CN109495464A - Track method, apparatus, equipment and the system of application access - Google Patents

Track method, apparatus, equipment and the system of application access Download PDF

Info

Publication number
CN109495464A
CN109495464A CN201811307999.9A CN201811307999A CN109495464A CN 109495464 A CN109495464 A CN 109495464A CN 201811307999 A CN201811307999 A CN 201811307999A CN 109495464 A CN109495464 A CN 109495464A
Authority
CN
China
Prior art keywords
domain name
access
request
target application
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811307999.9A
Other languages
Chinese (zh)
Other versions
CN109495464B (en
Inventor
吴建雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Nova Technology Singapore Holdings Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811307999.9A priority Critical patent/CN109495464B/en
Publication of CN109495464A publication Critical patent/CN109495464A/en
Application granted granted Critical
Publication of CN109495464B publication Critical patent/CN109495464B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

This specification embodiment provides a kind of method, apparatus, equipment and system for tracking application access, this method comprises: tracking request to the access that server sends target application;It wherein, include the mark of target application in access tracking request;It receives server and the domain name identification that request returns is tracked according to the access;By domain name corresponding to access domain name identification, whether the intermediate certificate for detecting the domain name is buffered;And instruction according to testing result, determine whether the domain name is accessed by target application.

Description

Track method, apparatus, equipment and the system of application access
Technical field
This application involves Internet technical field more particularly to a kind of method, apparatus for tracking application access, equipment and it is System.
Background technique
With the continuous development of information technology, the terminal devices such as mobile phone, tablet computer, computer are in people's lives, work Be widely used in work, at for people's lives, the indispensable component part of work.In order to provide a variety of clothes to people Business, such as shopping, chat, information inquiry, navigation, in general, needing to install multiple application programs on the terminal device.It is each to answer Data relevant to application operation can be generated at runtime with program, and stored in the system of terminal device.
In order to guarantee the stability and safety of the operation of terminal device system, certain application program malicious access are avoided the occurrence of The case where data of other applications, need to generally provide data access isolation mech isolation test between different applications, such as husky Case.In this way, each application program can only access the data of oneself, the number of other applications on the terminal device cannot be accessed According to.But in practical applications, in order to user carry out information popularization or dependence test etc., it may be necessary to certain applications The link that program is accessed is tracked.
Therefore, it needs to propose that a kind of pair of target application accesses the technical solution that link is tracked.
Summary of the invention
The purpose of this specification embodiment is to provide a kind of method, apparatus, equipment and system for tracking application access, with reality Now link accessed to target application is tracked.
In order to solve the above technical problems, this specification embodiment is achieved in that
This specification embodiment provides a kind of method for tracking application access, which comprises
The access for sending target application to server tracks request;It wherein, include the mesh in the access tracking request Mark the mark of application;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is delayed It deposits;
Instruction according to testing result, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of method for tracking application access, which comprises
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request There is the mark of the target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device passes through access domain name mark Whether corresponding domain name, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine institute State whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of method for tracking application access, which comprises
The access for sending target application to server tracks request;It wherein, include the mesh in the access tracking request Mark the mark of application;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of device for tracking application access, and described device includes:
Sending module, the access for sending target application to server track request;Wherein, the access tracking request In include the target application mark;
First receiving module, the domain name identification returned for receiving the server according to the access tracking request;
Detection module detects the intermediate certificate of domain name for the domain name corresponding by access domain name mark It is whether buffered;
Whether the first determining module determines domain name by the target application institute for instruction according to testing result Access.
This specification embodiment additionally provides a kind of device for tracking application access, and described device includes:
Second receiving module, the access tracking request for the target application that receiving terminal apparatus is sent;Wherein, the visit Ask the mark that the target application is carried in tracking request;
Searching module searches domain name mark corresponding with access tracking request for tracking request according to the access Know;
Return module, for domain name mark to be returned to the terminal device, so that the terminal device passes through visit Ask domain name mark corresponding domain name, whether the intermediate certificate for detecting domain name is buffered;And it is tied according to detection The instruction of fruit, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of device for tracking application access, and described device includes:
Sending module, the access for sending target application to server track request;Wherein, the access tracking request In include target application mark;
First receiving module, the domain name returned for receiving the server according to the access tracking request;
Detection module, for by access domain name, whether the intermediate certificate for detecting domain name to be buffered;
Whether the first determining module determines domain name by the target application institute for instruction according to testing result Access.
This specification embodiment additionally provides a kind of system for tracking application access, including server and terminal device;
The terminal device, the access for sending target application to the server track request;Wherein, the access It include the mark of the target application in tracking request;
The server, the access sent for receiving terminal apparatus track request;It is looked into according to access tracking request Look for domain name identification corresponding with access tracking request;Domain name mark is returned into the terminal device;
The terminal device is also used to receive the domain name identification that the server is returned according to the access tracking request; By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is buffered;According to inspection The instruction for surveying result, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of system for tracking application access, including server and terminal device;
The terminal device, the access for sending target application to the server track request;Wherein, the access It include the mark of the target application in tracking request;
The server, the access sent for receiving terminal apparatus track request;It is asked according to access tracking Seek lookup domain name corresponding with access tracking request;Domain name is returned into the terminal device;
The terminal device is also used to receive the domain name that the server is returned according to the access tracking request;Pass through Domain name is accessed, whether the intermediate certificate for detecting domain name is buffered;Instruction according to testing result, determine described in Whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of equipment for tracking application access, and the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
The access for sending target application to server tracks request;It wherein, include the mesh in the access tracking request Mark the mark of application;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is delayed It deposits;
Instruction according to testing result, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of equipment for tracking application access, and the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request There is the mark of the target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device passes through access domain name mark Whether corresponding domain name, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine institute State whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of equipment for tracking application access, and the equipment includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
The access for sending target application to server tracks request;Wherein, it is answered in the access tracking request including target Mark;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
This specification embodiment provides a kind of storage medium, described to hold for storing computer executable instructions Following below scheme is realized in row instruction when executed:
The access for sending target application to server tracks request;It wherein, include the mesh in the access tracking request Mark the mark of application;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is delayed It deposits;
Instruction according to testing result, determines whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of storage medium, described to hold for storing computer executable instructions Following below scheme is realized in row instruction when executed:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request There is the mark of the target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device passes through access domain name mark Whether corresponding domain name, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine institute State whether domain name is accessed by the target application.
This specification embodiment additionally provides a kind of storage medium, described to hold for storing computer executable instructions Following below scheme is realized in row instruction when executed:
The access for sending target application to server tracks request;Wherein, it is answered in the access tracking request including target Mark;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
Technical solution in the present embodiment can obtain corresponding to target application according to the mark of target application from server Domain name identification, and by access domain name identification corresponding to domain name, whether the intermediate certificate for detecting the domain name buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments as described in this application, for those of ordinary skill in the art, before not making the creative labor property It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is one of the method flow diagram of method for the tracking application access that this specification embodiment provides;
Fig. 2 is the two of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Fig. 3 is the three of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Fig. 4 is the four of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Fig. 5 is the five of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Fig. 6 is one of the interaction diagrams of method for the tracking application access that this specification embodiment provides;
Fig. 7 is the two of the interaction diagrams of the method for the tracking application access that this specification embodiment provides;
Fig. 8 is the six of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Fig. 9 is the seven of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Figure 10 is the eight of the method flow diagram of the method for the tracking application access that this specification embodiment provides;
Figure 11 is the three of the interaction diagrams of the method for the tracking application access that this specification embodiment provides;
Figure 12 is one of the module composition schematic diagram of device of tracking application access that this specification embodiment provides;
Figure 13 is the two of the module composition schematic diagram of the device for the tracking application access that this specification embodiment provides;
Figure 14 is the three of the module composition schematic diagram of the device for the tracking application access that this specification embodiment provides;
Figure 15 is the structural schematic diagram of the system for the tracking application access that this specification embodiment provides;
Figure 16 is the structural schematic diagram of the equipment for the tracking application access that this specification embodiment provides.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with this specification Attached drawing in embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described Embodiment is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field Those of ordinary skill's every other embodiment obtained without creative efforts, all should belong to the application The range of protection.
The thought of this specification embodiment is, if certain domain name is accessed by some application, then corresponding to the domain name Intermediate certificate can be buffered, therefore, can be in such a way that whether intermediate certificate be buffered corresponding to detection certain domain name Detect whether the domain name is accessed by some application.Based on this thought, this specification embodiment provides a kind of tracking application visit Method, apparatus, equipment and the system asked, it is following to be introduced in detail one by one.
Fig. 1 is one of the method flow diagram of method for the tracking application access that this specification embodiment provides, and this method is answered For terminal device, i.e. the executing subject of method provided by this specification embodiment is terminal device, wherein the terminal device It can be the equipment such as mobile phone, tablet computer, computer.Specifically, method provided by this specification embodiment can be applied to The device of tracking application access on terminal device.Method shown in FIG. 1 includes at least following steps:
Step 102, the access of the target application sent to server tracks request;Wherein, it is wrapped in access tracking request Include the mark of target application.
Wherein, above-mentioned domain name identification is mark (being such as properly termed as code) for marking certain domain name, specifically, can be by Letter is constituted, and is perhaps made of number also or is made of letter, number combinatorics on words.For example, certain domain name is www.ABC.com, Then domain name identification corresponding to the domain name can be the information such as asd, 123 or 12a;Also alternatively, above-mentioned domain name identification is to use The coding that certain encryption algorithm encodes.
In certain specific embodiment, above-mentioned domain name identification may belong to a portion of domain name, and such as can be should The URL of domain name.For example, certain domain name is ABC.Tmall.com, then domain name identification corresponding to the domain name is then ABC.
It, can domain name identification and the target application of being stored with corresponding in advance in the server in this specification embodiment Mark, can also the corresponding mark for being stored with domain name identification and target application in the database.One of possible storage Form is as shown in table 1.
Table 1
The mark of application Domain name identification
Application identities 1 ABC
Application identities 2 Mkn
Application identities 1 Asd
Application identities 4 ABC
Specifically, different applications may correspond to identical domain name identification, the same application may also correspond to multiple Different domain name identifications, as shown in Table 1 above.Certainly, in table 1 above, above-mentioned domain name identification and the mark of application are Exemplary illustration does not constitute the restriction to this specification embodiment.
In this specification embodiment, by being that the domain name to be accessed target application is tracked, it is sent to The mark of target application is carried in the access tracking request of server, so as to get domain name corresponding to target application Mark.
Wherein, in this specification embodiment, the mark of above-mentioned target application can be the user agent of target application (User Agent, UA) information, specifically, the UA information of target application may include that version number of target application etc. can identify The information of target application.
Step 104, it receives server and the domain name identification that request returns is tracked according to above-mentioned access.
In this specification embodiment, after server receives the access tracking request of terminal device transmission, then basis The corresponding domain name identification of domain name identification request is searched in domain name identification request.
Specifically, if domain name identification and the corresponding storage of the mark of application are on the server, then when server receives After the access tracking request that terminal device is sent, then according to the mark of target application entrained in the request, from server Domain name identification corresponding to the mark of target application is searched in the mapping relations of the mark of the domain name identification and application that are stored, it will The domain name identification found returns to terminal device.
In another specific embodiment, if the domain name identification and mark of application is corresponding is stored in database In, then after server receives the access tracking request of terminal device transmission, then answered according to target entrained in the request Mark searches domain name identification corresponding to the mark of the target application from database, by what is found from database Domain name identification returns to terminal device.
For ease of understanding, following to be identified as application identities 1 with target application, application identities 1 are searched from above-mentioned table 1 It is illustrated for corresponding domain name identification, also, in the citing, the above-mentioned storage of table 1 is in the database.
For example, the target application that terminal device is carried into the access tracking request that server is sent is identified as using mark Know 1, then when server receive terminal device transmission access tracking request after, then in the database by application identities 1 with it is upper It states table 1 to be matched, to search domain name identification corresponding to application identities 1 in table 1, in table 1 and corresponding to application identities 1 Domain name identification be " ABC " and " Asd ", therefore, then " ABC " and " Asd " is used as domain name identification to return to terminal and set by server It is standby.
Step 106, by accessing domain name corresponding to above-mentioned domain name identification, detect domain name intermediate certificate whether by Caching.
Step 108, instruction according to testing result, determines whether above-mentioned domain name is accessed by target application.
Specifically, if domain name corresponding to certain domain name mark is accessed by target application, then corresponding to the domain name Intermediate certificate can be cached by target application client, therefore, can be existed in corresponding to the target application on the terminal device Between certificate, therefore, by detect certain domain name intermediate certificate it is whether buffered, the domain name can be determined whether by target Using being accessed.Wherein, it is accessed by target application by HHTPS if certain domain name is identified, then the above-mentioned intermediate card being mentioned to Book is then Hyper text transfer security protocol (the Hyper Text Transfer Protocol over Secure of the domain name Socket Layer, HTTPS) intermediate certificate used in certificate.
Therefore, in this specification embodiment, if being indicated in the domain name by the obtained testing result of step 106 Between certificate it is buffered, then can determine that the domain name is accessed by target application;If testing result indicates in the domain name Between certificate be not buffered, then can determine that the domain name is not accessed by target application.
In addition, it is necessary to explanation, in above-mentioned steps 108, determines whether above-mentioned domain name is accessed by target application, it can To be whether the determination domain name is accessed by the target application of terminal device.
Following specific implementation processes that will be described in detail above-mentioned steps 106.
In addition, above by domain name corresponding to each domain name identification is accessed, detecting the domain in above-mentioned steps 106 Whether intermediate certificate corresponding to name is buffered, can at least be realized by the following two kinds mode, following that difference is detailed It is described.
Mode one
Domain name corresponding to each domain name identification is accessed, and monitors whether to request centre corresponding to the domain name to server Certificate;If so, determining that intermediate certificate corresponding to the domain name is not buffered;Otherwise, it determines intermediate card corresponding to the domain name Book is buffered.
If intermediate certificate corresponding to the domain name is then not present specifically, target application has not visited the domain name, this When, if accessing the domain name, then terminal device can request intermediate certificate corresponding to the domain name to server.Therefore, in this theory It is whether buffered by intermediate certificate corresponding to monitoring domain name, it can be determined that whether to go out the domain name in bright book embodiment It is accessed by target application.
If not monitoring to request intermediate certificate corresponding to the domain name to server, then illustrate in corresponding to the domain name Between certificate cached by terminal device, may thereby determine that out the domain name identification by the target application institute of terminal device Access;If monitoring to request intermediate certificate corresponding to the domain name to server, then illustrate intermediate card corresponding to the domain name Book is not cached by terminal device, may thereby determine that out that the domain name is not accessed by target application.
Mode two
Domain name corresponding to each domain name identification is accessed, and monitors whether to receive corresponding to the domain name of server return Intermediate certificate;If so, determining that intermediate certificate corresponding to the domain name is not buffered;Otherwise, it determines corresponding to the domain name Intermediate certificate is buffered.
If intermediate certificate corresponding to the domain name is then not present specifically, target application has not visited the domain name, this When, if accessing the domain name, then terminal device can request intermediate certificate corresponding to the domain name to server, thus server meeting Intermediate certificate corresponding to the domain name is returned to terminal device, therefore, the domain name institute whether can be returned to by monitoring server The mode of corresponding intermediate certificate judges whether the intermediate certificate has been cached by terminal device.
If not monitoring intermediate certificate corresponding to the domain name of server return, then illustrate in corresponding to the domain name Between certificate cached by terminal device, may thereby determine that out domain name corresponding to the domain name identification by terminal device Target application accessed;If monitoring intermediate certificate corresponding to the domain name of server return, then illustrate the domain name institute Corresponding intermediate certificate is cached by terminal device, may thereby determine that out domain name corresponding to the domain name identification not by end The target application of end equipment is accessed.
In this specification embodiment, by the above-mentioned means, can determine which domain name is target application have accessed.Specifically , it, can be directly in the accessed domain name of terminal device displaying target application after determining domain name that target application is accessed The domain name identification determined can also be exported as log information, or can also send and be given to other by domain name identification It needs on the component of the definitive result.
Certainly, above-mentioned only to list several processing modes determined after the domain name identification that target application is accessed, when So, the processing mode of the domain name identification accessed the target application determined is not limited thereto, above-mentioned only exemplary Illustrate, does not constitute the restriction to this specification embodiment.
In addition, in this specification embodiment, since above-mentioned steps 106 need to access domain name corresponding to domain name identification, Therefore, before executing above-mentioned steps 106, need to get domain name corresponding to domain name identification.Therefore, above-mentioned by accessing Domain name corresponding to domain name identification, detect above-mentioned domain name intermediate certificate it is whether buffered before, it is provided in this embodiment Method, further includes:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Wherein, above-mentioned preset domain name combination is the rule for domain name identification group to be combined into domain name, can be stored in advance On the terminal device.In addition, it is necessary to explanation, in this embodiment, above-mentioned domain name identification belongs to a part of domain name.Specifically , preset domain name combination rule may include one or more domain name combination template, i.e., preset domain name combination rule can To include the gang form for multiple domain names.For example, preset domain name combination rule may include domain name identification .A.com, domain Multiple domain name combination templates such as name mark .B.com, domain name identification .Tmall.com.
For example, being in specific implementation, above-mentioned setting rule can be domain name identification .Tmall.com, if above-mentioned domain name mark Knowing is ABC, then obtains as domain name being ABC.Tmall.com after combining.
Certainly, in other embodiments, above-mentioned domain name identification can also be coding corresponding to domain name, for example, server Pre-arranged code algorithm can be used to encode the domain name being stored in server or database, obtain corresponding to each domain name Coding;Also, it is stored with corresponding decoding algorithm on the terminal device, in this way, when terminal device gets domain from server After name mark, corresponding domain name can be obtained by being decoded using default decoding algorithm to the domain name.
Alternatively, above-mentioned domain name identification can also be using mark set by letter, number or letter and number combinatorics on words Note, for example, domain name identification corresponding to domain name ABC.C.com can be set to " 123 ", " sbg " or " 1hg " etc., also, It is stored with the mapping relations of each domain name identification with corresponding domain name on the server, it, can be in this way, after getting domain name identification Domain name corresponding to domain name identification is got by way of inquiring domain name corresponding to the mark from server.
Wherein, it is to be understood that above-mentioned be exemplary describe it is several by domain name identification obtain domain name specific realities Existing mode, obtaining domain name by domain name identification can also realize by other means, as long as terminal device can be made according to domain name Mark generates domain name, and this specification embodiment is not defined its specific generating process.
In addition, in the specific implementation, can determine that target application is visited by the first application of installation on the terminal device The domain name asked.I.e. method provided by this specification embodiment can be applied to terminal device first application;
Correspondingly, in that case, in above-mentioned steps 102, the access for sending target application to server tracks request, Include:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, above-mentioned steps 108, instruction according to testing result, determine whether above-mentioned domain name is visited by target application It asks, comprising:
Instruction according to testing result, determines whether above-mentioned domain name is accessed by the target application on terminal device;Wherein, Above-mentioned first application and target application are the different application on terminal device.
It is also to be noted that above-mentioned target application can be to be mounted on terminal device in this specification embodiment Any application, above-mentioned first application is application program in addition to browser on terminal device.
It is following the access of target application to be linked by the first application on terminal device by specific embodiment introduction The embodiment being tracked.Fig. 2 be the method for tracking application access that this specification embodiment provides method flow diagram it Two, method shown in Fig. 2 includes at least following steps:
Step 202, request is tracked to the access that server sends target application by the first application on terminal device;Its In, the mark of target application is carried in access tracking request.
Step 204, domain name identification corresponding to the mark with target application that server returns is received.
Step 206, according to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Step 208, pass through the first application access domain name on terminal device.
Step 210, monitoring first application whether to server request target apply corresponding intermediate certificate;If so, Step 212 is executed, it is no to then follow the steps 214.
Wherein, in step 210, the target application of server return whether can also be received by the first application of monitoring The mode of corresponding intermediate certificate is realized.
Step 212, determine that the domain name is not accessed by the target application on terminal device.
Step 214, determine that the domain name is accessed by the target application on terminal device.
In the specific implementation, it in order to determine domain name identification corresponding to target application in some network address region, contracts The range and quantity for the domain name identification that servlets return in step 102, are sent in the access tracking request of server and also take With Internet protocol (Internet Protocol, IP) address information used when establishing connection with server;
Correspondingly, in that case, in above-mentioned steps 104, receiving server according to access and tracking the domain that request returns Name mark, specifically includes:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It should be noted that in this kind of implementation, then store in server or database application mark, Mapping relations between domain name identification and IP address information, a kind of possible form are as shown in table 2.
In table 2, the mark of the same application may use different IP address informations to access domain name, identical IP address Information, the mark of identical application may correspond to different domain name identifications, and e.g., the corresponding domain name identification of UA2, IP1 has " ASD " " fyt ";The mark of different IP address information or different applications may also correspond to identical domain name identification, e.g., UA1 Domain name identification corresponding with IP1 is " ABC ", and UA3 and the corresponding domain name identification of IP2 are also " ABC ".Certainly, it is answered in above-mentioned table 2 It is identified as the UA of application, or other identifier, table 2 are exemplary illustration, do not constitute and implement to this specification The restriction of example.
Table 2
The mark of application IP address information Domain name identification
UA1 IP1 ABC
UA2 IP1 ASD
UA1 IP2 afh
UA3 IP2 ABC
UA2 IP1 fyt
In the specific implementation, after server receives the access tracking request of the target application of terminal device transmission, from The mark of target application is extracted and IP address information that terminal device is connected in the context of access tracking request, In, the identification information of target application can be the UA of target application, mark, domain name mark from the application of itself or database purchase The domain name identification to match with the mark and IP address information of target application is searched in the mapping relations of knowledge and IP address information, it will The domain name identification found is sent to terminal device as domain name identification.
For ease of understanding, following to be illustrated by specific embodiment.
Fig. 3 is the three of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in Fig. 3 Method includes at least following steps:
Step 302, request is tracked to the access that server sends target application;Wherein, include in access tracking request The mark of target application and IP address information used in connection is established with server.
Step 304, domain name identification corresponding to the mark and IP address information for the target application that server returns is received.
Step 306, according to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Step 308, above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the domain name of server return Book;If so, thening follow the steps 310, otherwise, step 312 is executed.
Wherein, in step 308, intermediate certificate corresponding to opposite server request domain name can also be monitored whether.
Step 310, determine that the domain name is not accessed by target application.
Step 312, determine that the domain name is accessed by target application.
In this specification embodiment, by the mark for carrying target application in the access tracking request for being sent to server The IP address information known and connected when accessing server, it is available to corresponding to the target application under the IP address information Domain name identification, in this way, the range of accessed domain name identification can be reduced, so as to reduce subsequent lookup terminal device The workload for the domain name identification that target application is accessed.
It certainly, can also be at this other than carrying target application mark and IP address information in access tracking request Terminal device relevant information is carried in access tracking request;Specifically, above-mentioned access tracking is asked in this specification embodiment It further include terminal device relevant information in asking;
Correspondingly, receiving server in above-mentioned steps 104 according to above-mentioned access and tracking the domain name identification that request returns, tool Body includes:
Receive the domain name that server is inquired according to target application mark, IP address information and terminal device relevant information Mark.
Specifically, above-mentioned terminal device relevant information can be the information such as resolution ratio, the terminal models of terminal device, so as to The range of found domain name identification can be further reduced, to reduce the subsequent lookup from the domain name identification got eventually The workload for the domain name that the target application of end equipment is accessed, so as to shorten the domain for determining that the target application of terminal device accessed The time of name improves search efficiency.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to server side, i.e., The executing subject of this method is server, specifically, the executing subject of this method can be that the tracking being mounted on server is answered With the device of access.Fig. 4 shows the four of the method flow diagram of the method for the tracking application access of this specification embodiment offer, Method shown in Fig. 4 includes at least following steps:
Step 402, the access for the target application that receiving terminal apparatus is sent tracks request;Wherein, access tracking request In carry the mark of target application.
Step 404, request is tracked according to access and searches domain name identification corresponding with access tracking request.
Wherein, in above-mentioned steps 404, if domain name identification and the corresponding storage of the mark of application are on the server, then Domain name identification corresponding with access tracking request is directly searched on the server;If domain name identification and the mark of application are corresponding In the database, then server searches domain name identification corresponding with access tracking request from database for storage.
Step 406, above-mentioned domain name identification is returned into terminal device, so that terminal device is by accessing the domain name identification institute Whether corresponding domain name, the intermediate certificate for detecting the domain name are buffered;And instruction according to testing result, determine the domain name Whether accessed by target application.
Wherein, the realization of the specific implementation of above-mentioned each step and each step in embodiment corresponding to Fig. 1-Fig. 3 Mode is identical, and therefore, the specific implementation of above steps can refer to embodiment corresponding to Fig. 1-Fig. 3, and details are not described herein again.
Specifically, above-mentioned domain name identification can be a part of domain name in this specification embodiment;Or it uses The coding that pre-arranged code algorithm obtains after encoding to domain name;Alternatively, can also be using letter, number or letter and number Label set by combinatorics on words.
Specifically, before executing step 402, the method for this specification embodiment offer further include:
Receive the domain name access request that each terminal device is sent;It is requested to determine the corresponding domain name of the domain name according to domain name access Identify and access the mark of the application of the domain name;By the corresponding storage of the mark of above-mentioned domain name identification and application.
Specifically, in this specification embodiment, when server receives the access of the target application of terminal device transmission After request, according to the access request, the mark for accessing the application of the domain name is extracted, and extract from the domain name accessed The domain name identification of the domain name.For example, if terminal device passes through the application access domain name ABC.Tmall.com of application identities 1, then Application identities are application identities 1, and the domain name identification extracted from the domain name is " ABC ", then in server or database By application identities 1 and " ABC " is corresponding stores.
Specifically, the IP address for also carrying used network when establishing connection with server in above-mentioned access request is believed Breath, therefore, before executing above-mentioned steps 402, the method for this specification embodiment offer further include:
Used IP address information when access domain name determining according to the request of above-mentioned domain name access;By domain name identification, answer Mark and the corresponding storage of IP address information.
Wherein, above-mentioned IP address information can be extracted from the context that domain name access is requested.
It should be noted that in this specification embodiment, it can be by domain name identification, the mark and IP address information of application Corresponding storage on the server, can be by domain name identification, the mark of application and IP address information is corresponding is stored in database In.
Wherein, a kind of corresponding storage mode of domain name identification, the mark of application and IP address information is as shown in table 2, herein It repeats no more.
In the specific implementation, stored on server be the domain name identification of target application, the application identities of target application and The mapping relations of IP address information, server receive be terminal device first application send target application access with Track request, wherein first application and target application be the different application programs being mounted on same terminal device.
Fig. 5 is the five of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in fig. 5 Method includes at least following steps:
Step 502, the domain name access request that the target application of each terminal device is sent is received;
Step 504, extract the domain name identification of domain name, and according to domain name access request to determine target application mark and IP address information.
Step 506, by domain name identification, the mark of target application and the corresponding storage of IP address information.
It wherein, in step 506, can be by domain name identification, the mark of target application and the corresponding storage of IP address information In server or database.
Step 508, the access for the target application that the first application of receiving terminal apparatus is sent tracks request;Wherein, the visit It asks and carries the mark of target application in tracking request and connect used IP address information with server.
Step 510, it is searched according to the mark of target application and IP address information and is believed with the mark of target application and IP address Cease corresponding domain name identification.
Step 512, the domain name identification found is returned into terminal device.
The method for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
The method that this specification embodiment provides, following will introduce carry out between terminal device and server for ease of understanding Interactive exchange method, Fig. 6 be the method for tracking application access that this specification embodiment provides exchange method flow chart it One, method shown in fig. 6 includes at least following steps:
Step 602, terminal device tracks request to the access that server sends target application, wherein access tracking is asked The mark of target application is carried in asking and accesses the IP address of the used network of server.
Step 604, after server receives above-mentioned access tracking request, target is extracted from access tracking request and is answered Mark and IP address.
Step 606, server is searched from the mapping relations of the mark of the application pre-established, IP address and domain name identification The domain name identification to match with the mark and IP address of target application.
Step 608, the domain name identification found is sent to terminal device by server.
Step 610, above-mentioned domain name identification group is combined into domain name according to preset domain name combination rule by terminal device.
Step 612, terminal device accesses the domain name, and monitors whether to request intermediate card corresponding to the domain name to server Book;If so, thening follow the steps 614, otherwise, step 616 is executed;
Specifically, can also monitor whether to receive centre corresponding to the domain name of server return in step 614 Certificate.
Step 614, determine that the domain name is not accessed by target application.
Step 616, determine that the domain name is accessed by target application.
It is following to introduce this specification with by being tracked using A to terminal device using B of terminal device and implement The method that example provides, Fig. 7 are the two of the exchange method flow chart of the method for the tracking application access that this specification embodiment provides, Method shown in Fig. 7 includes at least following steps:
Step 702, each terminal device is by sending domain name access request to server using A, and server is to corresponding end End equipment returns to intermediate certificate corresponding to the domain name.
Step 704, server extracted from the access request domain name identification corresponding to the domain name, using A UA and Access the IP address of server connected network.
Step 706, server stores the mapping relations of domain name identification, UA and IP address.
Wherein, in step 706, the mapping relations of domain name identification, UA and IP address can be stored in server, it can also To store in the database.After server is stored the mapping relations of domain name identification, UA and IP address, Xiang Yingyong A is returned Return stored prompt information.
Step 708, terminal device is requested by tracking using B to the access of server sending application A, is tracked in the access The IP address of the UA and access the used network of server using A are carried in request.
Wherein, the access tracking request sent by application B can be HTTPS request.
Step 710, server searches the UA and the IP address according to the UA and IP address using A carried in the request Corresponding domain name identification.
Step 712, the domain name identification found is returned to terminal device by server.
Step 714, above-mentioned domain name identification group is combined into domain name according to preset domain name combination rule by terminal device.
Step 716, terminal device is by accessing above-mentioned domain name using B, and monitors whether to request the domain name institute to server Corresponding intermediate certificate;If so, thening follow the steps 718, otherwise, step 720 is executed.
Specifically, accessing above-mentioned domain name by HTTPS using B.In addition, can also monitor whether to receive in step 716 Intermediate certificate corresponding to the domain name returned to server.
Step 718, the domain name not accessing using A by terminal device is determined.
Step 720, the domain name accessing using A by terminal device is determined.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to terminal device, i.e., The executing subject of this method can be terminal device, specifically, can be the tracking application access being mounted on terminal device Device.Fig. 8 is the six of the method flow diagram of the method for the tracking application access that this specification embodiment provides, side shown in Fig. 8 Method includes at least following steps:
Step 802, request is tracked to the access that server sends target application;Wherein, include in access tracking request The mark of target application.
Step 804, it receives server and the domain name that request returns is tracked according to access.
Step 806, by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered.
Step 808, instruction according to testing result, determines whether above-mentioned domain name is accessed by target application.
It in this embodiment, is that mapping between domain name and the mark of application is closed being stored in server or database System, wherein a kind of possible storage form is as shown in table 3.
Table 3
The mark of application Domain name
UA1 2ty.A.com
UA2 123.B.com
UA2 Syh.C.com
UA3 123.B.com
UA2 as described in Table 3 corresponds to multiple and different domain names, and UA3 is identical with domain name corresponding to one of UA2.I.e. In mapping relations between the mark of the domain name and application that are stored in server or database, different application identities can To correspond to identical domain name, the mark of the same application may also correspond to multiple and different domain names.
In addition, above-mentioned table 3 is exemplary illustration, do not constitute to server or database in this specification embodiment The restriction of the mark of middle stored application and the mapping relations of domain name and specific domain name, the mark of application.
In the method for tracking application access provided by the present embodiment, it is due to being stored in server or database The mark of application and the mapping relations of domain name, therefore, when server receive terminal device transmission target application access with After track request, the mapping of the mark and domain name of the application stored from server or database according to the mark of target application is closed The domain name to match with the mark of target application is searched in system, and the domain name found is returned into terminal device.Wherein, it finds Domain name can be one or more, regardless of the quantity of the domain name found be one still it is multiple, server will be found All domain names return to terminal device.
After terminal device receives the domain name of server return, by accessing each domain name, the intermediate certificate of domain name is detected It is whether buffered.
Specifically, by accessing above-mentioned domain name, whether to detect the intermediate certificate of the domain name in above-mentioned steps 806 It is buffered, specifically includes:
The domain name is accessed, and monitors whether to request intermediate certificate corresponding to the domain name to server;It is somebody's turn to do if so, determining Intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to the domain name is buffered;
Alternatively,
The domain name is accessed, and monitors whether to receive intermediate certificate corresponding to the domain name of server return;If so, Determine that intermediate certificate corresponding to the domain name is uncached;Otherwise, it determines intermediate certificate corresponding to the domain name is buffered.
Specifically, in the present embodiment, in above-mentioned steps 802, the access tracking for being sent to the target application of server is asked It further include that IP address information used in connection is established with server in asking;
Correspondingly, receiving server in above-mentioned steps 804 according to the access and tracking the domain name that request returns, specifically include:
Receive the domain name that server is inquired according to the mark and the IP address information of above-mentioned target application.
Specifically, in the present embodiment, in step 802, being sent in the access tracking request of the target application of server It further include terminal device relevant information;
Correspondingly, receiving server in above-mentioned steps 804 according to the access and tracking the domain name that request returns, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name.
Specifically, the access for sending target application to server tracks request in above-mentioned steps 802, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, in above-mentioned steps 808, instruction according to testing result determines whether the domain name is visited by target application It asks, comprising:
Instruction according to testing result, determines whether the domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
Wherein, in the present embodiment in the specific implementation process of each step and Fig. 1-Fig. 3 each embodiment specific implementation Cheng Xiangtong, therefore, the specific implementation process of each step can refer to embodiment corresponding to Fig. 1-Fig. 3 in the present embodiment, herein not It repeats again.
The method that this specification embodiment provides for ease of understanding, it is following will be to access and chase after by corresponding to A using B For track, the method that this specification embodiment provides is introduced, wherein belong to the same terminal device using A and using B.
Fig. 9 is the seven of the method flow diagram of the method for the tracking application access that this specification embodiment provides, shown in Fig. 9 Method includes at least following steps:
Step 902, it is requested by being tracked using B to the access of server sending application A on terminal device;Wherein, should The mark using A is carried in access tracking request.
Step 904, domain name corresponding to the mark with application A that server returns is received.
Step 906, by accessing the domain name using B on terminal device.
Step 908, whether monitoring requests to apply intermediate certificate corresponding to A to server using B;If so, executing step Rapid 910, it is no to then follow the steps 912.
Wherein, in step 908, the target application of server return whether can also be received by the first application of monitoring The mode of corresponding intermediate certificate is realized.
Step 910, determine the domain name not by accessing on terminal device using A.
Step 912, determine the domain name by accessing on terminal device using A.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
This specification embodiment additionally provides a kind of method for tracking application access, and this method is applied to server side, i.e., The executing subject of this method is server, specifically, the executing subject of this method can be that the tracking being mounted on server is answered With the device of access.Figure 10 show this specification embodiment offer tracking application access method method flow diagram it Eight, method shown in Fig. 10 includes at least following steps:
Step 1002, the access for the target application that receiving terminal apparatus is sent tracks request;Wherein, access tracking request In carry the mark of target application.
Step 1004, request is tracked according to access and searches domain name corresponding with access tracking request.
Wherein, in above-mentioned steps 1004, if domain name and the corresponding storage of the mark of application are on the server, then directly Domain name corresponding with access tracking request is searched on the server;If the domain name and mark of application is corresponding is stored in database In, then server searches domain name corresponding with access tracking request from database.
Step 1006, above-mentioned domain name is returned into terminal device, so that terminal device detects the domain by accessing the domain name Whether the intermediate certificate of name is buffered;And instruction according to testing result, determine whether the domain name is visited by target application It asks.
Wherein, the realization of the specific implementation of above-mentioned each step and each step in embodiment corresponding to Fig. 4-Fig. 7 Principle is identical, and therefore, the specific implementation of above steps can refer to embodiment corresponding to Fig. 4-Fig. 7, and details are not described herein again. For the present embodiment unlike embodiment corresponding to Fig. 4-Fig. 7, storing in server in the present embodiment is domain name and application The corresponding relationship of mark, it is domain name that server, which returns to terminal device,.
Specifically, before executing step 1002, the method for this specification embodiment offer further include:
Receive the domain name access request that each terminal device is sent;By the mark of application entrained in above-mentioned domain name and the request Know corresponding storage.
Specifically, in this specification embodiment, when server receives the access of the target application of terminal device transmission After request, according to the access request, the mark for accessing the application of the domain name is extracted, and the mark of the application is corresponding with domain name Carry out store.For example, if terminal device by being identified as the application access domain name ABC.D.com of UA1, then application identities are UA1, then in server or database by UA1 and " ABC.D.com " is corresponding stores.
Specifically, the IP address for also carrying used network when establishing connection with server in above-mentioned access request is believed Breath, therefore, before executing above-mentioned steps 1002, the method for this specification embodiment offer further include:
Used IP address information when access domain name determining according to the request of above-mentioned domain name access;By domain name, application Identify storage corresponding with IP address information.
Wherein, above-mentioned IP address information can be extracted from the context that domain name access is requested.
It should be noted that in this specification embodiment, it can be corresponding by domain name, the mark of application and IP address information Storage on the server, can by domain name, the mark of application and IP address information it is corresponding storage in the database.
In the specific implementation, store on server is the domain name of target application, the application identities of target application and IP The mapping relations of location information, server receive be terminal device first application send target application access tracking ask Ask, wherein first application and target application be the different application programs being mounted on same terminal device.
For ease of understanding this specification embodiment provide tracking application access method, it is following will be with server and terminal For equipment interacts, the interaction flow of the method for the tracking application access of this specification embodiment offer, Tu11Wei are introduced Method shown in three, Figure 11 of the interaction diagrams of the method for the tracking application access that this specification embodiment provides, is at least wrapped Include following steps:
Step 1102, terminal device tracks request to the access that server sends target application;Wherein, it is carried in the request There is the mark of target application.
Step 1104, it after the access tracking that server receives terminal device transmission is requested, is tracked and is requested according to the access Search domain name corresponding with access tracking request.
Step 1106, the domain name found is sent to terminal device by server.
Step 1108, terminal device accesses the domain name, and monitors whether to request centre corresponding to the domain name to server Certificate;If so, thening follow the steps 1110, otherwise, step 1112 is executed.
Alternatively, in above-mentioned steps 1108, it can also be by monitoring whether that the domain name institute for receiving server return is right The intermediate certificate answered is realized.
Step 1110, determine that the domain name is accessed by target application.
Step 1112, determine that the domain name is not accessed by target application.
The method for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 1-Fig. 3 provides, based on identical Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 1-Fig. 3 Embodiment, the device are applied to terminal device, and Figure 12 is the mould of the device for the tracking application access that this specification embodiment provides One of block composition schematic diagram, device shown in Figure 12, includes at least:
The access of sending module 1201, the target application for sending to server tracks request;Wherein, access tracking is asked It include the mark of target application in asking;
First receiving module 1202 tracks the domain name identification that request returns according to access for receiving server;
Detection module 1203, for by access domain name identification corresponding to domain name, detect domain name intermediate certificate whether It is buffered;
First determining module 1204 determines whether domain name is accessed by target application for instruction according to testing result.
Optionally, above-mentioned detection module 1203, is specifically used for:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server; If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is Through being buffered.
Optionally, above-mentioned detection module 1203, further includes:
Composite module, for according to preset domain name combination rule, above-mentioned domain name identification group to be combined into domain name.
Optionally, above-mentioned sending module 1201, is specifically used for:
Above-mentioned access tracking request is sent to server by the first application program of terminal device;
Correspondingly, above-mentioned first determining module 1204, is specifically used for:
According to the instruction of above-mentioned testing result, determine whether domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
It optionally, further include building to connect used IP address information with server in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1202, is specifically used for:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1202, is specifically used for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name mark.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 1-Fig. 3 The method of execution, and the device for tracking application access is realized in Fig. 1-embodiment illustrated in fig. 3 function, details are not described herein.
The device for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the intermediate card of domain name Whether book is buffered, if buffered, it is determined that domain name is accessed by target application;Through the above scheme, it realizes The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 4, Fig. 5 provides, based on identical Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 4, Fig. 5 Embodiment, the device are applied to server, and Figure 13 is the module of the device for the tracking application access that this specification embodiment provides Device shown in two, Figure 13 of composition schematic diagram, includes at least:
Second receiving module 1301, the access tracking request for the target application that receiving terminal apparatus is sent;Wherein, it visits Ask the mark that target application is carried in tracking request;
Searching module 1302 searches domain name identification corresponding with access tracking request for tracking request according to access;
Return module 1303, for domain name identification to be returned to terminal device, so that terminal device passes through access domain identifier Know corresponding domain name, whether the intermediate certificate for detecting domain name is buffered;And instruction according to testing result, determine domain name Whether accessed by target application.
Optionally, device provided by this specification embodiment, further includes:
Third receiving module, the domain name access request sent for receiving each terminal device;
Second determining module determines domain name identification corresponding to domain name and access domain name for requesting according to domain name access Application mark;
Memory module, for by the corresponding storage of the mark of domain name identification and application.
Optionally, the device that this specification embodiment provides is also used to:
It is requested to determine IP address information used in access domain name according to domain name access;By domain name identification, the mark of application Storage corresponding with IP address information.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 4, Fig. 5 The method of execution, and the device for tracking application access is realized in Fig. 4, the function of embodiment illustrated in fig. 5, details are not described herein.
The device for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method for the tracking application access that embodiment corresponding to this specification Fig. 8-Fig. 9 provides, based on identical Thinking, this specification embodiment additionally provides a kind of device for tracking application access, for executing method corresponding to Fig. 8-Fig. 9 Embodiment, the device are applied to terminal device, and Figure 14 is the mould of the device for the tracking application access that this specification embodiment provides Device shown in three, Figure 14 of block composition schematic diagram, includes at least:
Sending module 1401, the access for sending target application to server track request;Wherein, access tracking request In include target application mark;
First receiving module 1402 tracks the domain name that request returns according to access for receiving server;
Detection module 1403, for by access domain name, whether the intermediate certificate for detecting domain name to be buffered;
First determining module 1404 determines whether domain name is accessed by target application for instruction according to testing result.
Optionally, above-mentioned detection module 1402, is specifically used for:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so, Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name Certificate is buffered.
Optionally, above-mentioned sending module 1401, is specifically used for:
Above-mentioned access tracking request is sent to server by the first application program of terminal device;
Correspondingly, above-mentioned first determining module 1404, is specifically used for:
According to the instruction of above-mentioned testing result, determine whether domain name is accessed by the target application on terminal device;
Wherein, above-mentioned first application and target application are the different application on terminal device.
It optionally, further include building to connect used IP address information with server in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1402, is specifically used for:
Receive the domain name that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned first receiving module 1402, is specifically used for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name.
The device of the tracking application access of this specification embodiment can also carry out the device that application access is tracked in Fig. 8-Fig. 9 The method of execution, and the device for tracking application access is realized in Fig. 8-embodiment illustrated in fig. 9 function, details are not described herein.
The device for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
Corresponding to the method that this specification embodiment provides, it is based on identical thinking, this specification embodiment additionally provides A kind of system tracking application access, Figure 15 are the structural representation of the system for the tracking application access that this specification embodiment provides Figure, system shown in figure 15, including server 1501 and terminal device 1502;
Terminal device 1502, the access for sending target application to server track request;Wherein, access tracking request In include target application mark;
Server 1501, the access sent for receiving terminal apparatus track request;Wherein, it is carried in access tracking request There is the mark of target application;Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;By domain name identification Return to terminal device;
Terminal device 1502 is also used to receive server according to access and tracks the domain name identification that request returns;Pass through access Whether domain name corresponding to domain name identification, the intermediate certificate for detecting domain name are buffered;Instruction according to testing result determines Whether domain name is accessed by target application.
Optionally, terminal device 1502 are specifically used for:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server; If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is Through being buffered.
Optionally, above-mentioned terminal device 1502, also particularly useful for:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, above-mentioned terminal device 1502, also particularly useful for:
Access tracking request is sent to server by the first application of terminal device;
And
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
It optionally, further include that Internet protocol IP used in connection is established with server in above-mentioned access tracking request Address information;
Correspondingly, above-mentioned terminal device 1502, also particularly useful for:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device 1502, also particularly useful for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name mark.
Optionally, above-mentioned server 1501, is also used to:
Receive the domain name access request that each terminal device is sent;It is requested to determine domain name corresponding to domain name according to domain name access The mark of the application of mark and access domain name;By the corresponding storage of the mark of domain name identification and application.
Optionally, above-mentioned server 1501, is also used to:
It is determined according to domain name access request and accesses IP address information used in domain name;By domain name mark Knowledge, the mark of the application and the corresponding storage of the IP address information.
In the system of tracking application access provided by this specification embodiment, terminal device be can also carry out in Fig. 1-Fig. 3 The method that terminal device executes, and terminal device is realized in Fig. 1-embodiment illustrated in fig. 3 function, figure can also be performed in server 1, the method that server executes in Fig. 5, and server is realized in Fig. 4, the function of embodiment illustrated in fig. 5, details are not described herein.
The system for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the intermediate card of domain name Whether book is buffered, if buffered, it is determined that domain name is accessed by target application;Through the above scheme, it realizes The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to the method that this specification embodiment provides, it is based on identical thinking, this specification embodiment additionally provides A kind of system tracking application access, Figure 15 are the structural representation of the system for the tracking application access that this specification embodiment provides Figure, including server 1501 and terminal device 1502;
Terminal device, the access for sending target application to server track request;Wherein, it is wrapped in access tracking request Include the mark of target application;
Server, the access sent for receiving terminal apparatus track request;Request is tracked according to access to search and access Corresponding domain name is requested in tracking;Domain name is returned into terminal device;
Terminal device is also used to receive server according to access and tracks the domain name that request returns;By accessing domain name, detection Whether the intermediate certificate of domain name is buffered;Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, above-mentioned terminal device, is specifically used for:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so, Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name Certificate is buffered.
Optionally, above-mentioned terminal device, is also used to:
Access tracking request is sent to server by the first application;And instruction according to testing result, it determines above-mentioned Whether domain name is accessed by the target application on terminal device;Wherein, above-mentioned first application and target application are on terminal device Different application.
It optionally, further include that IP address information used in connection is established with server in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device, also particularly useful for:
Receive the domain name that server is inquired according to the mark and IP address information of target application.
It optionally, further include terminal device relevant information in above-mentioned access tracking request;
Correspondingly, above-mentioned terminal device, also particularly useful for:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name.
Optionally, above-mentioned server, is also used to:
Receive the domain name access request that each terminal device is sent;The application for accessing the domain name is extracted from the access request Mark;By the corresponding storage of the mark of domain name and application.
Optionally, above-mentioned server, is also used to:
It requests to determine according to above-mentioned domain name access and accesses IP address information used in above-mentioned domain name;By above-mentioned domain name, on State the mark and the corresponding storage of above-mentioned IP address information of application.
In the system of tracking application access provided by this specification embodiment, terminal device be can also carry out in Fig. 8-Fig. 9 The method that terminal device executes, and terminal device is realized in Fig. 8-embodiment illustrated in fig. 9 function, figure can also be performed in server The method that server executes in 10, and server is realized in the function of embodiment illustrated in fig. 10, details are not described herein.
The system for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
Further, correspond to based on method shown in this specification embodiment, be based on identical thinking, this specification is real It applies example and additionally provides a kind of equipment for tracking application access, as shown in figure 16.Wherein, the equipment of the tracking application access can answer For the terminal device in above-described embodiment.
The equipment for tracking application access can generate bigger difference because configuration or performance are different, may include one or More than one processor 1601 and memory 1602 can store one or more storage applications in memory 1602 Program or data.Wherein, memory 1602 can be of short duration storage or persistent storage.It is stored in the application program of memory 1602 It may include one or more modules (diagram is not shown), each module may include in the equipment to tracking application access Series of computation machine executable instruction information.Further, processor 1601 can be set to communicate with memory 1602, The series of computation machine executable instruction information in memory 1602 is executed in the equipment of tracking application access.Tracking application is visited The equipment asked can also include one or more power supplys 1603, one or more wired or wireless network interfaces 1604, one or more input/output interfaces 1605, one or more keyboards 1606 etc..
In a specific embodiment, the equipment for tracking application access include memory and one or one with On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes For carrying out following computer executable instructions information:
The access for sending target application to server tracks request;It wherein, include target application in access tracking request Mark;
It receives server and the domain name identification that request returns is tracked according to access;
By domain name corresponding to access domain name identification, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, computer executable instructions information when executed, passes through domain name corresponding to access domain name identification, inspection Whether the intermediate certificate for surveying domain name is buffered, comprising:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server; If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is Through being buffered.
Optionally, computer executable instructions information when executed, passes through the corresponding domain of access domain name mark Name, detect domain name intermediate certificate it is whether buffered before, can also carry out following steps:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, computer executable instructions information when executed, the access tracking of target application is sent to server Request, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, instruction according to testing result, determines whether domain name is accessed by target application, comprising:
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
Optionally, computer executable instructions information further includes building with server in access tracking request when executed It is vertical to connect used Internet protocol IP address information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
Optionally, computer executable instructions information further includes terminal device phase in access tracking request when executed Close information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name mark.
The equipment for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name identification corresponding to target application is obtained, and by domain name corresponding to access domain name identification, detects the centre of the domain name Whether certificate is buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, The tracking of domain name accessed to target application is realized, and is not influenced by system update, stability is preferable;Additionally, it is contemplated that It is steps necessary to caching intermediate certificate, therefore this programme will not be prevented by system.
Corresponding to based on method shown in this specification embodiment, it is based on identical thinking, this specification embodiment also mentions A kind of equipment for tracking application access is supplied, as shown in figure 16.Wherein, the equipment of the tracking application access can be applied to above-mentioned On server in embodiment.
In a specific embodiment, the equipment for tracking application access include memory and one or one with On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes For carrying out following computer executable instructions information:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, mesh is carried in access tracking request Mark the mark of application;
Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;
Domain name identification is returned into terminal device, so that terminal device passes through domain name corresponding to access domain name identification, inspection Whether the intermediate certificate for surveying domain name is buffered;And instruction according to testing result, determine domain name whether by target application institute Access.
Optionally, computer executable instructions information when executed, receiving terminal apparatus send target application visit Before asking tracking request, method further include:
Receive the domain name access request that each terminal device is sent;
Domain name identification corresponding to domain name is determined according to domain name access request and accesses the mark of the application of domain name;
By the corresponding storage of the mark of domain name identification and application.
Optionally, when executed, the access that receiving terminal apparatus is sent tracks request to computer executable instructions information Before, method further include:
It is requested to determine IP address information used in access domain name according to domain name access;
By domain name identification, the mark of application and the corresponding storage of IP address information.
The equipment for the tracking application access that this specification embodiment provides, by the corresponding domain name identification of the mark of target application Terminal device is returned to, in this way, terminal device detects the intermediate certificate of the domain name by domain name corresponding to access domain name identification It is whether buffered, if buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes The tracking of domain name accessed to target application, and do not influenced by system update, stability is preferable;Furthermore, it is contemplated that slow Depositing intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Corresponding to based on method shown in this specification embodiment, it is based on identical thinking, this specification embodiment also mentions A kind of equipment for tracking application access is supplied, as shown in figure 16.Wherein, the equipment of the tracking application access can be applied to above-mentioned On terminal device in embodiment.
In a specific embodiment, the equipment for tracking application access include memory and one or one with On program, perhaps more than one program is stored in memory and one or more than one program can wrap for one of them Include one or more modules, and each module may include that series of computation machine in equipment to tracking application access can Information is executed instruction, and is configured to execute this by one or more than one processor or more than one program includes For carrying out following computer executable instructions information:
The access for sending target application to server tracks request;It wherein, include above-mentioned mesh in above-mentioned access tracking request Mark the mark of application;
It receives above-mentioned server and the domain name that request returns is tracked according to above-mentioned access;
By accessing above-mentioned domain name, whether the intermediate certificate for detecting above-mentioned domain name is buffered;
Instruction according to testing result, determines whether above-mentioned domain name is accessed by above-mentioned target application.
Optionally, computer executable instructions information when executed, above by above-mentioned domain name is accessed, detects above-mentioned domain Whether the intermediate certificate of name is buffered, comprising:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so, Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name Certificate is buffered.
The equipment for the tracking application access that this specification embodiment provides, can be from server according to the mark of target application Domain name corresponding to target application is obtained, and by accessing the domain name, whether the intermediate certificate for detecting the domain name is buffered, If buffered, it is determined that the domain name is accessed by target application;Through the above scheme, it realizes and target application is visited It asks the tracking of domain name, and is not influenced by system update, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is necessary Step, therefore this programme will not be prevented by system.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down Journey:
The access for sending target application to server tracks request;It wherein, include target application in access tracking request Mark;
It receives server and the domain name identification that request returns is tracked according to access;
By domain name corresponding to access domain name identification, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by target application.
Optionally, the computer executable instructions information of storage medium storage passes through access when being executed by processor Whether domain name corresponding to domain name identification, the intermediate certificate for monitoring domain name are buffered, comprising:
Domain name corresponding to domain name identification is accessed, and monitors whether to request intermediate certificate corresponding to domain name to server; If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed It deposits;
Alternatively,
Domain name corresponding to domain name identification is accessed, and monitors whether to receive centre corresponding to the domain name of server return Certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is Through being buffered.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, by accessing domain name The corresponding domain name of mark, detect domain name intermediate certificate it is whether buffered before, can also carry out following steps:
According to preset domain name combination rule, above-mentioned domain name identification group is combined into domain name.
Optionally, the computer executable instructions of storage medium storage are sent when being executed by processor to server Access tracking request, comprising:
Access tracking request is sent to server by the first application of terminal device;
Correspondingly, instruction according to testing result, determines whether domain name is accessed by target application, comprising:
Instruction according to testing result, determines whether domain name is accessed by the target application on terminal device;
Wherein, the first application and target application are the different application on terminal device.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, access tracking request In further include that Internet protocol IP address information used in connection is established with server;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain name identification that server is inquired according to the mark and IP address information of target application.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, access tracking request In further include terminal device relevant information;
The domain name identification that request returns is tracked according to access correspondingly, receiving server, comprising:
Receive the domain that server is inquired according to the mark of target application, IP address information and terminal device relevant information Name mark.
The computer executable instructions for the storage medium storage that this specification embodiment provides are when being executed by processor, root Domain name identification corresponding to target application can be obtained from server according to the mark of target application, and passes through access domain name identification institute Corresponding domain name, whether the intermediate certificate for detecting the domain name is buffered, if buffered, it is determined that the domain name is by mesh Mark application is accessed;Through the above scheme, the tracking of domain name accessed to target application is realized, and not by system update It influences, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be hindered by system Only.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down Journey:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, mesh is carried in access tracking request Mark the mark of application;
Request, which is tracked, according to access searches domain name identification corresponding with access tracking request;
Domain name identification is returned into terminal device, so that terminal device passes through domain name corresponding to access domain name identification, inspection Whether the intermediate certificate for surveying domain name is buffered;And instruction according to testing result, determine domain name whether by target application institute Access.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, receiving terminal apparatus Before the access tracking request of transmission, method further include:
Receive the domain name access request that each terminal device is sent;
Domain name identification corresponding to domain name is determined according to domain name access request and accesses the mark of the application of domain name;
By the corresponding storage of the mark of domain name identification and application.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, receiving terminal apparatus Before the access tracking request of transmission, method further include:
It is requested to determine IP address information used in access domain name according to domain name access;
By domain name identification, the mark of application and the corresponding storage of IP address information.
The computer executable instructions for the storage medium storage that this specification embodiment provides, will when being executed by processor The corresponding domain name identification of the mark of target application returns to terminal device, in this way, terminal device is right by access domain name identification institute The domain name answered, whether the intermediate certificate for detecting the domain name is buffered, if buffered, it is determined that the domain name is by target Using being accessed;Through the above scheme, the tracking of domain name accessed to target application is realized, and not by the shadow of system update It rings, stability is preferable;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
Further, based on method shown in this specification embodiment, this specification embodiment additionally provides a kind of storage Medium, for storing computer executable instructions information, in a kind of specific embodiment, which can be USB flash disk, light Disk, hard disk etc., the computer executable instructions information of storage medium storage are able to achieve when being executed by processor to flow down Journey:
The access for sending target application to server tracks request;It wherein, include above-mentioned mesh in above-mentioned access tracking request Mark the mark of application;
It receives above-mentioned server and the domain name that request returns is tracked according to above-mentioned access;
By accessing above-mentioned domain name, whether the intermediate certificate for detecting above-mentioned domain name is buffered;
Instruction according to testing result, determines whether above-mentioned domain name is accessed by above-mentioned target application.
Optionally, the storage medium storage computer executable instructions information when being executed by processor, above by Above-mentioned domain name is accessed, whether the intermediate certificate for detecting above-mentioned domain name is buffered, comprising:
Above-mentioned domain name is accessed, and monitors whether to request intermediate certificate corresponding to above-mentioned domain name to above-mentioned server;If so, Then determine that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to above-mentioned domain name is It is buffered;
Alternatively,
Above-mentioned domain name is accessed, and monitors whether to receive intermediate card corresponding to the above-mentioned domain name that above-mentioned server returns Book;If so, determining that intermediate certificate corresponding to above-mentioned domain name is not buffered;Otherwise, it determines centre corresponding to above-mentioned domain name Certificate is buffered.
The computer executable instructions information for the storage medium storage that this specification embodiment provides is being executed by processor When, domain name corresponding to target application can be obtained from server according to the mark of target application, and by accessing the domain name, inspection Whether the intermediate certificate for surveying the domain name is buffered, if buffered, it is determined that the domain name is accessed by target application; Through the above scheme, realize the tracking of domain name accessed to target application, and do not influenced by system update, stability compared with It is good;Furthermore, it is contemplated that caching intermediate certificate is steps necessary, therefore this programme will not be prevented by system.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, the address MicrochIP PIC18F26K20 and Silicone Labs C8051F320, Memory Controller are also implemented as a part of the control logic of memory.Those skilled in the art Know, it, completely can be by the way that method and step be carried out other than realizing controller in a manner of pure computer readable program code Programming in logic comes so that controller is with logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller Deng form realize identical function.Therefore this controller is considered a kind of hardware component, and includes in it The structure in hardware component can also be considered as realizing the device of various functions.It or even, can will be for realizing various The device of function is considered as either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is reference according to the method for this specification embodiment, the stream of equipment (system) and computer program product Journey figure and/or block diagram describe.It should be understood that can be by computer program instructions information realization flowchart and/or the block diagram The combination of process and/or box in each flow and/or block and flowchart and/or the block diagram.It can provide these calculating Machine program instruction information is to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices Processor is to generate a machine, so that the instruction executed by computer or the processor of other programmable data processing devices Information generates specifies for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram Function device.
These computer program instructions information, which may also be stored in, is able to guide computer or other programmable data processing devices In computer-readable memory operate in a specific manner, so that command information stored in the computer readable memory produces Raw includes the manufacture of command information device, the command information device realize in one or more flows of the flowchart and/or The function of being specified in one or more blocks of the block diagram.
These computer program instructions information also can be loaded onto a computer or other programmable data processing device, so that Series of operation steps are executed on a computer or other programmable device to generate computer implemented processing, thus calculating The command information that is executed on machine or other programmable devices provide for realizing in one or more flows of the flowchart and/or The step of function of being specified in one or more blocks of the block diagram.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction information, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to Herein defines, and computer-readable medium does not include temporary computer readable media (transitory media), such as modulation Data-signal and carrier wave.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can computer executable instructions information it is general up and down described in the text, such as Program module.Generally, program module include routines performing specific tasks or implementing specific abstract data types, it is program, right As, component, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environment In, by executing task by the connected remote processing devices of communication network.In a distributed computing environment, program module It can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (25)

1. a kind of method for tracking application access, which comprises
The access for sending target application to server tracks request;It wherein, include that the target is answered in the access tracking request Mark;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
2. the method as described in claim 1, the domain name corresponding by access domain name mark, detect domain name Intermediate certificate it is whether buffered, comprising:
The corresponding domain name of domain name mark is accessed, and monitors whether to request to the server in corresponding to domain name Between certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines corresponding to domain name Intermediate certificate is buffered;
Alternatively,
The corresponding domain name of domain name mark is accessed, and monitors whether that the domain name institute for receiving the server return is right The intermediate certificate answered;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines domain name institute Corresponding intermediate certificate is buffered.
3. method according to claim 1 or 2, the domain name corresponding by access domain name mark, described in detection Before whether the intermediate certificate of domain name is buffered, the method also includes:
It is domain name by domain name identifier combination according to preset domain name combination rule.
4. method according to claim 1 or 2, the access for sending target application to server tracks request, comprising:
The access tracking request is sent to server by the first application of terminal device;
Correspondingly, the instruction according to testing result, determines whether domain name is accessed by the target application, comprising:
According to the instruction of the testing result, determine whether domain name is visited by the target application on the terminal device It asks;
Wherein, first application and the target application are the different application on the terminal device.
5. it is method according to claim 1 or 2, it further include that connection institute is established with the server in the access tracking request The Internet protocol IP address information used;
Correspondingly, the domain name identification for receiving the server and being returned according to the access tracking request, comprising:
Receive the domain name identification that the server is inquired according to the mark of the target application and the IP address information.
6. method as claimed in claim 5, it further includes terminal device relevant information that the access, which tracks in request,;
Correspondingly, the domain name identification for receiving the server and being returned according to the access tracking request, comprising:
It is related to the terminal device according to the mark of the target application, the IP address information to receive the server The domain name identification that information is inquired.
7. a kind of method for tracking application access, which comprises
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request State the mark of target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device is right by access domain name mark institute Whether the domain name answered, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine the domain Whether name is accessed by the target application.
8. before the access tracking request for the target application that the method for claim 7, the receiving terminal apparatus is sent, The method also includes:
Receive the domain name access request that each terminal device is sent;
According to domain name access request determine domain name corresponding to domain name identification and access the application of domain name Mark;
Domain name is identified into storage corresponding with the mark of the application.
9. method according to claim 8, before the access tracking request that the receiving terminal apparatus is sent, the method is also Include:
It is determined according to domain name access request and accesses IP address information used in domain name;
By domain name mark, the mark of the application and the corresponding storage of the IP address information.
10. a kind of method for tracking application access, which comprises
The access for sending target application to server tracks request;It wherein, include that the target is answered in the access tracking request Mark;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
It is described by accessing domain name 11. method as claimed in claim 10, detect domain name intermediate certificate whether It is buffered, comprising:
Domain name is accessed, and monitors whether to request intermediate certificate corresponding to domain name to the server;If so, really Determine intermediate certificate corresponding to domain name not to be buffered;Otherwise, it determines intermediate certificate corresponding to domain name is delayed It deposits;
Alternatively,
Domain name is accessed, and monitors whether to receive intermediate certificate corresponding to the domain name that the server returns;If It is, it is determined that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines intermediate certificate corresponding to domain name is Through being buffered.
12. a kind of device for tracking application access, described device include:
Sending module, the access for sending target application to server track request;Wherein, it is wrapped in the access tracking request Include the mark of the target application;
First receiving module, the domain name identification returned for receiving the server according to the access tracking request;
Detection module, for the domain name corresponding by access domain name mark, detect domain name intermediate certificate whether It is buffered;
First determining module determines whether domain name is accessed by the target application for instruction according to testing result.
13. device as claimed in claim 12, the detection module, are specifically used for:
The corresponding domain name of domain name mark is accessed, and monitors whether to request to the server in corresponding to domain name Between certificate;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines corresponding to domain name Intermediate certificate is buffered;
Alternatively,
The corresponding domain name of domain name mark is accessed, and monitors whether that the domain name institute for receiving the server return is right The intermediate certificate answered;If so, determining that intermediate certificate corresponding to domain name is not buffered;Otherwise, it determines domain name institute Corresponding intermediate certificate is buffered.
14. device as described in claim 12 or 13, described device further include:
Composite module, for being domain name by domain name identifier combination according to preset domain name combination rule.
15. device as described in claim 12 or 13, the sending module, are specifically used for:
The access tracking request is sent to server by the first application of terminal device;
First determining module, is specifically used for:
According to the instruction of the testing result, determine whether domain name is visited by the target application on the terminal device It asks;
Wherein, first application and the target application are the different application on the terminal device.
16. a kind of device for tracking application access, described device include:
Second receiving module, the access tracking request for the target application that receiving terminal apparatus is sent;Wherein, it is described access with The mark of the target application is carried in track request;
Searching module searches domain name identification corresponding with access tracking request for tracking request according to the access;
Return module, for domain name mark to be returned to the terminal device, so that the terminal device passes through access institute Domain name corresponding to domain name identification is stated, whether the intermediate certificate for detecting domain name is buffered;And according to testing result Instruction, determines whether domain name is accessed by the target application.
17. a kind of device for tracking application access, described device include:
Sending module, the access for sending target application to server track request;Wherein, it is wrapped in the access tracking request Include the mark of target application;
First receiving module, the domain name returned for receiving the server according to the access tracking request;
Detection module, for by access domain name, whether the intermediate certificate for detecting domain name to be buffered;
First determining module determines whether domain name is accessed by the target application for instruction according to testing result.
18. a kind of system for tracking application access, including server and terminal device;
The terminal device, the access for sending target application to the server track request;Wherein, the access tracking It include the mark of the target application in request;
The server, the access sent for receiving terminal apparatus track request;It is looked into according to access tracking request Look for domain name identification corresponding with access tracking request;Domain name mark is returned into the terminal device;
The terminal device is also used to receive the domain name identification that the server is returned according to the access tracking request;Pass through The corresponding domain name of domain name mark is accessed, whether the intermediate certificate for detecting domain name is buffered;It is tied according to detection The instruction of fruit, determines whether domain name is accessed by the target application.
19. a kind of system for tracking application access, including server and terminal device;
The terminal device, the access for sending target application to the server track request;Wherein, the access tracking It include the mark of the target application in request;
The server, the access sent for receiving terminal apparatus track request;It is looked into according to access tracking request Look for domain name corresponding with access tracking request;Domain name is returned into the terminal device;
The terminal device is also used to receive the domain name that the server is returned according to the access tracking request;Pass through access Whether domain name, the intermediate certificate for detecting domain name are buffered;Instruction according to testing result, determines domain name Whether accessed by the target application.
20. a kind of equipment for tracking application access, the equipment include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed Device:
The access for sending target application to server tracks request;It wherein, include that the target is answered in the access tracking request Mark;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
21. a kind of equipment for tracking application access, the equipment include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed Device:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request State the mark of target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device is right by access domain name mark institute Whether the domain name answered, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine the domain Whether name is accessed by the target application.
22. a kind of equipment for tracking application access, the equipment include:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed Device:
The access for sending target application to server tracks request;It wherein, include target application in the access tracking request Mark;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
23. a kind of storage medium, for storing computer executable instructions, the executable instruction is realized following when executed Process:
The access for sending target application to server tracks request;It wherein, include that the target is answered in the access tracking request Mark;
Receive the domain name identification that the server is returned according to the access tracking request;
By the corresponding domain name of access domain name mark, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
24. a kind of storage medium, for storing computer executable instructions, the executable instruction is realized following when executed Process:
The access for the target application that receiving terminal apparatus is sent tracks request;Wherein, it is carried in the access tracking request State the mark of target application;
Request, which is tracked, according to the access searches domain name identification corresponding with access tracking request;
Domain name mark is returned into the terminal device, so that the terminal device is right by access domain name mark institute Whether the domain name answered, the intermediate certificate for detecting domain name are buffered;And instruction according to testing result, determine the domain Whether name is accessed by the target application.
25. a kind of storage medium, for storing computer executable instructions, the executable instruction is realized following when executed Process:
The access for sending target application to server tracks request;It wherein, include target application in the access tracking request Mark;
Receive the domain name that the server is returned according to the access tracking request;
By accessing domain name, whether the intermediate certificate for detecting domain name is buffered;
Instruction according to testing result, determines whether domain name is accessed by the target application.
CN201811307999.9A 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access Active CN109495464B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811307999.9A CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811307999.9A CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Publications (2)

Publication Number Publication Date
CN109495464A true CN109495464A (en) 2019-03-19
CN109495464B CN109495464B (en) 2021-05-28

Family

ID=65693828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811307999.9A Active CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Country Status (1)

Country Link
CN (1) CN109495464B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116389404A (en) * 2023-06-06 2023-07-04 阿里云计算有限公司 Domain name resolution method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090183226A1 (en) * 2002-12-26 2009-07-16 Dean Thomas M Systems and Methods for Identity-Based Communication Gate for Social Networks
CN107347059A (en) * 2016-05-06 2017-11-14 腾讯科技(深圳)有限公司 The method and detection terminal of a kind of Hole Detection
CN107707607A (en) * 2017-07-24 2018-02-16 上海壹账通金融科技有限公司 Using access method, device, computer equipment and storage medium
CN107968783A (en) * 2017-11-30 2018-04-27 腾讯科技(深圳)有限公司 Flow managing method, device, terminal and computer-readable recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090183226A1 (en) * 2002-12-26 2009-07-16 Dean Thomas M Systems and Methods for Identity-Based Communication Gate for Social Networks
CN107347059A (en) * 2016-05-06 2017-11-14 腾讯科技(深圳)有限公司 The method and detection terminal of a kind of Hole Detection
CN107707607A (en) * 2017-07-24 2018-02-16 上海壹账通金融科技有限公司 Using access method, device, computer equipment and storage medium
CN107968783A (en) * 2017-11-30 2018-04-27 腾讯科技(深圳)有限公司 Flow managing method, device, terminal and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王持恒等: ""基于宿主权限的移动广告漏洞攻击技术"", 《软件学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116389404A (en) * 2023-06-06 2023-07-04 阿里云计算有限公司 Domain name resolution method, device and equipment
CN116389404B (en) * 2023-06-06 2023-08-29 阿里云计算有限公司 Domain name resolution method, device and equipment

Also Published As

Publication number Publication date
CN109495464B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
US9305019B2 (en) Method of associating user related data with spatial hierarchy identifiers for efficient location-based processing
CN109040343B (en) Domain name resolution method and device, computer readable storage medium and electronic equipment
CN109145240A (en) A kind of page access method, apparatus and system based on barcode scanning operation
CN106970873A (en) Mock method of testings, apparatus and system on line
ATE335241T1 (en) ACCESSING DATA STORED WITH AN BROKER FROM A SERVICE
CN108683695A (en) Hot spot access processing method, cache access agent equipment and distributed cache system
ATE286275T1 (en) ONLINE DEVELOPMENT OF APPLICATIONS
CN104391690A (en) Application development system and method
CN109493564A (en) A kind of alarm method, apparatus and system
CN107423037B (en) Application program interface positioning method and device
CN110471629A (en) A kind of method, apparatus of dynamic capacity-expanding, storage medium, equipment and system
CN112650890A (en) Graph database-based encrypted currency flow direction tracking method and device
CN110457610A (en) Information recommendation method, device, terminal, server and storage medium
CN109389386A (en) A kind of barcode scanning control method, apparatus and system
CN109710832B (en) Method and equipment for searching hosted program
CN109086414B (en) Method, apparatus and storage medium for searching blockchain data
CN109495464A (en) Track method, apparatus, equipment and the system of application access
CN103155604A (en) Method and system for providing a stateful experience while accessing content using a global textsite platform
CN109460312A (en) Request the processing method and processing device of failure
CN109213940B (en) Method, storage medium, equipment and system for realizing user position calculation under big data
CN112836093A (en) Data query method and device, electronic equipment and storage medium
CN107908552A (en) A kind of test method based on link, device and equipment
CN109600418A (en) Track method, apparatus, equipment and the system of application access
US9858355B1 (en) Search engine optimization based upon most popular search history
CN114629951A (en) Address service switching method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240222

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Advanced Nova Technology (Singapore) Holdings Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands

TR01 Transfer of patent right