Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with this specification
Attached drawing in embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described
Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field
Those of ordinary skill's every other embodiment obtained without creative efforts, all should belong to the application
The range of protection.
The thought of this specification embodiment is, if certain domain name is accessed by some application, then corresponding to the domain name
Intermediate certificate can be buffered, therefore, can be in such a way that whether intermediate certificate be buffered corresponding to detection certain domain name
Detect whether the domain name is accessed by some application.Based on this thought, this specification embodiment provides a kind of tracking application visit
Method, apparatus, equipment and the system asked, it is following to be introduced in detail one by one.
Fig. 1 is one of the method flow diagram of method for the tracking application access that this specification embodiment provides, and this method is answered
For terminal device, i.e. the executing subject of method provided by this specification embodiment is terminal device, wherein the terminal device
It can be the equipment such as mobile phone, tablet computer, computer.Specifically, method provided by this specification embodiment can be applied to
The device of tracking application access on terminal device.Method shown in FIG. 1 includes at least following steps:
Step 102, the access of the target application sent to server tracks request;Wherein, it is wrapped in access tracking request
Include the mark of target application.
Wherein, above-mentioned domain name identification is mark (being such as properly termed as code) for marking certain domain name, specifically, can be by
Letter is constituted, and is perhaps made of number also or is made of letter, number combinatorics on words.For example, certain domain name is www.ABC.com,
Then domain name identification corresponding to the domain name can be the information such as asd, 123 or 12a;Also alternatively, above-mentioned domain name identification is to use
The coding that certain encryption algorithm encodes.
In certain specific embodiment, above-mentioned domain name identification may belong to a portion of domain name, and such as can be should
The URL of domain name.For example, certain domain name is ABC.Tmall.com, then domain name identification corresponding to the domain name is then ABC.
It, can domain name identification and the target application of being stored with corresponding in advance in the server in this specification embodiment
Mark, can also the corresponding mark for being stored with domain name identification and target application in the database.One of possible storage
Form is as shown in table 1.
Table 1
The mark of application |
Domain name identification |
Application identities 1 |
ABC |
Application identities 2 |
Mkn |
Application identities 1 |
Asd |
Application identities 4 |
ABC |
Specifically, different applications may correspond to identical domain name identification, the same application may also correspond to multiple
Different domain name identifications, as shown in Table 1 above.Certainly, in table 1 above, above-mentioned domain name identification and the mark of application are
Exemplary illustration does not constitute the restriction to this specification embodiment.
In this specification embodiment, by being that the domain name to be accessed target application is tracked, it is sent to
The mark of target application is carried in the access tracking request of server, so as to get domain name corresponding to target application
Mark.
Wherein, in this specification embodiment, the mark of above-mentioned target application can be the user agent of target application
(User Agent, UA) information, specifically, the UA information of target application may include that version number of target application etc. can identify
The information of target application.
Step 104, it receives server and the domain name identification that request returns is tracked according to above-mentioned access.
In this specification embodiment, after server receives the access tracking request of terminal device transmission, then basis
The corresponding domain name identification of domain name identification request is searched in domain name identification request.
Specifically, if domain name identification and the corresponding storage of the mark of application are on the server, then when server receives
After the access tracking request that terminal device is sent, then according to the mark of target application entrained in the request, from server
Domain name identification corresponding to the mark of target application is searched in the mapping relations of the mark of the domain name identification and application that are stored, it will
The domain name identification found returns to terminal device.
In another specific embodiment, if the domain name identification and mark of application is corresponding is stored in database
In, then after server receives the access tracking request of terminal device transmission, then answered according to target entrained in the request
Mark searches domain name identification corresponding to the mark of the target application from database, by what is found from database
Domain name identification returns to terminal device.
For ease of understanding, following to be identified as application identities 1 with target application, application identities 1 are searched from above-mentioned table 1
It is illustrated for corresponding domain name identification, also, in the citing, the above-mentioned storage of table 1 is in the database.
For example, the target application that terminal device is carried into the access tracking request that server is sent is identified as using mark
Know 1, then when server receive terminal device transmission access tracking request after, then in the database by application identities 1 with it is upper
It states table 1 to be matched, to search domain name identification corresponding to application identities 1 in table 1, in table 1 and corresponding to application identities 1
Domain name identification be " ABC " and " Asd ", therefore, then " ABC " and " Asd " is used as domain name identification to return to terminal and set by server
It is standby.
Step 106, by accessing domain name corresponding to above-mentioned domain name identification, detect domain name intermediate certificate whether by
Caching.
Step 108, instruction according to testing result, determines whether above-mentioned domain name is accessed by target application.
Specifically, if domain name corresponding to certain domain name mark is accessed by target application, then corresponding to the domain name
Intermediate certificate can be cached by target application client, therefore, can be existed in corresponding to the target application on the terminal device
Between certificate, therefore, by detect certain domain name intermediate certificate it is whether buffered, the domain name can be determined whether by target
Using being accessed.Wherein, it is accessed by target application by HHTPS if certain domain name is identified, then the above-mentioned intermediate card being mentioned to
Book is then Hyper text transfer security protocol (the Hyper Text Transfer Protocol over Secure of the domain name
Socket Layer, HTTPS) intermediate certificate used in certificate.
Therefore, in this specification embodiment, if being indicated in the domain name by the obtained testing result of step 106
Between certificate it is buffered, then can determine that the domain name is accessed by target application;If testing result indicates in the domain name
Between certificate be not buffered, then can determine that the domain name is not accessed by target application.
In addition, it is necessary to explanation, in above-mentioned steps 108, determines whether above-mentioned domain name is accessed by target application, it can
To be whether the determination domain name is accessed by the target application of terminal device.
Following specific implementation processes that will be described in detail above-mentioned steps 106.
In addition, above by domain name corresponding to each domain name identification is accessed, detecting the domain in above-mentioned steps 106
Whether intermediate certificate corresponding to name is buffered, can at least be realized by the following two kinds mode, following that difference is detailed
It is described.
Mode one
Domain name corresponding to each domain name identification is accessed, and monitors whether to request centre corresponding to the domain name to server
Certificate;If so, determining that intermediate certificate corresponding to the domain name is not buffered;Otherwise, it determines intermediate card corresponding to the domain name
Book is buffered.
If intermediate certificate corresponding to the domain name is then not present specifically, target application has not visited the domain name, this
When, if accessing the domain name, then terminal device can request intermediate certificate corresponding to the domain name to server.Therefore, in this theory
It is whether buffered by intermediate certificate corresponding to monitoring domain name, it can be determined that whether to go out the domain name in bright book embodiment
It is accessed by target application.
If not monitoring to request intermediate certificate corresponding to the domain name to server, then illustrate in corresponding to the domain name
Between certificate cached by terminal device, may thereby determine that out the domain name identification by the target application institute of terminal device
Access;If monitoring to request intermediate certificate corresponding to the domain name to server, then illustrate intermediate card corresponding to the domain name
Book is not cached by terminal device, may thereby determine that out that the domain name is not accessed by target application.
Mode two
Domain name corresponding to each domain name identification is accessed, and monitors whether to receive corresponding to the domain name of server return
Intermediate certificate;If so, determining that intermediate certificate corresponding to the domain name is not buffered;Otherwise, it determines corresponding to the domain name
Intermediate certificate is buffered.
If intermediate certificate corresponding to the domain name is then not present specifically, target application has not visited the domain name, this
When, if accessing the domain name, then terminal device can request intermediate certificate corresponding to the domain name to server, thus server meeting
Intermediate certificate corresponding to the domain name is returned to terminal device, therefore, the domain name institute whether can be returned to by monitoring server
The mode of corresponding intermediate certificate judges whether the intermediate certificate has been cached by terminal device.
If not monitoring intermediate certificate corresponding to the domain name of server return, then illustrate in corresponding to the domain name
Between certificate cached by terminal device, may thereby determine that out domain name corresponding to the domain name identification by terminal device
Target application accessed;If monitoring intermediate certificate corresponding to the domain name of server return, then illustrate the domain name institute
Corresponding intermediate certificate is cached by terminal device, may thereby determine that out domain name corresponding to the domain name identification not by end
The target application of end equipment is accessed.
In this specification embodiment, by the above-mentioned means, can determine which domain name is target application have accessed.Specifically
, it, can be directly in the accessed domain name of terminal device displaying target application after determining domain name that target application is accessed
The domain name identification determined can also be exported as log information, or can also send and be given to other by domain name identification
It needs on the component of the definitive result.
Certainly, above-mentioned only to list several processing modes determined after the domain name identification that target application is accessed, when
So, the processing mode of the domain name identification accessed the target application determined is not limited thereto, above-mentioned only exemplary
Illustrate, does not constitute the restriction to this specification embodiment.
In addition, in this specification embodiment, since above-mentioned steps 106 need to access domain name corresponding to domain name identification,
Therefore, before executing above-mentioned steps 106, need to get domain name corresponding to domain name identification.Therefore, above-mentioned by accessing
Domain name corresponding to domain name identification, detect above-mentioned domain name intermediate certificate it is whether buffered before, it is provided in this embodiment
Method, further includes:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Wherein, above-mentioned preset domain name combination is the rule for domain name identification group to be combined into domain name, can be stored in advance
On the terminal device.In addition, it is necessary to explanation, in this embodiment, above-mentioned domain name identification belongs to a part of domain name.Specifically
, preset domain name combination rule may include one or more domain name combination template, i.e., preset domain name combination rule can
To include the gang form for multiple domain names.For example, preset domain name combination rule may include domain name identification .A.com, domain
Multiple domain name combination templates such as name mark .B.com, domain name identification .Tmall.com.
For example, being in specific implementation, above-mentioned setting rule can be domain name identification .Tmall.com, if above-mentioned domain name mark
Knowing is ABC, then obtains as domain name being ABC.Tmall.com after combining.
Certainly, in other embodiments, above-mentioned domain name identification can also be coding corresponding to domain name, for example, server
Pre-arranged code algorithm can be used to encode the domain name being stored in server or database, obtain corresponding to each domain name
Coding;Also, it is stored with corresponding decoding algorithm on the terminal device, in this way, when terminal device gets domain from server
After name mark, corresponding domain name can be obtained by being decoded using default decoding algorithm to the domain name.
Alternatively, above-mentioned domain name identification can also be using mark set by letter, number or letter and number combinatorics on words
Note, for example, domain name identification corresponding to domain name ABC.C.com can be set to " 123 ", " sbg " or " 1hg " etc., also,
It is stored with the mapping relations of each domain name identification with corresponding domain name on the server, it, can be in this way, after getting domain name identification
Domain name corresponding to domain name identification is got by way of inquiring domain name corresponding to the mark from server.
Wherein, it is to be understood that above-mentioned be exemplary describe it is several by domain name identification obtain domain name specific realities
Existing mode, obtaining domain name by domain name identification can also realize by other means, as long as terminal device can be made according to domain name
Mark generates domain name, and this specification embodiment is not defined its specific generating process.
In addition, in the specific implementation, can determine that target application is visited by the first application of installation on the terminal device
The domain name asked.I.e. method provided by this specification embodiment can be applied to terminal device first application;
Correspondingly, in that case, in above-mentioned steps 102, the access for sending target application to server tracks request,
Include:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, above-mentioned steps 108, instruction according to testing result, determine whether above-mentioned domain name is visited by target application
It asks, comprising:
Instruction according to testing result, determines whether above-mentioned domain name is accessed by the target application on terminal device;Wherein,
Above-mentioned first application and target application are the different application on terminal device.
It is also to be noted that above-mentioned target application can be to be mounted on terminal device in this specification embodiment
Any application, above-mentioned first application is application program in addition to browser on terminal device.
It is following the access of target application to be linked by the first application on terminal device by specific embodiment introduction
The embodiment being tracked.Fig. 2 be the method for tracking application access that this specification embodiment provides method flow diagram it
Two, method shown in Fig. 2 includes at least following steps:
Step 202, request is tracked to the access that server sends target application by the first application on terminal device;Its
In, the mark of target application is carried in access tracking request.
Step 204, domain name identification corresponding to the mark with target application that server returns is received.
Step 206, according to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Step 208, pass through the first application access domain name on terminal device.
Step 210, monitoring first application whether to server request target apply corresponding intermediate certificate;If so,
Step 212 is executed, it is no to then follow the steps 214.
Wherein, in step 210, the target application of server return whether can also be received by the first application of monitoring
The mode of corresponding intermediate certificate is realized.
Step 212, determine that the domain name is not accessed by the target application on terminal device.
Step 214, determine that the domain name is accessed by the target application on terminal device.
In the specific implementation, it in order to determine domain name identification corresponding to target application in some network address region, contracts
The range and quantity for the domain name identification that servlets return in step 102, are sent in the access tracking request of server and also take
With Internet protocol (Internet Protocol, IP) address information used when establishing connection with server;
Correspondingly, in that case, in above-mentioned steps 104, receiving server according to access and tracking the domain that request returns
Name mark, specifically includes:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It should be noted that in this kind of implementation, then store in server or database application mark,
Mapping relations between domain name identification and IP address information, a kind of possible form are as shown in table 2.
In table 2, the mark of the same application may use different IP address informations to access domain name, identical IP address
Information, the mark of identical application may correspond to different domain name identifications, and e.g., the corresponding domain name identification of UA2, IP1 has " ASD "
" fyt ";The mark of different IP address information or different applications may also correspond to identical domain name identification, e.g., UA1
Domain name identification corresponding with IP1 is " ABC ", and UA3 and the corresponding domain name identification of IP2 are also " ABC ".Certainly, it is answered in above-mentioned table 2
It is identified as the UA of application, or other identifier, table 2 are exemplary illustration, do not constitute and implement to this specification
The restriction of example.
Table 2
The mark of application |
IP address information |
Domain name identification |
UA1 |
IP1 |
ABC |
UA2 |
IP1 |
ASD |
UA1 |
IP2 |
afh |
UA3 |
IP2 |
ABC |
UA2 |
IP1 |
fyt |
In the specific implementation, after server receives the access tracking request of the target application of terminal device transmission, from
The mark of target application is extracted and IP address information that terminal device is connected in the context of access tracking request,
In, the identification information of target application can be the UA of target application, mark, domain name mark from the application of itself or database purchase
The domain name identification to match with the mark and IP address information of target application is searched in the mapping relations of knowledge and IP address information, it will
The domain name identification found is sent to terminal device as domain name identification.
For ease of understanding, following to be illustrated by specific embodiment.
Fig. 3 is the three of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in Fig. 3
Method includes at least following steps:
Step 302, request is tracked to the access that server sends target application;Wherein, include in access tracking request
The mark of target application and IP address information used in connection is established with server.
Step 304, domain name identification corresponding to the mark and IP address information for the target application that server returns is received.
Step 306, according to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Step 308, above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the domain name of server return
Book;If so, thening follow the steps 310, otherwise, step 312 is executed.
Wherein, in step 308, intermediate certificate corresponding to opposite server request domain name can also be monitored whether.
Step 310, determine that the domain name is not accessed by target application.
Step 312, determine that the domain name is accessed by target application.
In this specification embodiment, by the mark for carrying target application in the access tracking request for being sent to server
The IP address information known and connected when accessing server, it is available to corresponding to the target application under the IP address information
Domain name identification, in this way, the range of accessed domain name identification can be reduced, so as to reduce subsequent lookup terminal device
The workload for the domain name identification that target application is accessed.
It certainly, can also be at this other than carrying target application mark and IP address information in access tracking request
Terminal device relevant information is carried in access tracking request;Specifically, above-mentioned access tracking is asked in this specification embodiment
It further include terminal device relevant information in asking;
Correspondingly, receiving server in above-mentioned steps 104 according to above-mentioned access and tracking the domain name identification that request returns, tool
Body includes:
Receive the domain name that server is inquired according to target application mark, IP address information and terminal device relevant information
Mark.
Specifically, above-mentioned terminal device relevant information can be the information such as resolution ratio, the terminal models of terminal device, so as to
The range of found domain name identification can be further reduced, to reduce the subsequent lookup from the domain name identification got eventually
The workload for the domain name that the target application of end equipment is accessed, so as to shorten the domain for determining that the target application of terminal device accessed
The time of name improves search efficiency.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name
Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme,
The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that
It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to server side, i.e.,
The executing subject of this method is server, specifically, the executing subject of this method can be that the tracking being mounted on server is answered
With the device of access.Fig. 4 shows the four of the method flow diagram of the method for the tracking application access of this specification embodiment offer,
Method shown in Fig. 4 includes at least following steps:
Step 402, the access for the target application that receiving terminal apparatus is sent tracks request;Wherein, access tracking request
In carry the mark of target application.
Step 404, request is tracked according to access and searches domain name identification corresponding with access tracking request.
Wherein, in above-mentioned steps 404, if domain name identification and the corresponding storage of the mark of application are on the server, then
Domain name identification corresponding with access tracking request is directly searched on the server;If domain name identification and the mark of application are corresponding
In the database, then server searches domain name identification corresponding with access tracking request from database for storage.
Step 406, above-mentioned domain name identification is returned into terminal device, so that terminal device is by accessing the domain name identification institute
Whether corresponding domain name, the intermediate certificate for detecting the domain name are buffered;And instruction according to testing result, determine the domain name
Whether accessed by target application.
Wherein, the realization of the specific implementation of above-mentioned each step and each step in embodiment corresponding to Fig. 1-Fig. 3
Mode is identical, and therefore, the specific implementation of above steps can refer to embodiment corresponding to Fig. 1-Fig. 3, and details are not described herein again.
Specifically, above-mentioned domain name identification can be a part of domain name in this specification embodiment;Or it uses
The coding that pre-arranged code algorithm obtains after encoding to domain name;Alternatively, can also be using letter, number or letter and number
Label set by combinatorics on words.
Specifically, before executing step 402, the method for this specification embodiment offer further include:
Receive the domain name access request that each terminal device is sent;It is requested to determine the corresponding domain name of the domain name according to domain name access
Identify and access the mark of the application of the domain name;By the corresponding storage of the mark of above-mentioned domain name identification and application.
Specifically, in this specification embodiment, when server receives the access of the target application of terminal device transmission
After request, according to the access request, the mark for accessing the application of the domain name is extracted, and extract from the domain name accessed
The domain name identification of the domain name.For example, if terminal device passes through the application access domain name ABC.Tmall.com of application identities 1, then
Application identities are application identities 1, and the domain name identification extracted from the domain name is " ABC ", then in server or database
By application identities 1 and " ABC " is corresponding stores.
Specifically, the IP address for also carrying used network when establishing connection with server in above-mentioned access request is believed
Breath, therefore, before executing above-mentioned steps 402, the method for this specification embodiment offer further include:
Used IP address information when access domain name determining according to the request of above-mentioned domain name access;By domain name identification, answer
Mark and the corresponding storage of IP address information.
Wherein, above-mentioned IP address information can be extracted from the context that domain name access is requested.
It should be noted that in this specification embodiment, it can be by domain name identification, the mark and IP address information of application
Corresponding storage on the server, can be by domain name identification, the mark of application and IP address information is corresponding is stored in database
In.
Wherein, a kind of corresponding storage mode of domain name identification, the mark of application and IP address information is as shown in table 2, herein
It repeats no more.
In the specific implementation, stored on server be the domain name identification of target application, the application identities of target application and
The mapping relations of IP address information, server receive be terminal device first application send target application access with
Track request, wherein first application and target application be the different application programs being mounted on same terminal device.
Fig. 5 is the five of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in fig. 5
Method includes at least following steps:
Step 502, the domain name access request that the target application of each terminal device is sent is received;
Step 504, extract the domain name identification of domain name, and according to domain name access request to determine target application mark and
IP address information.
Step 506, by domain name identification, the mark of target application and the corresponding storage of IP address information.
It wherein, in step 506, can be by domain name identification, the mark of target application and the corresponding storage of IP address information
In server or database.
Step 508, the access for the target application that the first application of receiving terminal apparatus is sent tracks request;Wherein, the visit
It asks and carries the mark of target application in tracking request and connect used IP address information with server.
Step 510, it is searched according to the mark of target application and IP address information and is believed with the mark of target application and IP address
Cease corresponding domain name identification.
Step 512, the domain name identification found is returned into terminal device.
The method for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application
Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification
It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes
The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow
Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
The method that this specification embodiment provides, following will introduce carry out between terminal device and server for ease of understanding
Interactive exchange method, Fig. 6 be the method for tracking application access that this specification embodiment provides exchange method flow chart it
One, method shown in fig. 6 includes at least following steps:
Step 602, terminal device tracks request to the access that server sends target application, wherein access tracking is asked
The mark of target application is carried in asking and accesses the IP address of the used network of server.
Step 604, after server receives above-mentioned access tracking request, target is extracted from access tracking request and is answered
Mark and IP address.
Step 606, server is searched from the mapping relations of the mark of the application pre-established, IP address and domain name identification
The domain name identification to match with the mark and IP address of target application.
Step 608, the domain name identification found is sent to terminal device by server.
Step 610, above-mentioned domain name identification group is combined into domain name according to preset domain name combination rule by terminal device.
Step 612, terminal device accesses the domain name, and monitors whether to request intermediate card corresponding to the domain name to server
Book;If so, thening follow the steps 614, otherwise, step 616 is executed;
Specifically, can also monitor whether to receive centre corresponding to the domain name of server return in step 614
Certificate.
Step 614, determine that the domain name is not accessed by target application.
Step 616, determine that the domain name is accessed by target application.
It is following to introduce this specification with by being tracked using A to terminal device using B of terminal device and implement
The method that example provides, Fig. 7 are the two of the exchange method flow chart of the method for the tracking application access that this specification embodiment provides,
Method shown in Fig. 7 includes at least following steps:
Step 702, each terminal device is by sending domain name access request to server using A, and server is to corresponding end
End equipment returns to intermediate certificate corresponding to the domain name.
Step 704, server extracted from the access request domain name identification corresponding to the domain name, using A UA and
Access the IP address of server connected network.
Step 706, server stores the mapping relations of domain name identification, UA and IP address.
Wherein, in step 706, the mapping relations of domain name identification, UA and IP address can be stored in server, it can also
To store in the database.After server is stored the mapping relations of domain name identification, UA and IP address, Xiang Yingyong A is returned
Return stored prompt information.
Step 708, terminal device is requested by tracking using B to the access of server sending application A, is tracked in the access
The IP address of the UA and access the used network of server using A are carried in request.
Wherein, the access tracking request sent by application B can be HTTPS request.
Step 710, server searches the UA and the IP address according to the UA and IP address using A carried in the request
Corresponding domain name identification.
Step 712, the domain name identification found is returned to terminal device by server.
Step 714, above-mentioned domain name identification group is combined into domain name according to preset domain name combination rule by terminal device.
Step 716, terminal device is by accessing above-mentioned domain name using B, and monitors whether to request the domain name institute to server
Corresponding intermediate certificate;If so, thening follow the steps 718, otherwise, step 720 is executed.
Specifically, accessing above-mentioned domain name by HTTPS using B.In addition, can also monitor whether to receive in step 716
Intermediate certificate corresponding to the domain name returned to server.
Step 718, the domain name not accessing using A by terminal device is determined.
Step 720, the domain name accessing using A by terminal device is determined.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name
Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme,
The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that
It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to terminal device, i.e.,
The executing subject of this method can be terminal device, specifically, can be the tracking application access being mounted on terminal device
Device.Fig. 8 is the six of the method flow diagram of the method for the tracking application access that this specification embodiment provides, side shown in Fig. 8
Method includes at least following steps:
Step 802, request is tracked to the access that server sends target application;Wherein, include in access tracking request
The mark of target application.
Step 804, it receives server and the domain name that request returns is tracked according to access.
Step 806, by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered.
Step 808, instruction according to testing result, determines whether above-mentioned domain name is accessed by target application.
It in this embodiment, is that mapping between domain name and the mark of application is closed being stored in server or database
System, wherein a kind of possible storage form is as shown in table 3.
Table 3
The mark of application |
Domain name |
UA1 |
2ty.A.com |
UA2 |
123.B.com |
UA2 |
Syh.C.com |
UA3 |
123.B.com |
UA2 as described in Table 3 corresponds to multiple and different domain names, and UA3 is identical with domain name corresponding to one of UA2.I.e.
In mapping relations between the mark of the domain name and application that are stored in server or database, different application identities can
To correspond to identical domain name, the mark of the same application may also correspond to multiple and different domain names.
In addition, above-mentioned table 3 is exemplary illustration, do not constitute to server or database in this specification embodiment
The restriction of the mark of middle stored application and the mapping relations of domain name and specific domain name, the mark of application.
In the method for tracking application access provided by the present embodiment, it is due to being stored in server or database
The mark of application and the mapping relations of domain name, therefore, when server receive terminal device transmission target application access with
After track request, the mapping of the mark and domain name of the application stored from server or database according to the mark of target application is closed
The domain name to match with the mark of target application is searched in system, and the domain name found is returned into terminal device.Wherein, it finds
Domain name can be one or more, regardless of the quantity of the domain name found be one still it is multiple, server will be found
All domain names return to terminal device.
After terminal device receives the domain name of server return, by accessing each domain name, the intermediate certificate of domain name is detected
It is whether buffered.
Specifically, by accessing above-mentioned domain name, whether to detect the intermediate certificate of the domain name in above-mentioned steps 806
It is buffered, specifically includes:
The domain name is accessed, and monitors whether to request intermediate certificate corresponding to the domain name to server;It is somebody's turn to do if so, determining
Intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to the domain name is buffered;
Alternatively,
The domain name is accessed, and monitors whether to receive intermediate certificate corresponding to the domain name of server return;If so,
Determine that intermediate certificate corresponding to the domain name is uncached;Otherwise, it determines intermediate certificate corresponding to the domain name is buffered.
Specifically, in the present embodiment, in above-mentioned steps 802, the access tracking for being sent to the target application of server is asked
It further include that IP address information used in connection is established with server in asking;
Correspondingly, receiving server in above-mentioned steps 804 according to the access and tracking the domain name that request returns, specifically include:
Receive the domain name that server is inquired according to the mark and the IP address information of above-mentioned target application.
Specifically, in the present embodiment, in step 802, being sent in the access tracking request of the target application of server
It further include terminal device relevant information;
Correspondingly, receiving server in above-mentioned steps 804 according to the access and tracking the domain name that request returns, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name.
Specifically, the access for sending target application to server tracks request in above-mentioned steps 802, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, in above-mentioned steps 808, instruction according to testing result determines whether the domain name is visited by target application
It asks, comprising:
Instruction according to testing result, determines whether the domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
Wherein, in the present embodiment in the specific implementation process of each step and Fig. 1-Fig. 3 each embodiment specific implementation
Cheng Xiangtong, therefore, the specific implementation process of each step can refer to embodiment corresponding to Fig. 1-Fig. 3 in the present embodiment, herein not
It repeats again.
The method that this specification embodiment provides for ease of understanding, it is following will be to access and chase after by corresponding to A using B
For track, the method that this specification embodiment provides is introduced, wherein belong to the same terminal device using A and using B.
Fig. 9 is the seven of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in Fig. 9
Method includes at least following steps:
Step 902, it is requested by being tracked using B to the access of server sending application A on terminal device;Wherein, should
The mark using A is carried in access tracking request.
Step 904, domain name corresponding to the mark with application A that server returns is received.
Step 906, by accessing the domain name using B on terminal device.
Step 908, whether monitoring requests to apply intermediate certificate corresponding to A to server using B;If so, executing step
Rapid 910, it is no to then follow the steps 912.
Wherein, in step 908, the target application of server return whether can also be received by the first application of monitoring
The mode of corresponding intermediate certificate is realized.
Step 910, determine the domain name not by accessing on terminal device using A.
Step 912, determine the domain name by accessing on terminal device using A.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered,
If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited
It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary
Step, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to server side, i.e.,
The executing subject of this method is server, specifically, the executing subject of this method can be that the tracking being mounted on server is answered
With the device of access.Figure 10 show this specification embodiment offer tracking application access method method flow diagram it
Eight, method shown in Fig. 10 includes at least following steps:
Step 1002, the access for the target application that receiving terminal apparatus is sent tracks request;Wherein, access tracking request
In carry the mark of target application.
Step 1004, request is tracked according to access and searches domain name corresponding with access tracking request.
Wherein, in above-mentioned steps 1004, if domain name and the corresponding storage of the mark of application are on the server, then directly
Domain name corresponding with access tracking request is searched on the server;If the domain name and mark of application is corresponding is stored in database
In, then server searches domain name corresponding with access tracking request from database.
Step 1006, above-mentioned domain name is returned into terminal device, so that terminal device detects the domain by accessing the domain name
Whether the intermediate certificate of name is buffered;And instruction according to testing result, determine whether the domain name is visited by target application
It asks.
Wherein, the realization of the specific implementation of above-mentioned each step and each step in embodiment corresponding to Fig. 4-Fig. 7
Principle is identical, and therefore, the specific implementation of above steps can refer to embodiment corresponding to Fig. 4-Fig. 7, and details are not described herein again.
For the present embodiment unlike embodiment corresponding to Fig. 4-Fig. 7, storing in server in the present embodiment is domain name and application
The corresponding relationship of mark, it is domain name that server, which returns to terminal device,.
Specifically, before executing step 1002, the method for this specification embodiment offer further include:
Receive the domain name access request that each terminal device is sent;By the mark of application entrained in above-mentioned domain name and the request
Know corresponding storage.
Specifically, in this specification embodiment, when server receives the access of the target application of terminal device transmission
After request, according to the access request, the mark for accessing the application of the domain name is extracted, and the mark of the application is corresponding with domain name
Carry out store.For example, if terminal device by being identified as the application access domain name ABC.D.com of UA1, then application identities are
UA1, then in server or database by UA1 and " ABC.D.com " is corresponding stores.
Specifically, the IP address for also carrying used network when establishing connection with server in above-mentioned access request is believed
Breath, therefore, before executing above-mentioned steps 1002, the method for this specification embodiment offer further include:
Used IP address information when access domain name determining according to the request of above-mentioned domain name access;By domain name, application
Identify storage corresponding with IP address information.
Wherein, above-mentioned IP address information can be extracted from the context that domain name access is requested.
It should be noted that in this specification embodiment, it can be corresponding by domain name, the mark of application and IP address information
Storage on the server, can by domain name, the mark of application and IP address information it is corresponding storage in the database.
In the specific implementation, store on server is the domain name of target application, the application identities of target application and IP
The mapping relations of location information, server receive be terminal device first application send target application access tracking ask
Ask, wherein first application and target application be the different application programs being mounted on same terminal device.
For ease of understanding this specification embodiment provide tracking application access method, it is following will be with server and terminal
For equipment interacts, the interaction flow of the method for the tracking application access of this specification embodiment offer, Tu11Wei are introduced
Method shown in three, Figure 11 of the interaction diagrams of the method for the tracking application access that this specification embodiment provides, is at least wrapped
Include following steps:
Step 1102, terminal device tracks request to the access that server sends target application;Wherein, it is carried in the request
There is the mark of target application.
Step 1104, it after the access tracking that server receives terminal device transmission is requested, is tracked and is requested according to the access
Search domain name corresponding with access tracking request.
Step 1106, the domain name found is sent to terminal device by server.
Step 1108, terminal device accesses the domain name, and monitors whether to request centre corresponding to the domain name to server
Certificate;If so, thening follow the steps 1110, otherwise, step 1112 is executed.
Alternatively, in above-mentioned steps 1108, it can also be by monitoring whether that the domain name institute for receiving server return is right
The intermediate certificate answered is realized.
Step 1110, determine that the domain name is accessed by target application.
Step 1112, determine that the domain name is not accessed by target application.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered,
If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited
It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary
Step, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 1-Fig. 3 provides, based on identical
Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 1-Fig. 3
Embodiment, the device are applied to terminal device, and Figure 12 is the mould of the device for the tracking application access that this specification embodiment provides
One of block composition schematic diagram, device shown in Figure 12, includes at least:
The access of sending module 1201, the target application for sending to server tracks request;Wherein, access tracking is asked
It include the mark of target application in asking;
First receiving module 1202 tracks the domain name identification that request returns according to access for receiving server;
Detection module 1203, for by access domain name identification corresponding to domain name, detect domain name intermediate certificate whether
It is buffered;
First determining module 1204 determines whether domain name is accessed by target application for instruction according to testing result.
Optionally, above-mentioned detection module 1203, is specifically used for:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server;
If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed
It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return
Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is
Through being buffered.
Optionally, above-mentioned detection module 1203, further includes:
Composite module, for according to preset domain name combination rule, above-mentioned domain name identification group to be combined into domain name.
Optionally, above-mentioned sending module 1201, is specifically used for:
Above-mentioned access tracking request is sent to server by the first application program of terminal device;
Correspondingly, above-mentioned first determining module 1204, is specifically used for:
According to the instruction of above-mentioned testing result, determine whether domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
It optionally, further include building to connect used IP address information with server in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1202, is specifically used for:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1202, is specifically used for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name mark.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 1-Fig. 3
The method of execution, and the device for tracking application access is realized in Fig. 1-embodiment illustrated in fig. 3 function, details are not described herein.
The device for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the intermediate card of domain name
Whether book is buffered, if buffered, it is determined that domain name is accessed by target application;Through the above scheme, it realizes
The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow
Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 4, Fig. 5 provides, based on identical
Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 4, Fig. 5
Embodiment, the device are applied to server, and Figure 13 is the module of the device for the tracking application access that this specification embodiment provides
Device shown in two, Figure 13 of composition schematic diagram, includes at least:
Second receiving module 1301, the access tracking request for the target application that receiving terminal apparatus is sent;Wherein, it visits
Ask the mark that target application is carried in tracking request;
Searching module 1302 searches domain name identification corresponding with access tracking request for tracking request according to access;
Return module 1303, for domain name identification to be returned to terminal device, so that terminal device passes through access domain identifier
Know corresponding domain name, whether the intermediate certificate for detecting domain name is buffered;And instruction according to testing result, determine domain name
Whether accessed by target application.
Optionally, device provided by this specification embodiment, further includes:
Third receiving module, the domain name access request sent for receiving each terminal device;
Second determining module determines domain name identification corresponding to domain name and access domain name for requesting according to domain name access
Application mark;
Memory module, for by the corresponding storage of the mark of domain name identification and application.
Optionally, the device that this specification embodiment provides is also used to:
It is requested to determine IP address information used in access domain name according to domain name access;By domain name identification, the mark of application
Storage corresponding with IP address information.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 4, Fig. 5
The method of execution, and the device for tracking application access is realized in Fig. 4, the function of embodiment illustrated in fig. 5, details are not described herein.
The device for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application
Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification
It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes
The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow
Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 8-Fig. 9 provides, based on identical
Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 8-Fig. 9
Embodiment, the device are applied to terminal device, and Figure 14 is the mould of the device for the tracking application access that this specification embodiment provides
Device shown in three, Figure 14 of block composition schematic diagram, includes at least:
Sending module 1401, the access for sending target application to server track request;Wherein, access tracking request
In include target application mark;
First receiving module 1402 tracks the domain name that request returns according to access for receiving server;
Detection module 1403, for by access domain name, whether the intermediate certificate for detecting domain name to be buffered;
First determining module 1404 determines whether domain name is accessed by target application for instruction according to testing result.
Optionally, above-mentioned detection module 1402, is specifically used for:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so,
Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is
It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns
Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name
Certificate is buffered.
Optionally, above-mentioned sending module 1401, is specifically used for:
Above-mentioned access tracking request is sent to server by the first application program of terminal device;
Correspondingly, above-mentioned first determining module 1404, is specifically used for:
According to the instruction of above-mentioned testing result, determine whether domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
It optionally, further include building to connect used IP address information with server in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1402, is specifically used for:
Receive the domain name that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1402, is specifically used for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 8-Fig. 9
The method of execution, and the device for tracking application access is realized in Fig. 8-embodiment illustrated in fig. 9 function, details are not described herein.
The device for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered,
If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited
It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary
Step, therefore this programme will not be prevented by system.
Corresponding to the method that this specification embodiment provides, it is based on identical thinking, this specification embodiment additionally provides
A kind of system tracking application access, Figure 15 are the structural representation of the system for the tracking application access that this specification embodiment provides
Figure, system shown in figure 15, including server 1501 and terminal device 1502;
Terminal device 1502, the access for sending target application to server track request;Wherein, access tracking request
In include target application mark;
Server 1501, the access sent for receiving terminal apparatus track request;Wherein, it is carried in access tracking request
There is the mark of target application;Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;By domain name identification
Return to terminal device;
Terminal device 1502 is also used to receive server according to access and tracks the domain name identification that request returns;Pass through access
Whether domain name corresponding to domain name identification, the intermediate certificate for detecting domain name are buffered;Instruction according to testing result determines
Whether domain name is accessed by target application.
Optionally, terminal device 1502 are specifically used for:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server;
If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed
It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return
Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is
Through being buffered.
Optionally, above-mentioned terminal device 1502, also particularly useful for:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, above-mentioned terminal device 1502, also particularly useful for:
Access tracking request is sent to server by the first application of terminal device;
And
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
It optionally, further include that Internet protocol IP used in connection is established with server in above-mentioned access tracking request
Address information;
Correspondingly, above-mentioned terminal device 1502, also particularly useful for:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device 1502, also particularly useful for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name mark.
Optionally, above-mentioned server 1501, is also used to:
Receive the domain name access request that each terminal device is sent;It is requested to determine domain name corresponding to domain name according to domain name access
The mark of the application of mark and access domain name;By the corresponding storage of the mark of domain name identification and application.
Optionally, above-mentioned server 1501, is also used to:
It is determined according to domain name access request and accesses IP address information used in domain name;By domain name mark
Knowledge, the mark of the application and the corresponding storage of the IP address information.
In the system of tracking application access provided by this specification embodiment, terminal device be can also carry out in Fig. 1-Fig. 3
The method that terminal device executes, and terminal device is realized in Fig. 1-embodiment illustrated in fig. 3 function, figure can also be performed in server
1, the method that server executes in Fig. 5, and server is realized in Fig. 4, the function of embodiment illustrated in fig. 5, details are not described herein.
The system for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the intermediate card of domain name
Whether book is buffered, if buffered, it is determined that domain name is accessed by target application;Through the above scheme, it realizes
The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow
Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method that this specification embodiment provides, it is based on identical thinking, this specification embodiment additionally provides
A kind of system tracking application access, Figure 15 are the structural representation of the system for the tracking application access that this specification embodiment provides
Figure, including server 1501 and terminal device 1502;
Terminal device, the access for sending target application to server track request;Wherein, it is wrapped in access tracking request
Include the mark of target application;
Server, the access sent for receiving terminal apparatus track request;Request is tracked according to access to search and access
Corresponding domain name is requested in tracking;Domain name is returned into terminal device;
Terminal device is also used to receive server according to access and tracks the domain name that request returns;By accessing domain name, detection
Whether the intermediate certificate of domain name is buffered;Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, above-mentioned terminal device, is specifically used for:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so,
Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is
It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns
Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name
Certificate is buffered.
Optionally, above-mentioned terminal device, is also used to:
Access tracking request is sent to server by the first application;And instruction according to testing result, it determines above-mentioned
Whether domain name is accessed by the target application on terminal device;Wherein, above-mentioned first application and target application are on terminal device
Different application.
It optionally, further include that IP address information used in connection is established with server in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device, also particularly useful for:
Receive the domain name that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device, also particularly useful for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name.
Optionally, above-mentioned server, is also used to:
Receive the domain name access request that each terminal device is sent;The application for accessing the domain name is extracted from the access request
Mark;By the corresponding storage of the mark of domain name and application.
Optionally, above-mentioned server, is also used to:
It requests to determine according to above-mentioned domain name access and accesses IP address information used in above-mentioned domain name;By above-mentioned domain name, on
State the mark and the corresponding storage of above-mentioned IP address information of application.
In the system of tracking application access provided by this specification embodiment, terminal device be can also carry out in Fig. 8-Fig. 9
The method that terminal device executes, and terminal device is realized in Fig. 8-embodiment illustrated in fig. 9 function, figure can also be performed in server
The method that server executes in 10, and server is realized in the function of embodiment illustrated in fig. 10, details are not described herein.
The system for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered,
If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited
It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary
Step, therefore this programme will not be prevented by system.
Further, correspond to based on method shown in this specification embodiment, be based on identical thinking, this specification is real
It applies example and additionally provides a kind of equipment for tracking application access, as shown in figure 16.Wherein, the equipment of the tracking application access can answer
For the terminal device in above-described embodiment.
The equipment for tracking application access can generate bigger difference because configuration or performance are different, may include one or
More than one processor 1601 and memory 1602 can store one or more storage applications in memory 1602
Program or data.Wherein, memory 1602 can be of short duration storage or persistent storage.It is stored in the application program of memory 1602
It may include one or more modules (diagram is not shown), each module may include in the equipment to tracking application access
Series of computation machine executable instruction information.Further, processor 1601 can be set to communicate with memory 1602,
The series of computation machine executable instruction information in memory 1602 is executed in the equipment of tracking application access.Tracking application is visited
The equipment asked can also include one or more power supplys 1603, one or more wired or wireless network interfaces
1604, one or more input/output interfaces 1605, one or more keyboards 1606 etc..
In a specific embodiment, the equipment for tracking application access include memory and one or one with
On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them
Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can
Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes
For carrying out following computer executable instructions information:
The access for sending target application to server tracks request;It wherein, include target application in access tracking request
Mark;
It receives server and the domain name identification that request returns is tracked according to access;
By domain name corresponding to access domain name identification, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, computer executable instructions information when executed, passes through domain name corresponding to access domain name identification, inspection
Whether the intermediate certificate for surveying domain name is buffered, comprising:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server;
If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed
It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return
Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is
Through being buffered.
Optionally, computer executable instructions information when executed, passes through the corresponding domain of access domain name mark
Name, detect domain name intermediate certificate it is whether buffered before, can also carry out following steps:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, computer executable instructions information when executed, the access tracking of target application is sent to server
Request, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, instruction according to testing result, determines whether domain name is accessed by target application, comprising:
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
Optionally, computer executable instructions information further includes building with server in access tracking request when executed
It is vertical to connect used Internet protocol IP address information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
Optionally, computer executable instructions information further includes terminal device phase in access tracking request when executed
Close information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name mark.
The equipment for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name
Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme,
The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that
It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
Corresponding to based on method shown in this specification embodiment, it is based on identical thinking, this specification embodiment also mentions
A kind of equipment for tracking application access is supplied, as shown in figure 16.Wherein, the equipment of the tracking application access can be applied to above-mentioned
On server in embodiment.
In a specific embodiment, the equipment for tracking application access include memory and one or one with
On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them
Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can
Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes
For carrying out following computer executable instructions information:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, mesh is carried in access tracking request
Mark the mark of application;
Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;
Domain name identification is returned into terminal device, so that terminal device passes through domain name corresponding to access domain name identification, inspection
Whether the intermediate certificate for surveying domain name is buffered;And instruction according to testing result, determine domain name whether by target application institute
Access.
Optionally, computer executable instructions information when executed, receiving terminal apparatus send target application visit
Before asking tracking request, method further include:
Receive the domain name access request that each terminal device is sent;
Domain name identification corresponding to domain name is determined according to domain name access request and accesses the mark of the application of domain name;
By the corresponding storage of the mark of domain name identification and application.
Optionally, when executed, the access that receiving terminal apparatus is sent tracks request to computer executable instructions information
Before, method further include:
It is requested to determine IP address information used in access domain name according to domain name access;
By domain name identification, the mark of application and the corresponding storage of IP address information.
The equipment for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application
Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification
It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes
The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow
Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to based on method shown in this specification embodiment, it is based on identical thinking, this specification embodiment also mentions
A kind of equipment for tracking application access is supplied, as shown in figure 16.Wherein, the equipment of the tracking application access can be applied to above-mentioned
On terminal device in embodiment.
In a specific embodiment, the equipment for tracking application access include memory and one or one with
On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them
Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can
Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes
For carrying out following computer executable instructions information:
The access for sending target application to server tracks request;It wherein, include above-mentioned mesh in above-mentioned access tracking request
Mark the mark of application;
It receives above-mentioned server and the domain name that request returns is tracked according to above-mentioned access;
By accessing above-mentioned domain name, whether the intermediate certificate for detecting above-mentioned domain name is buffered;
Instruction according to testing result, determines whether above-mentioned domain name is accessed by above-mentioned target application.
Optionally, computer executable instructions information when executed, above by above-mentioned domain name is accessed, detects above-mentioned domain
Whether the intermediate certificate of name is buffered, comprising:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so,
Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is
It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns
Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name
Certificate is buffered.
The equipment for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application
Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered,
If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited
It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary
Step, therefore this programme will not be prevented by system.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage
Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light
Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down
Journey:
The access for sending target application to server tracks request;It wherein, include target application in access tracking request
Mark;
It receives server and the domain name identification that request returns is tracked according to access;
By domain name corresponding to access domain name identification, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, the computer executable instructions information of storage medium storage passes through access when being executed by processor
Whether domain name corresponding to domain name identification, the intermediate certificate for monitoring domain name are buffered, comprising:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server;
If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed
It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return
Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is
Through being buffered.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, by accessing domain name
The corresponding domain name of mark, detect domain name intermediate certificate it is whether buffered before, can also carry out following steps:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, the computer executable instructions of storage medium storage are sent when being executed by processor to server
Access tracking request, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, instruction according to testing result, determines whether domain name is accessed by target application, comprising:
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, access tracking request
In further include that Internet protocol IP address information used in connection is established with server;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, access tracking request
In further include terminal device relevant information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information
Name mark.
The computer executable instructions for the storage medium storage that this specification embodiment provides are when being executed by processor, root
Domain name identification corresponding to target application can be obtained from server according to the mark of target application, and passes through access domain name identification institute
Corresponding domain name, whether the intermediate certificate for detecting the domain name is buffered, if buffered, it is determined that the domain name is by mesh
Mark application is accessed;Through the above scheme, the tracking of domain name accessed to target application is realized, and not by system update
It influences, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be hindered by system
Only.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage
Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light
Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down
Journey:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, mesh is carried in access tracking request
Mark the mark of application;
Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;
Domain name identification is returned into terminal device, so that terminal device passes through domain name corresponding to access domain name identification, inspection
Whether the intermediate certificate for surveying domain name is buffered;And instruction according to testing result, determine domain name whether by target application institute
Access.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, receiving terminal apparatus
Before the access tracking request of transmission, method further include:
Receive the domain name access request that each terminal device is sent;
Domain name identification corresponding to domain name is determined according to domain name access request and accesses the mark of the application of domain name;
By the corresponding storage of the mark of domain name identification and application.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, receiving terminal apparatus
Before the access tracking request of transmission, method further include:
It is requested to determine IP address information used in access domain name according to domain name access;
By domain name identification, the mark of application and the corresponding storage of IP address information.
The computer executable instructions for the storage medium storage that this specification embodiment provides, will when being executed by processor
The corresponding domain name identification of the mark of target application returns to terminal device, in this way, terminal device is right by access domain name identification institute
The domain name answered, whether the intermediate certificate for detecting the domain name is buffered, if buffered, it is determined that the domain name is by target
Using being accessed;Through the above scheme, the tracking of domain name accessed to target application is realized, and not by the shadow of system update
It rings, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage
Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light
Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down
Journey:
The access for sending target application to server tracks request;It wherein, include above-mentioned mesh in above-mentioned access tracking request
Mark the mark of application;
It receives above-mentioned server and the domain name that request returns is tracked according to above-mentioned access;
By accessing above-mentioned domain name, whether the intermediate certificate for detecting above-mentioned domain name is buffered;
Instruction according to testing result, determines whether above-mentioned domain name is accessed by above-mentioned target application.
Optionally, the storage medium storage computer executable instructions information when being executed by processor, above by
Above-mentioned domain name is accessed, whether the intermediate certificate for detecting above-mentioned domain name is buffered, comprising:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so,
Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is
It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns
Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name
Certificate is buffered.
The computer executable instructions information for the storage medium storage that this specification embodiment provides is being executed by processor
When, domain name corresponding to target application can be obtained from server according to the mark of target application, and by accessing the domain name, inspection
Whether the intermediate certificate for surveying the domain name is buffered, if buffered, it is determined that the domain name is accessed by target application;
Through the above scheme, realize the tracking of domain name accessed to target application, and do not influenced by system update, stability compared with
It is good;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, the address MicrochIP PIC18F26K20 and Silicone Labs
C8051F320, Memory Controller are also implemented as a part of the control logic of memory.Those skilled in the art
Know, it, completely can be by the way that method and step be carried out other than realizing controller in a manner of pure computer readable program code
Programming in logic comes so that controller is with logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller
Deng form realize identical function.Therefore this controller is considered a kind of hardware component, and includes in it
The structure in hardware component can also be considered as realizing the device of various functions.It or even, can will be for realizing various
The device of function is considered as either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is reference according to the method for this specification embodiment, the stream of equipment (system) and computer program product
Journey figure and/or block diagram describe.It should be understood that can be by computer program instructions information realization flowchart and/or the block diagram
The combination of process and/or box in each flow and/or block and flowchart and/or the block diagram.It can provide these calculating
Machine program instruction information is to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
Processor is to generate a machine, so that the instruction executed by computer or the processor of other programmable data processing devices
Information generates specifies for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
Function device.
These computer program instructions information, which may also be stored in, is able to guide computer or other programmable data processing devices
In computer-readable memory operate in a specific manner, so that command information stored in the computer readable memory produces
Raw includes the manufacture of command information device, the command information device realize in one or more flows of the flowchart and/or
The function of being specified in one or more blocks of the block diagram.
These computer program instructions information also can be loaded onto a computer or other programmable data processing device, so that
Series of operation steps are executed on a computer or other programmable device to generate computer implemented processing, thus calculating
The command information that is executed on machine or other programmable devices provide for realizing in one or more flows of the flowchart and/or
The step of function of being specified in one or more blocks of the block diagram.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction information, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include temporary computer readable media (transitory media), such as modulation
Data-signal and carrier wave.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can computer executable instructions information it is general up and down described in the text, such as
Program module.Generally, program module include routines performing specific tasks or implementing specific abstract data types, it is program, right
As, component, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environment
In, by executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module
It can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.