CN109495464B - Method, device, equipment and system for tracking application access - Google Patents

Method, device, equipment and system for tracking application access Download PDF

Info

Publication number
CN109495464B
CN109495464B CN201811307999.9A CN201811307999A CN109495464B CN 109495464 B CN109495464 B CN 109495464B CN 201811307999 A CN201811307999 A CN 201811307999A CN 109495464 B CN109495464 B CN 109495464B
Authority
CN
China
Prior art keywords
domain name
identifier
target application
application
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811307999.9A
Other languages
Chinese (zh)
Other versions
CN109495464A (en
Inventor
吴建雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Nova Technology Singapore Holdings Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811307999.9A priority Critical patent/CN109495464B/en
Publication of CN109495464A publication Critical patent/CN109495464A/en
Application granted granted Critical
Publication of CN109495464B publication Critical patent/CN109495464B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the specification provides a method, a device, equipment and a system for tracking application access, wherein the method comprises the following steps: sending an access tracking request of a target application to a server; wherein, the access tracking request comprises the identification of the target application; receiving a domain name identifier returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.

Description

Method, device, equipment and system for tracking application access
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method, an apparatus, a device, and a system for tracking application access.
Background
With the continuous development of information technology, terminal devices such as mobile phones, tablet computers and computers are widely applied to life and work of people, and become indispensable components of life and work of people. In order to provide various services such as shopping, chatting, information inquiry, navigation, and the like to people, generally, a plurality of applications are installed on a terminal device. When running, each application program generates data related to the running of the application program, and the data is stored in a system of the terminal equipment.
In order to ensure the stability and security of the terminal device system operation and avoid the situation that some applications maliciously access the data of other applications, a data access isolation mechanism, such as a sandbox, is generally provided between different applications. Thus, each application program can only access its own data, but cannot access the data of other application programs on the terminal device. However, in practical applications, in order to promote information or perform related tests to users, it may be necessary to track links accessed by some applications.
Therefore, it is necessary to provide a technical solution for tracking links accessed by a target application.
Disclosure of Invention
The embodiment of the specification aims to provide a method, a device, equipment and a system for tracking application access so as to track links accessed by a target application.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
an embodiment of the present specification provides a method for tracking application access, including:
sending an access tracking request of a target application to a server; wherein the access tracking request comprises an identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides a method for tracking application access, where the method includes:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request according to the access tracking request;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides a method for tracking application access, where the method includes:
sending an access tracking request of a target application to a server; wherein the access tracking request comprises an identifier of the target application;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
the sending module is used for sending an access tracking request of the target application to the server; wherein the access tracking request comprises an identifier of the target application;
the first receiving module is used for receiving the domain name identifier returned by the server according to the access tracking request;
the detection module is used for detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and the first determining module is used for determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
the second receiving module is used for receiving an access tracking request of the target application sent by the terminal equipment; wherein, the access tracking request carries the identifier of the target application;
the searching module is used for searching the domain name identifier corresponding to the access tracking request according to the access tracking request;
a returning module, configured to return the domain name identifier to the terminal device, so that the terminal device detects whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
the sending module is used for sending an access tracking request of the target application to the server; wherein, the access tracking request comprises the identification of the target application;
the first receiving module is used for receiving the domain name returned by the server according to the access tracking request;
the detection module is used for detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name;
and the first determining module is used for determining whether the domain name is accessed by the target application according to the indication of the detection result.
The embodiment of the specification also provides a system for tracking application access, which comprises a server and terminal equipment;
the terminal device is used for sending an access tracking request of a target application to the server; wherein the access tracking request comprises an identifier of the target application;
the server is used for receiving an access tracking request sent by the terminal equipment; searching a domain name identifier corresponding to the access tracking request according to the access tracking request; returning the domain name identification to the terminal equipment;
the terminal device is further configured to receive a domain name identifier returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
The embodiment of the specification also provides a system for tracking application access, which comprises a server and terminal equipment;
the terminal device is used for sending an access tracking request of a target application to the server; wherein the access tracking request comprises an identifier of the target application;
the server is used for receiving the access tracking request sent by the terminal equipment; searching a domain name corresponding to the access tracking request according to the access tracking request; returning the domain name to the terminal equipment;
the terminal device is further configured to receive a domain name returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an access tracking request of a target application to a server; wherein the access tracking request comprises an identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request according to the access tracking request;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
An embodiment of the present specification further provides an apparatus for tracking application access, where the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an access tracking request of a target application to a server; wherein, the access tracking request comprises the identification of the target application;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
The present specification, embodiments, provide a storage medium for storing computer-executable instructions, which when executed, implement the following flow:
sending an access tracking request of a target application to a server; wherein the access tracking request comprises an identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Embodiments of the present specification also provide a storage medium for storing computer-executable instructions, which when executed implement the following processes:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request according to the access tracking request;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Embodiments of the present specification also provide a storage medium for storing computer-executable instructions, which when executed implement the following processes:
sending an access tracking request of a target application to a server; wherein, the access tracking request comprises the identification of the target application;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
According to the technical scheme in the embodiment, the domain name identification corresponding to the target application can be obtained from the server according to the identification of the target application, and whether the intermediate certificate of the domain name is cached or not is detected by accessing the domain name corresponding to the domain name identification, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
FIG. 1 is a flowchart of a method for tracking application access according to an embodiment of the present disclosure;
FIG. 2 is a second flowchart of a method for tracking application access according to an embodiment of the present disclosure;
FIG. 3 is a third flowchart of a method for tracking application access according to an embodiment of the present disclosure;
FIG. 4 is a fourth flowchart of a method for tracking application access provided by embodiments of the present description;
FIG. 5 is a fifth flowchart of a method for tracking application access provided by embodiments of the present description;
FIG. 6 is an interaction flow diagram of a method for tracking application access provided by an embodiment of the present specification;
FIG. 7 is a second interaction flow diagram of a method for tracking application access provided by embodiments of the present description;
FIG. 8 is a sixth flowchart of a method for tracking application access provided by embodiments of the present description;
FIG. 9 is a seventh flowchart of a method for tracking application access provided by embodiments of the present description;
FIG. 10 is an eighth flowchart of a method for tracking application access provided by embodiments of the present description;
FIG. 11 is a third interaction flow diagram of a method for tracking application access provided by embodiments of the present description;
FIG. 12 is a block diagram illustrating an exemplary embodiment of an apparatus for tracking application access;
fig. 13 is a second schematic diagram illustrating a module composition of an apparatus for tracking application access according to an embodiment of the present disclosure;
fig. 14 is a third schematic block diagram illustrating a module composition of an apparatus for tracking application access according to an embodiment of the present disclosure;
FIG. 15 is a block diagram illustrating a system for tracking application access provided by an embodiment of the present specification;
fig. 16 is a schematic structural diagram of an apparatus for tracking application access according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The idea of the embodiment of this specification is that, if a domain name is accessed by an application, an intermediate certificate corresponding to the domain name is cached, and therefore, by detecting whether the intermediate certificate corresponding to the domain name is cached, it is possible to detect whether the domain name is accessed by the application. Based on this idea, embodiments of the present specification provide a method, an apparatus, a device, and a system for tracking application access, which will be described in detail below.
Fig. 1 is a flowchart of a method for tracking application access according to an embodiment of the present disclosure, where the method is applied to a terminal device, that is, an execution subject of the method according to the embodiment of the present disclosure is a terminal device, where the terminal device may be a mobile phone, a tablet computer, a computer, or a like device. In particular, the method provided by the embodiment of the present specification may be applied to an apparatus for tracking application access on a terminal device. The method shown in fig. 1, at least comprises the following steps:
step 102, sending an access tracking request of a target application to a server; wherein, the access tracking request includes the identification of the target application.
The domain name identifier is an identifier (for example, may be called code) for marking a domain name, and specifically may be composed of letters, or numbers, or a combination of letters and numbers. For example, if a domain name is www.ABC.com, the domain name identifier corresponding to the domain name may be information such as asd, 123, or 12 a; alternatively, the domain name identifier is a code obtained by coding using a certain coding algorithm.
In a specific embodiment, the domain name identifier may belong to a part of a domain name, such as a URL of the domain name. For example, if a certain domain name is abc.tmall.com, the domain name identifier corresponding to the domain name is ABC.
In this embodiment of the present specification, a domain name identifier and an identifier of a target application may be stored in a server in advance, or a domain name identifier and an identifier of a target application may be stored in a database in correspondence. One possible form of storage is shown in table 1.
TABLE 1
Identification of applications Domain name identification
Application identifier 1 ABC
Application identification 2 Mkn
Application identifier 1 Asd
Application identification 4 ABC
Specifically, different applications may correspond to the same domain name identifier, and the same application may also correspond to a plurality of different domain name identifiers, as shown in table 1 above. Of course, in table 1, the above domain name identifier and the identifier of the application are exemplary illustrations, and do not limit the embodiments of the present specification.
In this embodiment of the present specification, since the domain name accessed by the target application is to be tracked, the access tracking request sent to the server carries the identifier of the target application, so that the domain name identifier corresponding to the target application can be obtained.
In this embodiment of the present specification, the identifier of the target application may be User Agent (UA) information of the target application, and specifically, the UA information of the target application may include information that can identify the target application, such as a version number of the target application.
And 104, receiving the domain name identifier returned by the server according to the access tracking request.
In this embodiment, after receiving an access tracking request sent by a terminal device, a server searches for a domain name identifier corresponding to the domain name identifier request according to the domain name identifier request.
Specifically, if the domain name identifier and the application identifier are stored in the server in a corresponding manner, after the server receives an access tracking request sent by the terminal device, the domain name identifier corresponding to the identifier of the target application is searched from the mapping relationship between the domain name identifier and the application identifier stored in the server according to the identifier of the target application carried in the request, and the searched domain name identifier is returned to the terminal device.
In another specific embodiment, if the domain name identifier and the application identifier are stored in the database, after the server receives an access tracking request sent by the terminal device, the server searches the domain name identifier corresponding to the target application identifier from the database according to the target application identifier carried in the request, and returns the domain name identifier searched from the database to the terminal device.
For convenience of understanding, the following description will take the identifier of the target application as the application identifier 1, and look up the domain name identifier corresponding to the application identifier 1 from the above table 1 as an example, and in this example, the above table 1 is stored in the database.
For example, if the identifier of the target application carried in the access tracking request sent by the terminal device to the server is application identifier 1, after the server receives the access tracking request sent by the terminal device, the server matches application identifier 1 with table 1 above to find the domain name identifier corresponding to application identifier 1 in table 1, and the domain names corresponding to application identifier 1 in table 1 are "ABC" and "Asd", so that the server returns "ABC" and "Asd" as domain name identifiers to the terminal device.
And step 106, detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier.
And step 108, determining whether the domain name is accessed by the target application according to the indication of the detection result.
Specifically, if the domain name corresponding to a certain domain name identifier is accessed by the target application, the intermediate certificate corresponding to the domain name is cached by the target application client, so that the intermediate certificate corresponding to the target application exists on the terminal device, and therefore, whether the domain name is accessed by the target application can be determined by detecting whether the intermediate certificate of the certain domain name is cached. If a certain domain name identifier is accessed by a target application through HHTPS, the above-mentioned intermediate certificate is an intermediate certificate used by a hypertext Transfer Protocol over Secure Socket Layer (HTTPS) certificate of the domain name.
Therefore, in this embodiment of the present specification, if the detection result obtained in step 106 indicates that the intermediate certificate of the domain name has been cached, it may be determined that the domain name is accessed by the target application; if the detection result indicates that the intermediate certificate of the domain name is not cached, it may be determined that the domain name is not accessed by the target application.
In addition, it should be noted that, in step 108, it may be determined whether the domain name is accessed by a target application of the terminal device.
The detailed implementation of step 106 will be described in detail below.
In addition, in the step 106, the detecting whether the intermediate certificate corresponding to the domain name has been cached by accessing the domain name corresponding to each domain name identifier may be implemented in at least two ways, which will be discussed in detail below.
In a first mode
Accessing a domain name corresponding to each domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from a server; if so, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Specifically, if the target application does not access the domain name, the intermediate certificate corresponding to the domain name does not exist, and at this time, if the domain name is accessed, the terminal device requests the server for the intermediate certificate corresponding to the domain name. Therefore, in this embodiment of the present specification, it may be determined whether a domain name is accessed by a target application by monitoring whether an intermediate certificate corresponding to the domain name has been cached.
If the request for the intermediate certificate corresponding to the domain name from the server is not monitored, the intermediate certificate corresponding to the domain name is cached by the terminal device, so that the domain name identifier can be determined to be accessed by the target application of the terminal device; if the condition that the intermediate certificate corresponding to the domain name is requested from the server is monitored, the condition that the intermediate certificate corresponding to the domain name is not cached by the terminal equipment is indicated, and therefore the domain name is determined not to be accessed by the target application.
Mode two
Accessing a domain name corresponding to each domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by a server is received; if so, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Specifically, if the domain name is not accessed by the target application, the intermediate certificate corresponding to the domain name does not exist, and at this time, if the domain name is accessed, the terminal device requests the server for the intermediate certificate corresponding to the domain name, so that the server returns the intermediate certificate corresponding to the domain name to the terminal device, and therefore, whether the intermediate certificate has been cached by the terminal device can be judged in a manner of monitoring whether the server returns the intermediate certificate corresponding to the domain name.
If the intermediate certificate corresponding to the domain name returned by the server is not monitored, the intermediate certificate corresponding to the domain name is cached by the terminal device, so that the domain name corresponding to the domain name identifier can be determined to be accessed by the target application of the terminal device; if the intermediate certificate corresponding to the domain name returned by the server is monitored, the intermediate certificate corresponding to the domain name is cached by the terminal device, so that the domain name corresponding to the domain name identifier is determined not to be accessed by the target application of the terminal device.
In this embodiment of the present specification, in the above manner, it can be determined which domain names are accessed by the target application. Specifically, after the domain name accessed by the target application is determined, the domain name identifier of the domain name accessed by the target application may be directly displayed on the terminal device, or the determined domain name identifier may be output as log information, or may be sent to other components requiring the determination result.
Of course, the above description only illustrates some processing manners after the domain name identifier accessed by the target application is determined, and of course, the processing manner of the domain name identifier accessed by the determined target application is not limited thereto, and the above description is only an exemplary description, and does not limit the embodiments of the present specification.
In addition, in this embodiment of the present specification, since the step 106 needs to access the domain name corresponding to the domain name identifier, before the step 106 is executed, the domain name corresponding to the domain name identifier needs to be acquired. Therefore, before accessing the domain name corresponding to the domain name identifier and detecting whether the intermediate certificate of the domain name has been cached, the method provided in this embodiment further includes:
and combining the domain name identifications into a domain name according to a preset domain name combination rule.
The preset domain name combination is a rule for combining the domain name identifier into a domain name, and can be stored in the terminal device in advance. In addition, in this embodiment, the domain name identifier belongs to a part of the domain name. Specifically, the preset domain name combination rule may include one or more domain name combination templates, that is, the preset domain name combination rule may include a combination template for a plurality of domain names. For example, the preset domain name combination rule may include a plurality of domain name combination templates, such as a.com, b.com, tmall.com, and the like.
For example, in a specific implementation, the setting rule may be a domain name identifier, tmall.com, and if the domain name identifier is ABC, the domain name is ABC.
Certainly, in other embodiments, the domain name identifier may also be a code corresponding to the domain name, for example, the server may use a preset coding algorithm to code the domain name stored in the server or the database, so as to obtain a code corresponding to each domain name; and the terminal equipment stores a corresponding decoding algorithm, so that after the terminal equipment acquires the domain name identifier from the server, the domain name is decoded by using a preset decoding algorithm to obtain the corresponding domain name.
Alternatively, the domain name identifier may also be a mark set by using letters, numbers, or a combination of letters and numbers, for example, the domain name identifier corresponding to the domain name abc.c.com may be set to "123", "sbg", or "1 hg", and the like, and the mapping relationship between each domain name identifier and the corresponding domain name is stored in the server, so that after the domain name identifier is obtained, the domain name corresponding to the domain name identifier may be obtained by querying the domain name corresponding to the identifier from the server.
It can be understood that the above description only describes some specific implementation manners of obtaining the domain name through the domain name identifier by way of example, and obtaining the domain name through the domain name identifier may also be implemented in other manners as long as the terminal device can generate the domain name according to the domain name identifier, and the embodiment of this specification does not limit the specific generation process.
In addition, in implementation, the domain name accessed by the target application may be determined by the first application installed on the terminal device. Namely, the method provided by the embodiment of the present specification can be applied to a first application of a terminal device;
accordingly, in this case, in the step 102, sending an access tracking request of the target application to the server includes:
sending an access tracking request to a server through a first application of a terminal device;
correspondingly, the step 108 of determining whether the domain name is accessed by the target application according to the indication of the detection result includes:
according to the indication of the detection result, determining whether the domain name is accessed by a target application on the terminal equipment; the first application and the target application are different applications on the terminal device.
It should also be noted that, in the embodiment of the present specification, the target application may be any application installed on the terminal device, and the first application is an application on the terminal device other than a browser.
The following describes an embodiment of tracking an access link of a target application by a first application on a terminal device by using a specific embodiment. Fig. 2 is a second flowchart of a method for tracking application access according to an embodiment of the present disclosure, where the method shown in fig. 2 at least includes the following steps:
step 202, sending an access tracking request of a target application to a server through a first application on a terminal device; the access tracking request carries an identifier of a target application.
And step 204, receiving a domain name identifier corresponding to the identifier of the target application returned by the server.
And step 206, combining the domain name identifications into a domain name according to a preset domain name combination rule.
The domain name is accessed 208 by a first application on the terminal device.
Step 210, monitoring whether the first application requests an intermediate certificate corresponding to the target application from the server; if so, go to step 212, otherwise go to step 214.
In step 210, it may also be implemented by monitoring whether the first application receives an intermediate certificate corresponding to the target application returned by the server.
Step 212, it is determined that the domain name is not accessed by the target application on the terminal device.
Step 214, it is determined that the domain name is accessed by the target application on the terminal device.
In specific implementation, in order to determine a domain name identifier corresponding to a target application in a certain network address area and reduce the range and the number of the domain name identifiers returned by the server, in step 102, an access tracking request sent to the server also carries Internet Protocol (IP) address information used when connection is established with the server;
correspondingly, in this case, in the step 104, receiving the domain name identifier returned by the server according to the access tracking request specifically includes:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
It should be noted that, in this implementation, a mapping relationship between the application identifier, the domain name identifier and the IP address information is stored in the server or the database, and one possible form is shown in table 2.
In table 2, the same application id may access the domain name using different IP address information, and the same IP address information and the same application id may correspond to different domain name ids, for example, the domain name ids corresponding to UA2 and IP1 are "ASD" and "fyt"; different IP address information or different application identifiers may correspond to the same domain name identifier, for example, the domain name identifiers corresponding to UA1 and IP1 are "ABC", and the domain name identifiers corresponding to UA3 and IP2 are also "ABC". Of course, the identifier applied in table 2 may be an UA of an application, or may be another identifier, and table 2 is only an example and does not limit the embodiment of the present specification.
TABLE 2
Identification of applications IP address information Domain name identification
UA1 IP1 ABC
UA2 IP1 ASD
UA1 IP2 afh
UA3 IP2 ABC
UA2 IP1 fyt
In specific implementation, after receiving an access tracking request of a target application sent by a terminal device, a server extracts an identifier of the target application and IP address information connected to the terminal device from a context of the access tracking request, where the identifier information of the target application may be UA of the target application, searches for a domain name identifier matched with the identifier of the target application and the IP address information from a mapping relationship among the identifier of the application, the domain name identifier, and the IP address information stored in a database, and sends the found domain name identifier to the terminal device as the domain name identifier.
For the sake of understanding, the following description will be given by way of specific examples.
Fig. 3 is a third flowchart of a method for tracking application access according to an embodiment of the present disclosure, where the method shown in fig. 3 at least includes the following steps:
step 302, sending an access tracking request of a target application to a server; the access tracking request comprises the identification of the target application and IP address information used for establishing connection with the server.
And step 304, receiving the identifier of the target application and the domain name identifier corresponding to the IP address information returned by the server.
And step 306, combining the domain name identifications into a domain name according to a preset domain name combination rule.
Step 308, accessing the domain name, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if so, go to step 310, otherwise, go to step 312.
In step 308, it may be monitored whether the opposite server requests the intermediate certificate corresponding to the domain name.
At step 310, it is determined that the domain name is not accessed by the target application.
At step 312, it is determined that the domain name is accessed by the target application.
In the embodiment of the present specification, by carrying the identifier of the target application and the IP address information connected when accessing the server in the access tracking request sent to the server, the domain name identifier corresponding to the target application under the IP address information can be obtained, so that the range of the obtained domain name identifier can be narrowed, and the workload of subsequently searching for the domain name identifier accessed by the target application of the terminal device can be reduced.
Certainly, besides carrying the target application identifier and the IP address information in the access tracking request, the access tracking request may also carry terminal device related information; specifically, in this embodiment of the present specification, the access tracking request further includes information related to the terminal device;
correspondingly, in the step 104, receiving the domain name identifier returned by the server according to the access tracking request specifically includes:
and receiving the domain name identification inquired by the server according to the target application identification, the IP address information and the relevant information of the terminal equipment.
Specifically, the relevant information of the terminal device may be information of resolution, terminal model, and the like of the terminal device, so that the range of the searched domain name identifier may be further narrowed, thereby reducing the workload of subsequently searching the domain name accessed by the target application of the terminal device from the acquired domain name identifier, shortening the time for determining the domain name accessed by the target application of the terminal device, and improving the searching efficiency.
According to the method for tracking application access provided by the embodiment of the specification, a domain name identifier corresponding to a target application can be obtained from a server according to the identifier of the target application, whether an intermediate certificate of the domain name is cached or not is detected by accessing the domain name corresponding to the domain name identifier, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
The embodiment of the present specification further provides a method for tracking application access, where the method is applied to a server side, that is, an execution subject of the method is a server, and specifically, the execution subject of the method may be a device installed on the server to track application access. Fig. 4 is a fourth flowchart of a method for tracking application access provided by an embodiment of the present specification, where the method shown in fig. 4 includes at least the following steps:
step 402, receiving an access tracking request of a target application sent by a terminal device; the access tracking request carries an identifier of a target application.
And step 404, searching a domain name identifier corresponding to the access tracking request according to the access tracking request.
In step 404, if the domain name identifier and the application identifier are stored in the server in a corresponding manner, directly searching the domain name identifier corresponding to the access tracking request on the server; and if the domain name identification and the application identification are stored in the database correspondingly, the server searches the domain name identification corresponding to the access tracking request from the database.
Step 406, returning the domain name identifier to the terminal device, so that the terminal device detects whether the intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
The specific implementation manner of each step is the same as that of each step in the embodiment corresponding to fig. 1 to 3, and therefore, the specific implementation manner of each step may refer to the embodiment corresponding to fig. 1 to 3, and is not described herein again.
Specifically, in this embodiment of the present specification, the domain name identifier may be a part of a domain name; the domain name can also be coded by using a preset coding algorithm; alternatively, it may also be a mark set using letters, numbers, or a combination of letters and numbers.
Specifically, before performing step 402, the method provided in the embodiment of the present specification further includes:
receiving a domain name access request sent by each terminal device; determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request; and storing the domain name identification and the application identification correspondingly.
Specifically, in this embodiment of the present specification, after receiving an access request of a target application sent by a terminal device, a server extracts, according to the access request, an identifier of the application accessing the domain name, and extracts a domain name identifier of the domain name from the accessed domain name. For example, if the terminal device accesses the domain name abc.tmall.com through the application of the application identifier 1, the application identifier is the application identifier 1, and the domain name identifier extracted from the domain name is "ABC", the application identifier 1 and "ABC" are stored in the server or the database in a corresponding manner.
Specifically, the access request further carries IP address information of a network used when establishing connection with the server, so before executing step 402, the method provided in this embodiment of the present specification further includes:
determining IP address information used when the domain name is accessed according to the domain name access request; and correspondingly storing the domain name identification, the application identification and the IP address information.
The IP address information may be extracted from the context of a domain name access request.
It should be noted that, in this embodiment of the present specification, the domain name identifier, the identifier of the application, and the IP address information may be stored in the server correspondingly, and the domain name identifier, the identifier of the application, and the IP address information may be stored in the database correspondingly.
A corresponding storage manner of the domain name identifier, the application identifier, and the IP address information is shown in table 2, which is not described herein again.
During specific implementation, the server stores a mapping relationship between a domain name identifier of a target application, an application identifier of the target application and IP address information, and receives an access tracking request of the target application sent by a first application of a terminal device, where the first application and the target application are different application programs installed on the same terminal device.
Fig. 5 is a fifth flowchart of a method for tracking application access according to an embodiment of the present disclosure, where the method shown in fig. 5 at least includes the following steps:
step 502, receiving a domain name access request sent by a target application of each terminal device;
step 504, extracting the domain name identifier of the domain name, and determining the identifier and the IP address information of the target application according to the domain name access request.
Step 506, storing the domain name identifier, the identifier of the target application and the IP address information correspondingly.
In step 506, the domain name identifier, the identifier of the target application, and the IP address information may be stored in a server or a database.
Step 508, receiving an access tracking request of a target application sent by a first application of a terminal device; the access tracking request carries an identifier of a target application and IP address information used for connecting with a server.
Step 510, searching a domain name identifier corresponding to the identifier and the IP address information of the target application according to the identifier and the IP address information of the target application.
And step 512, returning the found domain name identifier to the terminal equipment.
In the method for tracking application access provided in the embodiments of the present description, a domain name identifier corresponding to an identifier of a target application is returned to a terminal device, so that the terminal device detects whether an intermediate certificate of a domain name has been cached by accessing the domain name corresponding to the domain name identifier, and determines that the domain name is accessed by the target application if the intermediate certificate of the domain name has been cached; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
To facilitate understanding of the method provided by the embodiment of the present specification, an interaction method for interaction between a terminal device and a server will be described below, fig. 6 is one of flowcharts of the interaction method of the method for tracking application access provided by the embodiment of the present specification, and the method shown in fig. 6 at least includes the following steps:
step 602, the terminal device sends an access tracking request of a target application to the server, where the access tracking request carries an identifier of the target application and an IP address of a network used by the access server.
Step 604, after receiving the access tracking request, the server extracts the identifier and the IP address of the target application from the access tracking request.
Step 606, the server searches the domain name identifier matching with the identifier and the IP address of the target application from the mapping relationship of the identifier, the IP address and the domain name identifier of the application established in advance.
In step 608, the server sends the found domain name identifier to the terminal device.
Step 610, the terminal device combines the domain name identifications into a domain name according to a preset domain name combination rule.
Step 612, the terminal device accesses the domain name and monitors whether to request the server for an intermediate certificate corresponding to the domain name; if yes, go to step 614, otherwise go to step 616;
specifically, in step 614, it may also be monitored whether an intermediate certificate corresponding to the domain name returned by the server is received.
At step 614, it is determined that the domain name is not accessed by the target application.
At step 616, it is determined that the domain name is accessed by the target application.
The method provided by the embodiment of the present disclosure will be described below by tracking an application a of a terminal device through an application B of the terminal device, fig. 7 is a second flowchart of an interaction method of the method for tracking application access provided by the embodiment of the present disclosure, and the method shown in fig. 7 at least includes the following steps:
step 702, each terminal device sends a domain name access request to the server through the application a, and the server returns an intermediate certificate corresponding to the domain name to the corresponding terminal device.
Step 704, the server extracts the domain name identifier corresponding to the domain name, UA of application a, and IP address of the network connected to the access server from the access request.
Step 706, the server stores the mapping relationship between the domain name identifier, UA and IP address.
In step 706, the mapping relationship between the domain name identifier, the UA and the IP address may be stored in a server, or may be stored in a database. And after the server stores the mapping relation among the domain name identifier, the UA and the IP address, returning the stored prompt information to the application A.
In step 708, the terminal device sends an access tracking request of the application a to the server through the application B, where the access tracking request carries the UA of the application a and the IP address of the network used by the access server.
Wherein, the access tracking request sent by the application B may be an HTTPS request.
Step 710, the server searches for the domain name identifier corresponding to the UA and the IP address according to the UA and the IP address of the application a carried in the request.
In step 712, the server returns the found domain name identifier to the terminal device.
In step 714, the terminal device combines the domain name identifiers into a domain name according to a preset domain name combination rule.
Step 716, the terminal device accesses the domain name through application B, and monitors whether to request the server for the intermediate certificate corresponding to the domain name; if so, go to step 718, otherwise, go to step 720.
Specifically, application B accesses the above domain name through HTTPS. In addition, in step 716, it may be monitored whether an intermediate certificate corresponding to the domain name returned by the server is received.
Step 718 determines that the domain name has not been accessed by application a of the terminal device.
Step 720, it is determined that the domain name was accessed by application a of the terminal device.
According to the method for tracking application access provided by the embodiment of the specification, a domain name identifier corresponding to a target application can be obtained from a server according to the identifier of the target application, whether an intermediate certificate of the domain name is cached or not is detected by accessing the domain name corresponding to the domain name identifier, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
The embodiment of the present specification further provides a method for tracking application access, where the method is applied to a terminal device, that is, an execution subject of the method may be the terminal device, and specifically, may be a device installed on the terminal device for tracking application access. Fig. 8 is a sixth flowchart of a method for tracking application access according to an embodiment of the present disclosure, where the method shown in fig. 8 at least includes the following steps:
step 802, sending an access tracking request of a target application to a server; wherein, the access tracking request includes the identification of the target application.
And step 804, receiving the domain name returned by the server according to the access tracking request.
By accessing the domain name, it is detected whether the intermediate certificate of the domain name has been cached, step 806.
And step 808, determining whether the domain name is accessed by the target application according to the indication of the detection result.
In this embodiment, the mapping relationship between the domain name and the identifier of the application is stored in a server or a database, wherein one possible storage form is shown in table 3.
TABLE 3
Identification of applications Domain name
UA1 2ty.A.com
UA2 123.B.com
UA2 Syh.C.com
UA3 123.B.com
As described in table 3, UA2 corresponds to a plurality of different domain names, and UA3 corresponds to the same domain name as one of UA 2. That is, in the mapping relationship between the domain name and the application identifier stored in the server or the database, different application identifiers may correspond to the same domain name, and the same application identifier may also correspond to a plurality of different domain names.
In addition, table 3 is only an exemplary illustration, and does not constitute a limitation on the mapping relationship between the application identifier and the domain name stored in the server or the database, and the specific domain name and the application identifier in the embodiments of the present specification.
In the method for tracking application access provided by this embodiment, because the mapping relationship between the application identifier and the domain name is stored in the server or the database, after the server receives an access tracking request of a target application sent by the terminal device, a domain name matching the application identifier is searched from the mapping relationship between the application identifier and the domain name stored in the server or the database according to the application identifier of the target application, and the searched domain name is returned to the terminal device. The number of the searched domain names can be one or more, and the server returns all the searched domain names to the terminal equipment no matter the number of the searched domain names is one or more.
After receiving the domain name returned by the server, the terminal device detects whether the intermediate certificate of the domain name is cached or not by accessing each domain name.
Specifically, in step 806, detecting whether the intermediate certificate of the domain name has been cached by accessing the domain name includes:
accessing the domain name and monitoring whether to request an intermediate certificate corresponding to the domain name from a server; if so, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Specifically, in this embodiment, in step 802, the access tracking request of the target application sent to the server further includes IP address information used for establishing a connection with the server;
correspondingly, in step 804, receiving the domain name returned by the server according to the access tracking request specifically includes:
and receiving the domain name inquired by the server according to the identification of the target application and the IP address information.
Specifically, in this embodiment, in step 802, the access tracking request of the target application sent to the server further includes the terminal device related information;
accordingly, in step 804, receiving the domain name returned by the server according to the access tracking request includes:
and receiving the domain name inquired by the server according to the identification of the target application, the IP address information and the related information of the terminal equipment.
Specifically, in step 802, sending an access tracking request of the target application to the server includes:
sending the access tracking request to a server through a first application of the terminal equipment;
correspondingly, in the step 808, determining whether the domain name is accessed by the target application according to the indication of the detection result includes:
according to the indication of the detection result, determining whether the domain name is accessed by a target application on the terminal equipment;
the first application and the target application are different applications on the terminal device.
The specific implementation process of each step in this embodiment is the same as the specific implementation process of each embodiment in fig. 1 to 3, and therefore, the specific implementation process of each step in this embodiment may refer to the embodiment corresponding to fig. 1 to 3, which is not described herein again.
For the convenience of understanding the method provided by the embodiment of the present specification, the method provided by the embodiment of the present specification will be described below by taking an example of performing access tracking corresponding to a through an application B, where the application a and the application B belong to the same terminal device.
Fig. 9 is a seventh flowchart of a method for tracking application access provided by an embodiment of the present specification, where the method shown in fig. 9 includes at least the following steps:
step 902, sending an access tracking request of an application A to a server through an application B on a terminal device; wherein, the access tracking request carries the identifier of the application a.
And step 904, receiving the domain name corresponding to the identifier of the application A returned by the server.
Step 906, the domain name is accessed by application B on the terminal device.
Step 908, monitoring whether the application B requests the server for the intermediate certificate corresponding to the application a; if yes, go to step 910, otherwise go to step 912.
In step 908, it may be implemented by monitoring whether the first application receives an intermediate certificate corresponding to the target application returned by the server.
Step 910, determining that the domain name is not accessed by application a on the terminal device.
Step 912, determining that the domain name is accessed by application a on the terminal device.
According to the method for tracking application access provided by the embodiment of the specification, a domain name corresponding to a target application can be obtained from a server according to an identifier of the target application, whether an intermediate certificate of the domain name is cached or not is detected by accessing the domain name, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
The embodiment of the present specification further provides a method for tracking application access, where the method is applied to a server side, that is, an execution subject of the method is a server, and specifically, the execution subject of the method may be a device installed on the server to track application access. Fig. 10 illustrates an eighth flowchart of a method for tracking application access provided by an embodiment of the present specification, where the method illustrated in fig. 10 includes at least the following steps:
step 1002, receiving an access tracking request of a target application sent by a terminal device; the access tracking request carries an identifier of a target application.
And step 1004, searching a domain name corresponding to the access tracking request according to the access tracking request.
In step 1004, if the domain name and the application identifier are stored in the server in a corresponding manner, the domain name corresponding to the access tracking request is directly searched for on the server; and if the domain name and the application identifier are stored in the database correspondingly, the server searches the domain name corresponding to the access tracking request from the database.
Step 1006, returning the domain name to the terminal device, so that the terminal device detects whether the intermediate certificate of the domain name has been cached by accessing the domain name; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
The specific implementation manner of each step is the same as the implementation principle of each step in the embodiments corresponding to fig. 4 to 7, and therefore, the specific implementation manner of each step may refer to the embodiments corresponding to fig. 4 to 7, and is not described herein again. The difference between this embodiment and the embodiments corresponding to fig. 4 to 7 is that in this embodiment, the server stores the correspondence between the domain name and the identifier of the application, and the server returns the domain name to the terminal device.
Specifically, before performing step 1002, the method provided in the embodiment of the present specification further includes:
receiving a domain name access request sent by each terminal device; and storing the domain name and the application identifier carried in the request correspondingly.
Specifically, in this embodiment of the present specification, after receiving an access request of a target application sent by a terminal device, a server extracts an identifier of the application accessing the domain name according to the access request, and stores the identifier of the application corresponding to the domain name. For example, if the terminal device accesses the domain name abc.d.com through an application identified as UA1, the application is identified as UA1, and UA1 and "abc.d.com" are stored in a server or database in correspondence.
Specifically, the access request further carries IP address information of a network used when establishing connection with the server, so before performing step 1002, the method provided in this embodiment of the present specification further includes:
determining IP address information used when the domain name is accessed according to the domain name access request; and correspondingly storing the domain name, the application identifier and the IP address information.
The IP address information may be extracted from the context of a domain name access request.
It should be noted that, in this embodiment of the present specification, the domain name, the identifier of the application, and the IP address information may be stored on the server correspondingly, and the domain name, the identifier of the application, and the IP address information may be stored in the database correspondingly.
In specific implementation, the server stores a mapping relationship between a domain name of a target application, an application identifier of the target application and IP address information, and receives an access tracking request of the target application sent by a first application of a terminal device, where the first application and the target application are different application programs installed on the same terminal device.
To facilitate understanding of the method for tracking application access provided in the embodiment of the present specification, an interaction flow of the method for tracking application access provided in the embodiment of the present specification will be described below by taking an example of interaction between a server and a terminal device, fig. 11 is a third interaction flow diagram of the method for tracking application access provided in the embodiment of the present specification, and the method shown in fig. 11 at least includes the following steps:
step 1102, the terminal device sends an access tracking request of a target application to a server; wherein, the request carries the identifier of the target application.
And step 1104, after receiving the access tracking request sent by the terminal device, the server searches for a domain name corresponding to the access tracking request according to the access tracking request.
In step 1106, the server sends the found domain name to the terminal device.
Step 1108, the terminal device accesses the domain name and monitors whether to request the server for an intermediate certificate corresponding to the domain name; if so, go to step 1110, otherwise, go to step 1112.
Alternatively, in step 1108, it may be implemented by monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received.
At step 1110, it is determined that the domain name is accessed by the target application.
Step 1112 determines that the domain name is not accessed by the target application.
According to the method for tracking application access provided by the embodiment of the specification, a domain name corresponding to a target application can be obtained from a server according to an identifier of the target application, whether an intermediate certificate of the domain name is cached or not is detected by accessing the domain name, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Based on the same idea, a method for tracking application access provided by an embodiment corresponding to fig. 1 to 3 in this specification is further provided in this specification, where the method is used to execute the embodiment of the method corresponding to fig. 1 to 3, the apparatus is applied to a terminal device, fig. 12 is one of schematic block diagrams of the apparatus for tracking application access provided by this specification, and the apparatus shown in fig. 12 at least includes:
a sending module 1201, configured to send an access tracking request of a target application to a server; the access tracking request comprises an identifier of a target application;
a first receiving module 1202, configured to receive a domain name identifier returned by the server according to the access tracking request;
a detecting module 1203, configured to detect whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier;
a first determining module 1204, configured to determine whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the detecting module 1203 is specifically configured to:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from a server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, the detecting module 1203 further includes:
and the combination module is used for combining the domain name identifications into the domain name according to a preset domain name combination rule.
Optionally, the sending module 1201 is specifically configured to:
sending the access tracking request to a server through a first application program of the terminal equipment;
correspondingly, the first determining module 1204 is specifically configured to:
according to the indication of the detection result, determining whether the domain name is accessed by a target application on the terminal equipment;
the first application and the target application are different applications on the terminal device.
Optionally, the access tracking request further includes IP address information used for establishing a connection with the server;
correspondingly, the first receiving module 1202 is specifically configured to:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
Optionally, the access tracking request further includes information related to the terminal device;
correspondingly, the first receiving module 1202 is specifically configured to:
and receiving the domain name identification inquired by the server according to the identification of the target application, the IP address information and the relevant information of the terminal equipment.
The apparatus for tracking application access according to the embodiment of the present specification may further perform the method performed by the apparatus for tracking application access shown in fig. 1 to fig. 3, and implement the functions of the apparatus for tracking application access in the embodiments shown in fig. 1 to fig. 3, which are not described herein again.
The apparatus for tracking application access provided in the embodiments of the present description may obtain, from a server, a domain name identifier corresponding to a target application according to an identifier of the target application, detect whether an intermediate certificate of a domain name has been cached by accessing a domain name corresponding to the domain name identifier, and determine that the domain name is accessed by the target application if the intermediate certificate of the domain name has been cached; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Based on the same idea, the embodiment of this specification further provides an apparatus for tracking application access, configured to execute the embodiment of the method corresponding to fig. 4 and 5, where the apparatus is applied to a server, fig. 13 is a second schematic diagram of module composition of the apparatus for tracking application access provided by the embodiment of this specification, and the apparatus shown in fig. 13 at least includes:
a second receiving module 1301, configured to receive an access tracking request of a target application sent by a terminal device; the access tracking request carries an identifier of a target application;
a searching module 1302, configured to search, according to the access tracking request, a domain name identifier corresponding to the access tracking request;
a returning module 1303, configured to return the domain name identifier to the terminal device, so that the terminal device detects whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the apparatus provided in this specification further includes:
the third receiving module is used for receiving the domain name access request sent by each terminal device;
the second determining module is used for determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request;
and the storage module is used for correspondingly storing the domain name identification and the application identification.
Optionally, the apparatus provided in this specification is further configured to:
determining IP address information used for accessing the domain name according to the domain name access request; and correspondingly storing the domain name identification, the application identification and the IP address information.
The apparatus for tracking application access according to the embodiment of the present specification may further perform the method performed by the apparatus for tracking application access shown in fig. 4 and fig. 5, and implement the functions of the apparatus for tracking application access in the embodiments shown in fig. 4 and fig. 5, which are not described herein again.
The apparatus for tracking application access provided in the embodiments of the present description returns a domain name identifier corresponding to an identifier of a target application to a terminal device, so that the terminal device detects whether an intermediate certificate of a domain name has been cached by accessing the domain name corresponding to the domain name identifier, and determines that the domain name is accessed by the target application if the intermediate certificate of the domain name has been cached; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Based on the same idea, a device for tracking application access, configured to perform the method embodiments corresponding to fig. 8 to 9, is applied to a terminal device, where fig. 14 is a third schematic block diagram of the device for tracking application access provided by the embodiment of this specification, and the device shown in fig. 14 at least includes:
a sending module 1401, configured to send an access tracking request of a target application to a server; the access tracking request comprises an identifier of a target application;
a first receiving module 1402, configured to receive a domain name returned by the server according to the access tracking request;
a detection module 1403, configured to detect whether an intermediate certificate of the domain name has been cached by accessing the domain name;
a first determining module 1404, configured to determine whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the detection module 1402 is specifically configured to:
accessing the domain name and monitoring whether to request the server for the intermediate certificate corresponding to the domain name; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, the sending module 1401 is specifically configured to:
sending the access tracking request to a server through a first application program of the terminal equipment;
accordingly, the first determining module 1404 is specifically configured to:
according to the indication of the detection result, determining whether the domain name is accessed by a target application on the terminal equipment;
the first application and the target application are different applications on the terminal device.
Optionally, the access tracking request further includes IP address information used for establishing a connection with the server;
correspondingly, the first receiving module 1402 is specifically configured to:
and receiving the domain name inquired by the server according to the identification and the IP address information of the target application.
Optionally, the access tracking request further includes information related to the terminal device;
correspondingly, the first receiving module 1402 is specifically configured to:
and receiving the domain name inquired by the server according to the identification of the target application, the IP address information and the related information of the terminal equipment.
The apparatus for tracking application access according to the embodiment of the present specification may further perform the method performed by the apparatus for tracking application access in fig. 8 to 9, and implement the functions of the apparatus for tracking application access according to the embodiments shown in fig. 8 to 9, which are not described herein again.
The apparatus for tracking application access provided in the embodiments of the present description may obtain, from a server, a domain name corresponding to a target application according to an identifier of the target application, and detect, by accessing the domain name, whether an intermediate certificate of the domain name has been cached, and if so, determine that the domain name is accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Corresponding to the method provided by the embodiment of the present specification, based on the same idea, the embodiment of the present specification further provides a system for tracking application access, fig. 15 is a schematic structural diagram of the system for tracking application access provided by the embodiment of the present specification, and the system shown in fig. 15 includes a server 1501 and a terminal device 1502;
the terminal device 1502 is configured to send an access tracking request of a target application to a server; the access tracking request comprises an identifier of a target application;
a server 1501, configured to receive an access tracking request sent by a terminal device; the access tracking request carries an identifier of a target application; searching a domain name identifier corresponding to the access tracking request according to the access tracking request; returning the domain name identification to the terminal equipment;
the terminal device 1502 is further configured to receive a domain name identifier returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the terminal device 1502 is specifically configured to:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from a server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, the terminal device 1502 is further specifically configured to:
and combining the domain name identifications into a domain name according to a preset domain name combination rule.
Optionally, the terminal device 1502 is further specifically configured to:
sending an access tracking request to a server through a first application of a terminal device;
and the number of the first and second groups,
determining whether the domain name is accessed by a target application on the terminal equipment according to the indication of the detection result;
the first application and the target application are different applications on the terminal device.
Optionally, the access tracking request further includes internet protocol IP address information used for establishing a connection with the server;
correspondingly, the terminal device 1502 is further specifically configured to:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
Optionally, the access tracking request further includes information related to the terminal device;
correspondingly, the terminal device 1502 is further specifically configured to:
and receiving the domain name identification inquired by the server according to the identification of the target application, the IP address information and the relevant information of the terminal equipment.
Optionally, the server 1501 is further configured to:
receiving a domain name access request sent by each terminal device; determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request; and storing the domain name identification and the application identification correspondingly.
Optionally, the server 1501 is further configured to:
determining IP address information used for accessing the domain name according to the domain name access request; and correspondingly storing the domain name identification, the application identification and the IP address information.
In the system for tracking application access provided in the embodiment of this specification, the terminal device may further execute the method executed by the terminal device in fig. 1 to 3, and implement the functions of the terminal device in the embodiments shown in fig. 1 to 3, and the server may further execute the method executed by the server in fig. 1 and 5, and implement the functions of the server in the embodiments shown in fig. 4 and 5, which are not described again here.
In the system for tracking application access provided in the embodiment of the present specification, a domain name identifier corresponding to a target application may be obtained from a server according to an identifier of the target application, and by accessing a domain name corresponding to the domain name identifier, it is detected whether an intermediate certificate of the domain name has been cached, and if the intermediate certificate of the domain name has been cached, it is determined that the domain name is accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Corresponding to the method provided by the embodiment of the present specification, based on the same idea, the embodiment of the present specification further provides a system for tracking application access, and fig. 15 is a schematic structural diagram of the system for tracking application access provided by the embodiment of the present specification, and includes a server 1501 and a terminal device 1502;
the terminal equipment is used for sending an access tracking request of the target application to the server; the access tracking request comprises an identifier of a target application;
the server is used for receiving an access tracking request sent by the terminal equipment; searching a domain name corresponding to the access tracking request according to the access tracking request; returning the domain name to the terminal equipment;
the terminal equipment is also used for receiving the domain name returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the terminal device is specifically configured to:
accessing the domain name and monitoring whether to request the server for the intermediate certificate corresponding to the domain name; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, the terminal device is further configured to:
sending an access tracking request to a server through a first application; and determining whether the domain name is accessed by a target application on the terminal equipment according to the indication of the detection result; the first application and the target application are different applications on the terminal device.
Optionally, the access tracking request further includes IP address information used for establishing a connection with the server;
correspondingly, the terminal device is further specifically configured to:
and receiving the domain name inquired by the server according to the identification and the IP address information of the target application.
Optionally, the access tracking request further includes information related to the terminal device;
correspondingly, the terminal device is further specifically configured to:
and receiving the domain name inquired by the server according to the identification of the target application, the IP address information and the related information of the terminal equipment.
Optionally, the server is further configured to:
receiving a domain name access request sent by each terminal device; extracting an identification of an application accessing the domain name from the access request; and storing the domain name and the application identifier correspondingly.
Optionally, the server is further configured to:
determining IP address information used for accessing the domain name according to the domain name access request; and correspondingly storing the domain name, the application identifier and the IP address information.
In the system for tracking application access provided in the embodiment of this specification, the terminal device may further execute the method executed by the terminal device in fig. 8 to 9, and implement the functions of the terminal device in the embodiments shown in fig. 8 to 9, and the server may further execute the method executed by the server in fig. 10, and implement the functions of the server in the embodiment shown in fig. 10, which is not described again here.
In the system for tracking application access provided in the embodiment of the present specification, a domain name corresponding to a target application may be obtained from a server according to an identifier of the target application, and by accessing the domain name, it is detected whether an intermediate certificate of the domain name has been cached, and if so, it is determined that the domain name has been accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Further, the embodiment of the present specification also provides a device for tracking application access, as shown in fig. 16, based on the same idea, corresponding to the method shown based on the embodiment of the present specification. The device for tracking application access can be applied to the terminal device in the above embodiment.
Devices tracking application access may vary significantly depending on configuration or performance and may include one or more processors 1601 and memory 1602, where one or more stored applications or data may be stored. Wherein the memory 1602 may be a transient storage or a persistent storage. The application programs stored in memory 1602 may include one or more modules (not shown), each of which may include a series of computer-executable instruction information in the device for tracking application access. Still further, the processor 1601 can be configured to communicate with the memory 1602 to execute a series of computer-executable instruction information in the memory 1602 on a device that tracks access by applications. The device tracking application access may also include one or more power supplies 1603, one or more wired or wireless network interfaces 1604, one or more input-output interfaces 1605, one or more keyboards 1606, and the like.
In one particular embodiment, an apparatus for tracking application access includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instruction information for the apparatus for tracking application access, and the one or more programs configured to be executed by one or more processors include the computer-executable instruction information for:
sending an access tracking request of a target application to a server; the access tracking request comprises an identifier of a target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, when executed, the computer-executable instruction information detects whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier, including:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from a server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, when the computer-executable instruction information is executed, before accessing the domain name corresponding to the domain name identifier and detecting whether the intermediate certificate of the domain name has been cached, the following steps may be further performed:
and combining the domain name identifications into a domain name according to a preset domain name combination rule.
Optionally, when executed, the computer executable instruction information sends an access tracking request of the target application to the server, including:
sending an access tracking request to a server through a first application of a terminal device;
correspondingly, according to the indication of the detection result, determining whether the domain name is accessed by the target application includes:
determining whether the domain name is accessed by a target application on the terminal equipment according to the indication of the detection result;
the first application and the target application are different applications on the terminal device.
Optionally, when the computer-executable instruction information is executed, the access tracking request further includes internet protocol IP address information used for establishing a connection with the server;
correspondingly, receiving the domain name identifier returned by the server according to the access tracking request comprises:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
Optionally, when the computer-executable instruction information is executed, the access tracking request further includes terminal device-related information;
correspondingly, receiving the domain name identifier returned by the server according to the access tracking request comprises:
and receiving the domain name identification inquired by the server according to the identification of the target application, the IP address information and the relevant information of the terminal equipment.
According to the device for tracking application access provided by the embodiment of the description, the domain name identification corresponding to the target application can be obtained from the server according to the identification of the target application, whether the intermediate certificate of the domain name is cached or not is detected by accessing the domain name corresponding to the domain name identification, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Corresponding to the method shown based on the embodiment of the present specification, based on the same idea, the embodiment of the present specification further provides a device for tracking application access, as shown in fig. 16. The device for tracking application access can be applied to the server in the above embodiment.
In one particular embodiment, an apparatus for tracking application access includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instruction information for the apparatus for tracking application access, and the one or more programs configured to be executed by one or more processors include the computer-executable instruction information for:
receiving an access tracking request of a target application sent by terminal equipment; the access tracking request carries an identifier of a target application;
searching a domain name identifier corresponding to the access tracking request according to the access tracking request;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether the intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, before the computer-executable instruction information is executed and an access tracking request of the target application sent by the terminal device is received, the method further includes:
receiving a domain name access request sent by each terminal device;
determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request;
and storing the domain name identification and the application identification correspondingly.
Optionally, before the computer-executable instruction information is executed and an access tracking request sent by the terminal device is received, the method further includes:
determining IP address information used for accessing the domain name according to the domain name access request;
and correspondingly storing the domain name identification, the application identification and the IP address information.
The device for tracking application access provided in the embodiments of the present description returns a domain name identifier corresponding to an identifier of a target application to a terminal device, so that the terminal device detects whether an intermediate certificate of a domain name has been cached by accessing the domain name corresponding to the domain name identifier, and determines that the domain name is accessed by the target application if the intermediate certificate of the domain name has been cached; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Corresponding to the method shown based on the embodiment of the present specification, based on the same idea, the embodiment of the present specification further provides a device for tracking application access, as shown in fig. 16. The device for tracking application access can be applied to the terminal device in the above embodiment.
In one particular embodiment, an apparatus for tracking application access includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instruction information for the apparatus for tracking application access, and the one or more programs configured to be executed by one or more processors include the computer-executable instruction information for:
sending an access tracking request of a target application to a server; wherein, the access tracking request includes the identifier of the target application;
receiving the domain name returned by the server according to the access tracking request;
detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, when the computer-executable instruction information is executed, the detecting whether the intermediate certificate of the domain name has been cached by accessing the domain name includes:
accessing the domain name and monitoring whether to request the server for the intermediate certificate corresponding to the domain name; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
According to the device for tracking application access provided by the embodiment of the description, the domain name corresponding to the target application can be obtained from the server according to the identification of the target application, whether the intermediate certificate of the domain name is cached or not is detected by accessing the domain name, and if the intermediate certificate of the domain name is cached, the domain name is determined to be accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Further, based on the method shown in the embodiment of the present specification, the embodiment of the present specification further provides a storage medium for storing computer-executable instruction information, and in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and when being executed by a processor, the storage medium stores the computer-executable instruction information, and can implement the following process:
sending an access tracking request of a target application to a server; the access tracking request comprises an identifier of a target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, when executed by the processor, the computer-executable instruction information stored in the storage medium monitors whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier, including:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from a server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
Optionally, before the computer-executable instructions stored in the storage medium are executed by the processor, and by accessing the domain name corresponding to the domain name identifier, and detecting whether the intermediate certificate of the domain name has been cached, the following steps may be further performed:
and combining the domain name identifications into a domain name according to a preset domain name combination rule.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, send an access tracking request to the server, comprising:
sending an access tracking request to a server through a first application of a terminal device;
correspondingly, according to the indication of the detection result, determining whether the domain name is accessed by the target application includes:
determining whether the domain name is accessed by a target application on the terminal equipment according to the indication of the detection result;
the first application and the target application are different applications on the terminal device.
Optionally, the storage medium stores computer-executable instructions, which when executed by the processor, further include internet protocol, IP, address information used to establish a connection with the server in the access tracking request;
correspondingly, receiving the domain name identifier returned by the server according to the access tracking request comprises:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
Optionally, the storage medium stores computer-executable instructions, which when executed by the processor, further include terminal device-related information in the access tracking request;
correspondingly, receiving the domain name identifier returned by the server according to the access tracking request comprises:
and receiving the domain name identification inquired by the server according to the identification of the target application, the IP address information and the relevant information of the terminal equipment.
When executed by a processor, a computer-executable instruction stored in a storage medium provided in an embodiment of the present specification may obtain, from a server, a domain name identifier corresponding to a target application according to an identifier of the target application, and detect whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier, and if the intermediate certificate of the domain name has been cached, determine that the domain name has been accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Further, based on the method shown in the embodiment of the present specification, the embodiment of the present specification further provides a storage medium for storing computer-executable instruction information, and in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and when being executed by a processor, the storage medium stores the computer-executable instruction information, and can implement the following process:
receiving an access tracking request of a target application sent by terminal equipment; the access tracking request carries an identifier of a target application;
searching a domain name identifier corresponding to the access tracking request according to the access tracking request;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether the intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, perform the method further comprising, before receiving an access tracking request sent by the terminal device:
receiving a domain name access request sent by each terminal device;
determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request;
and storing the domain name identification and the application identification correspondingly.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, perform the method further comprising, before receiving an access tracking request sent by the terminal device:
determining IP address information used for accessing the domain name according to the domain name access request;
and correspondingly storing the domain name identification, the application identification and the IP address information.
When executed by a processor, a computer-executable instruction stored in a storage medium provided in an embodiment of the present specification returns a domain name identifier corresponding to an identifier of a target application to a terminal device, so that the terminal device detects whether an intermediate certificate of a domain name has been cached by accessing the domain name corresponding to the domain name identifier, and determines that the domain name has been accessed by the target application if the intermediate certificate of the domain name has been cached; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
Further, based on the method shown in the embodiment of the present specification, the embodiment of the present specification further provides a storage medium for storing computer-executable instruction information, and in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and when being executed by a processor, the storage medium stores the computer-executable instruction information, and can implement the following process:
sending an access tracking request of a target application to a server; wherein, the access tracking request includes the identifier of the target application;
receiving the domain name returned by the server according to the access tracking request;
detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
Optionally, when executed by a processor, the detecting whether the intermediate certificate of the domain name has been cached by accessing the domain name includes:
accessing the domain name and monitoring whether to request the server for the intermediate certificate corresponding to the domain name; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
When the computer-executable instruction information stored in the storage medium provided in the embodiment of the present specification is executed by the processor, the domain name corresponding to the target application may be obtained from the server according to the identifier of the target application, and by accessing the domain name, it is detected whether the intermediate certificate of the domain name has been cached, and if so, it is determined that the domain name has been accessed by the target application; by the scheme, the domain name accessed by the target application is tracked, the influence of system updating is avoided, and the stability is good; in addition, the scheme is not prevented by the system because the caching of the intermediate certificate is a necessary step.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, MicrochIP address PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instruction information. These computer program instruction information may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instruction information executed by the processor of the computer or other programmable data processing apparatus produce means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instruction information may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instruction information stored in the computer-readable memory produce an article of manufacture including instruction information means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instruction information may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instruction information executed on the computer or other programmable apparatus provides steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instruction information, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instruction information, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (25)

1. A method of tracking application access, the method comprising:
sending an access tracking request of a target application to a server; the access tracking request comprises the identifier of the target application, so that the server searches the domain name identifier corresponding to the target application from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
2. The method of claim 1, wherein the detecting whether the intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier comprises:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from the server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
3. The method according to claim 1 or 2, before detecting whether the intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier, the method further comprises:
and combining the domain name identifications into the domain name according to a preset domain name combination rule.
4. The method of claim 1 or 2, the sending an access tracking request of a target application to a server, comprising:
sending the access tracking request to a server through a first application of the terminal equipment;
correspondingly, the determining whether the domain name is accessed by the target application according to the indication of the detection result includes:
determining whether the domain name is accessed by the target application on the terminal equipment according to the indication of the detection result;
the first application and the target application are different applications on the terminal equipment.
5. The method of claim 1 or 2, the access tracking request further comprising internet protocol, IP, address information used to establish a connection with the server;
correspondingly, the receiving the domain name identifier returned by the server according to the access tracking request includes:
and receiving the domain name identification inquired by the server according to the identification of the target application and the IP address information.
6. The method of claim 5, wherein the access tracking request further comprises terminal device related information;
correspondingly, the receiving the domain name identifier returned by the server according to the access tracking request includes:
and receiving the domain name identifier inquired by the server according to the identifier of the target application and the IP address information and the information related to the terminal equipment.
7. A method of tracking application access, the method comprising:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
8. The method of claim 7, wherein before receiving the access tracking request of the target application sent by the terminal device, the method further comprises:
receiving a domain name access request sent by each terminal device;
determining a domain name identifier corresponding to the domain name and an identifier of an application accessing the domain name according to the domain name access request;
and storing the domain name identification and the application identification correspondingly.
9. The method of claim 8, wherein before receiving the access tracking request sent by the terminal device, the method further comprises:
determining IP address information used for accessing the domain name according to the domain name access request;
and correspondingly storing the domain name identification, the application identification and the IP address information.
10. A method of tracking application access, the method comprising:
sending an access tracking request of a target application to a server; the access tracking request comprises an identifier of the target application, so that the server searches a domain name corresponding to the target application from a corresponding relation between the domain name and the identifier of the application according to the identifier of the target application;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
11. The method of claim 10, the detecting whether the intermediate certificate for the domain name has been cached by accessing the domain name, comprising:
accessing the domain name and monitoring whether to request the server for an intermediate certificate corresponding to the domain name; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing the domain name and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
12. An apparatus to track application access, the apparatus comprising:
the sending module is used for sending an access tracking request of the target application to the server; the access tracking request comprises the identifier of the target application, so that the server searches the domain name identifier corresponding to the target application from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
the first receiving module is used for receiving the domain name identifier returned by the server according to the access tracking request;
the detection module is used for detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and the first determining module is used for determining whether the domain name is accessed by the target application according to the indication of the detection result.
13. The apparatus of claim 12, wherein the detection module is specifically configured to:
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name is requested from the server; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached;
alternatively, the first and second electrodes may be,
accessing a domain name corresponding to the domain name identifier, and monitoring whether an intermediate certificate corresponding to the domain name returned by the server is received; if yes, determining that the intermediate certificate corresponding to the domain name is not cached; otherwise, determining that the intermediate certificate corresponding to the domain name is cached.
14. The apparatus of claim 12 or 13, further comprising:
and the combination module is used for combining the domain name identifications into the domain name according to a preset domain name combination rule.
15. The apparatus according to claim 12 or 13, wherein the sending module is specifically configured to:
sending the access tracking request to a server through a first application of the terminal equipment;
the first determining module is specifically configured to:
determining whether the domain name is accessed by the target application on the terminal equipment according to the indication of the detection result;
the first application and the target application are different applications on the terminal equipment.
16. An apparatus to track application access, the apparatus comprising:
the second receiving module is used for receiving an access tracking request of the target application sent by the terminal equipment; wherein, the access tracking request carries the identifier of the target application;
the searching module is used for searching the domain name identifier corresponding to the access tracking request from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
a returning module, configured to return the domain name identifier to the terminal device, so that the terminal device detects whether an intermediate certificate of the domain name has been cached by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
17. An apparatus to track application access, the apparatus comprising:
the sending module is used for sending an access tracking request of the target application to the server; the access tracking request comprises a target application identifier, so that the server searches a domain name corresponding to the target application from a corresponding relation between the domain name and the application identifier according to the target application identifier;
the first receiving module is used for receiving the domain name returned by the server according to the access tracking request;
the detection module is used for detecting whether the intermediate certificate of the domain name is cached or not by accessing the domain name;
and the first determining module is used for determining whether the domain name is accessed by the target application according to the indication of the detection result.
18. A system for tracking application access comprises a server and a terminal device;
the terminal device is used for sending an access tracking request of a target application to the server; wherein the access tracking request comprises an identifier of the target application;
the server is used for receiving the access tracking request sent by the terminal equipment; searching a domain name identifier corresponding to the access tracking request from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application; returning the domain name identification to the terminal equipment;
the terminal device is further configured to receive a domain name identifier returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
19. A system for tracking application access comprises a server and a terminal device;
the terminal device is used for sending an access tracking request of a target application to the server; wherein the access tracking request comprises an identifier of the target application;
the server is used for receiving the access tracking request sent by the terminal equipment; searching a domain name corresponding to the access tracking request from the corresponding relation between the domain name and the application identifier according to the target application identifier; returning the domain name to the terminal equipment;
the terminal device is further configured to receive a domain name returned by the server according to the access tracking request; detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
20. An apparatus to track application access, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an access tracking request of a target application to a server; the access tracking request comprises the identifier of the target application, so that the server searches the domain name identifier corresponding to the target application from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
21. An apparatus to track application access, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
22. An apparatus to track application access, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an access tracking request of a target application to a server; the access tracking request comprises a target application identifier, so that the server searches a domain name corresponding to the target application from a corresponding relation between the domain name and the application identifier according to the target application identifier;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
23. A computer-readable storage medium storing computer-executable instructions that when executed by a processor implement the following:
sending an access tracking request of a target application to a server; the access tracking request comprises the identifier of the target application, so that the server searches the domain name identifier corresponding to the target application from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
receiving a domain name identifier returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
24. A computer-readable storage medium storing computer-executable instructions that when executed by a processor implement the following:
receiving an access tracking request of a target application sent by terminal equipment; wherein, the access tracking request carries the identifier of the target application;
searching a domain name identifier corresponding to the access tracking request from the corresponding relation between the domain name identifier and the application identifier according to the identifier of the target application;
returning the domain name identifier to the terminal equipment so that the terminal equipment can detect whether an intermediate certificate of the domain name is cached or not by accessing the domain name corresponding to the domain name identifier; and determining whether the domain name is accessed by the target application according to the indication of the detection result.
25. A computer-readable storage medium storing computer-executable instructions that when executed by a processor implement the following:
sending an access tracking request of a target application to a server; the access tracking request comprises a target application identifier, so that the server searches a domain name corresponding to the target application from a corresponding relation between the domain name and the application identifier according to the target application identifier;
receiving a domain name returned by the server according to the access tracking request;
detecting whether an intermediate certificate of the domain name has been cached by accessing the domain name;
and determining whether the domain name is accessed by the target application according to the indication of the detection result.
CN201811307999.9A 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access Active CN109495464B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811307999.9A CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811307999.9A CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Publications (2)

Publication Number Publication Date
CN109495464A CN109495464A (en) 2019-03-19
CN109495464B true CN109495464B (en) 2021-05-28

Family

ID=65693828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811307999.9A Active CN109495464B (en) 2018-11-05 2018-11-05 Method, device, equipment and system for tracking application access

Country Status (1)

Country Link
CN (1) CN109495464B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116389404B (en) * 2023-06-06 2023-08-29 阿里云计算有限公司 Domain name resolution method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347059A (en) * 2016-05-06 2017-11-14 腾讯科技(深圳)有限公司 The method and detection terminal of a kind of Hole Detection
CN107707607A (en) * 2017-07-24 2018-02-16 上海壹账通金融科技有限公司 Using access method, device, computer equipment and storage medium
CN107968783A (en) * 2017-11-30 2018-04-27 腾讯科技(深圳)有限公司 Flow managing method, device, terminal and computer-readable recording medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8918840B2 (en) * 2002-12-26 2014-12-23 Better Dating Bureau, Inc. Systems and methods for identity-based communication gate for social networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347059A (en) * 2016-05-06 2017-11-14 腾讯科技(深圳)有限公司 The method and detection terminal of a kind of Hole Detection
CN107707607A (en) * 2017-07-24 2018-02-16 上海壹账通金融科技有限公司 Using access method, device, computer equipment and storage medium
CN107968783A (en) * 2017-11-30 2018-04-27 腾讯科技(深圳)有限公司 Flow managing method, device, terminal and computer-readable recording medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于宿主权限的移动广告漏洞攻击技术";王持恒等;《软件学报》;20180111;全文 *

Also Published As

Publication number Publication date
CN109495464A (en) 2019-03-19

Similar Documents

Publication Publication Date Title
CN108664812B (en) Information desensitization method, device and system
CN110113744B (en) Communication method, device, equipment and storage medium
CN107018174B (en) Unitized system service processing method and device and business processing system
CN110267248B (en) B L E communication method, device, equipment and storage medium
CN107580013B (en) Method and device for requesting data in cross-domain mode
CN110781192B (en) Verification method, device and equipment of block chain data
CN106878367B (en) Method and device for realizing asynchronous call of service interface
CN110995521B (en) Service providing method, device, equipment and system
CN106534268B (en) Data sharing method and device
CN112954043B (en) Method for identifying user based on website access log and computer equipment
CN109743309B (en) Illegal request identification method and device and electronic equipment
CN108616361B (en) Method and device for identifying uniqueness of equipment
US20170309298A1 (en) Digital fingerprint indexing
CN105809471A (en) Method and device for acquiring user attribute and electronic equipment
CN114900546B (en) Data processing method, device and equipment and readable storage medium
CN111753270B (en) Application program login verification method, device, equipment and storage medium
JP2005050347A (en) Method and apparatus for late-binding / dynamic path name resolution
CN109495464B (en) Method, device, equipment and system for tracking application access
CN107294905B (en) Method and device for identifying user
CN106156050B (en) Data processing method and device
CN103955372A (en) Method and device for detecting resources in mobile terminal
CN109615423B (en) Service processing method and device
CN110674383B (en) Public opinion query method, device and equipment
CN110992039B (en) Transaction processing method, device and equipment
CN112491816A (en) Service data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240222

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Advanced Nova Technology (Singapore) Holdings Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands

TR01 Transfer of patent right