored security vulnerability corrections for hardening solution stacks
CN107608852B (en) * 2017-09-01 2019-11-26 清华大学 A kind of process monitoring method and device
CN107864070A (en) * 2017-10-30 2018-03-30 小草数语(北京)科技有限公司 Network status monitoring method, equipment and system

Also Published As

Publication number Publication date
CN109450885A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
US10387856B2 (en) Online payment method, system, and apparatus
CN102255887B (en) Method and system for providing online services corresponding to multiple mobile devices
US10205800B2 (en) Application takeover method and system, mobile terminal, and server
US20170277526A1 (en) Software categorization method and electronic device
CN115951923B (en) Subscription event management method, display system, device and storage medium
CN108712320A (en) Information push method and device
EP2974159B1 (en) Method, device and system for voice communication
CN104601448B (en) A kind of method and apparatus handled virtual card
CA3011601A1 (en) System and method for contextually based fulfillment of communication requests via a telephony platform
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN114327710A (en) Function management method, management device, terminal equipment and readable storage medium
CN109450885B (en) Network data interception method and device, electronic equipment and storage medium
CN112804160B (en) Application program-based current limiting method, device, equipment, medium and product
CN104796519A (en) Terminal
CN112988426B (en) Message processing method and device
CN113760487B (en) Service processing method and device
CN104899730B (en) Mobile terminal data processing method, terminal and system
US20170163816A1 (en) Mobile terminal and controlling method thereof
CN104780252A (en) Contact list management method
CN113347234A (en) Network information acquisition method, device, system, computer equipment and storage medium
CN113766437B (en) Short message sending method and device
CN117667141B (en) Charging protocol software system and multiparty cooperative processing method
CN110876852A (en) Network game data processing method and system of micro-service
CN115840604B (en) Data processing method, device, electronic equipment and computer readable storage medium
US11388619B2 (en) Method and apparatus for providing communication service based on a push

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant