CN109784034A - A kind of method of information processing, equipment, system and medium - Google Patents

A kind of method of information processing, equipment, system and medium Download PDF

Info

Publication number
CN109784034A
CN109784034A CN201811566394.1A CN201811566394A CN109784034A CN 109784034 A CN109784034 A CN 109784034A CN 201811566394 A CN201811566394 A CN 201811566394A CN 109784034 A CN109784034 A CN 109784034A
Authority
CN
China
Prior art keywords
screenshot
solicited message
information processing
page
request page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811566394.1A
Other languages
Chinese (zh)
Inventor
白敏�
罗炳聪
李朋举
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201811566394.1A priority Critical patent/CN109784034A/en
Publication of CN109784034A publication Critical patent/CN109784034A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

Present disclose provides a kind of method of information processing, method includes: S1, receives the solicited message of user, if the request page of solicited message carries out screenshot in the first grouping, to solicited message;S2 deletes screenshot if the request page of solicited message is in second packet in screenshot, otherwise, noise reduction process is carried out to screenshot, so that the gray value of screenshot is within a preset range;S3, the process of real time monitoring operation above-mentioned steps, when process occurs abnormal, pull-up process.The disclosure additionally provides the equipment, system and medium of a kind of information processing.Screenshot is carried out by the solicited message to access malicious websites, the screenshot for returning to the solicited message of the port exception page and the error status code page is deleted, improves the accuracy of fallacious message evidence obtaining.

Description

A kind of method of information processing, equipment, system and medium
Technical field
This disclosure relates to a kind of method of information processing, equipment, system and medium.
Background technique
The network user is when browsing some illegal websites, or when from unsafe website download games or other programs, Rogue program can be brought to the terminal of oneself without knowing it into, rogue program steals the sensitive data of user whereby, such as Bank account information and bank card password etc. cause greatly to lose to user.For threatening information service and other big numbers It is requested according to business batch, has higher requirement to the safety of request data.
Therefore it needs to carry out the request data detected screenshot, and screenshot preservation is carried out to the information of malice, for disliking Meaning information tracing and notification related personnel are handled.
Summary of the invention
The disclosure in view of the above problems, provides method, equipment, system and the medium of a kind of information processing.Pass through timing The user received is requested to carry out uniform resource locator (URL) and domain name is filtered, for accessing the use of malicious websites The URL and domain name of family request carry out screenshot, delete cutting for the user's request for returning to the port exception page or the error status code page Figure, and noise reduction process and preservation are carried out to not deleted screenshot, improve the confidence level and accuracy of detection.
An aspect of this disclosure provides a kind of method of information processing, comprising: and S1 receives the solicited message of user, If the request page of the solicited message carries out screenshot in the first grouping, to the solicited message;S2, if being asked in the screenshot It asks the request page of information in second packet, deletes the screenshot, otherwise, noise reduction process is carried out to the screenshot, so that institute State the gray value of screenshot within a preset range;S3, the process of real time monitoring operation above-mentioned steps, when exception occurs in the process When, process described in pull-up.
Optionally, the solicited message includes URL and domain name, and first grouping includes a kind of or more malice net It stands, the step S1 further include: periodically the URL and domain name are judged, if the request page of the URL and domain name is institute Malicious websites are stated, screenshot is carried out to the URL and domain name.
Optionally, the time interval of the timing is determined according to the quantity of the solicited message of the user received.
Optionally, the step S2 further include: if the request page of solicited message is not at described second point in the screenshot In group, screenshot is carried out to the request page of the solicited message, saves the screenshot of the solicited message and asking for the solicited message Seek the screenshot of the page.
Optionally, any solicited message includes a kind of or more request page, to asking for described one kind or more The page is asked to carry out screenshot and preservation.
Optionally, the method also includes: record the completion status of the screenshot, wherein the completion status includes into It function, failure and operates again.
Optionally, the second packet includes the port exception page and the error status code page.
On the other hand the disclosure additionally provides a kind of electronic equipment of information processing, comprising: processor;Memory is deposited Computer executable program is contained, described program by the processor when being executed, so that the processor executes above- mentioned information The method of processing.
On the other hand the disclosure additionally provides a kind of system of information processing, the system of the information processing includes: screenshot Module, for receiving the solicited message of user, if the request page of the solicited message believes the request in the first grouping Breath carries out screenshot;Delete and noise reduction module, for judge the request page of solicited message in the screenshot in second packet, if The screenshot is being deleted, otherwise, noise reduction process is being carried out to the screenshot, so that the gray value of the screenshot is within a preset range; Monitoring module, for monitoring the process for running above-mentioned module in real time, when the process occurs abnormal, process described in pull-up.
On the other hand the disclosure additionally provides a kind of computer readable storage medium, be stored thereon with computer program, should The method of above- mentioned information processing is realized when program is executed by processor.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the flow chart of the method for the information processing provided according to the embodiment of the present disclosure.
Fig. 2 diagrammatically illustrates the flow chart of the operation of the method for the information processing provided according to the embodiment of the present disclosure.
Fig. 3 diagrammatically illustrates the block diagram of the electronic equipment according to the disclosure.
Fig. 4 diagrammatically illustrates the block diagram of the system of the information processing of the embodiment of the present disclosure.
Specific embodiment
According in conjunction with attached drawing to the described in detail below of disclosure exemplary embodiment, other aspects, the advantage of the disclosure Those skilled in the art will become obvious with prominent features.
In the disclosure, term " includes " and " containing " and its derivative mean including rather than limit;Term "or" is packet Containing property, mean and/or.
In the present specification, following various embodiments for describing disclosure principle only illustrate, should not be with any Mode is construed to limitation scope of disclosure.Referring to attached drawing the comprehensive understanding described below that is used to help by claim and its equivalent The exemplary embodiment for the disclosure that object limits.Described below includes a variety of details to help to understand, but these details are answered Think to be only exemplary.Therefore, it will be appreciated by those of ordinary skill in the art that without departing substantially from the scope of the present disclosure and spirit In the case where, embodiment described herein can be made various changes and modifications.In addition, for clarity and brevity, The description of known function and structure is omitted.In addition, running through attached drawing, same reference numbers are used for identity function and operation.
Fig. 1 diagrammatically illustrates the flow chart of the method for the information processing provided according to the embodiment of the present disclosure.Fig. 2 is schematic The flow chart of the operation of the method for the information processing provided according to the embodiment of the present disclosure is provided.In conjunction with Fig. 2, the side described in Fig. 1 Method is described in detail, as shown in Figure 1, this method includes following operation:
S1 receives the solicited message of user, if the request page of solicited message first grouping in, to the solicited message into Row screenshot.
First grouping includes a kind of or more malicious websites.Malicious websites refer to deliberately executes evil on the computer systems The virus of meaning task, worm and Trojan Horse illegal website, user's normal browsing page is usually made with certain form web page Content, while the illegal various data for obtaining user terminal, such as extension horse website, fishing fraudulent website, pornographic gambling site.
Solicited message includes URL and domain name.URL compactly identifies position and the access of the resource accessed from internet Method, such as https: //www.baidu.com/;Domain name is by a string with a certain on the internet that forms of name of point segmentation Computer or the title for calculating unit, for identifying the electronic bearing of computer when data are transmitted, such as www.wikipedia.org。
The access request of user is received, classification judgement is carried out to the URL and domain name of user's request at a certain time interval, If the URL and the requested page of domain name correspond to above-mentioned malicious websites, screenshot is carried out to the URL and domain name.
Aforesaid operations use timing mechanism, according to the quantity of the solicited message of the user received to the time interval of timing Dynamic adjustment is carried out, for example, requesting the time interval in the busy period to be less than user for user requests the idle time Time interval in section.
S2, if the request page of the solicited message in screenshot in second packet, deletes the screenshot, otherwise, to the screenshot Noise reduction process is carried out, so that the gray value of the screenshot is within preset range.
Second packet includes the port exception page and the error status code page.The error status code page includes that status code is The page of 4XX or 5XX indicates that the mistake for interfering server process has occurred in client, or indicates that server is requested in processing During wrong or abnormality occur, such as 404 status codes indicate that the requested page is not present or has been deleted, 503 status codes indicate that web page program does not have the page status returned after correlated results, similar to 404 status codes, belong to a kind of net Page status malfunction code.
Specifically, operation S2 includes following sub-operation:
S21, for screenshot obtained in operation S1, according to the URL and domain name request access related web site in screenshot, if returning The request page returned is the port exception page or the error status code page, illustrates the malicious websites of the URL and domain name request access In vain, the screenshot is deleted, otherwise, executes sub-operation S22.
S22 carries out screenshot to the webpage that the URL and domain name request access, save the URL and domain name screenshot and its ask The URL for accessing malicious websites and domain name are stored in database, screenshot can be put in order to provide a variety of evidences by the screenshot for the webpage asked Enter platform specified path such as " .../data/images/ ".Wherein, any URL and domain name correspond to a kind of or more request page, Screenshot preservation is carried out to the request page of the one kind or more, for example, accessing according to a certain URL and domain name, for Android Mobile phone, iPhone, the page of its return of the end PC are different, need to carry out screenshot guarantor to these three different request pages at this time It deposits.
S23 carries out noise reduction process to the screenshot remained, shows that type is judged according to picture pixels, deletes complete White or completely black screenshot, screenshot very high for brightness or very low carries out noise reduction process, so that the gray value of screenshot is in default model In enclosing.
Image denoising method, such as mean filter, median filter, Wavelet Denoising Method etc., it is possible to reduce in digital picture The noise due to caused by imaging device and external environment etc..It is divided between white and black by logarithmic relationship if gray value refers to Dry grade, range is generally from 0-255, and white is 255, black 0, in order to obtain the higher screenshot of quality, can be by preset range Such as it is set between 1-200.
S24 saves the screenshot obtained after noise reduction process, the access malicious websites stored in more new database URL and domain name, for system calling and chain of evidence is shown and notice.
S25 records the completion status of aforesaid operations, wherein completion status includes successfully, fails and operate again, i.e., to upper State operation success, failure and again operation etc. recorded, to be debugged to relative program.
S3, implementing monitoring execute the process of aforesaid operations, when the process occurs abnormal, the pull-up process.
Timing is monitored aforesaid operations, this time interval is identical as the time interval of aforesaid operations, and monitoring executes The process of aforesaid operations whether normal operation, judges whether there is situations such as process is ossified, if there have process to occur to be abnormal, pull-up should Process, or periodically pull-up associated process, to guarantee the normal operation of aforesaid operations.Wherein, pull-up is that process is instigated to mention again For service.
As shown in figure 3, electronic equipment 300 includes processor 310, computer readable storage medium 320.The electronic equipment 300 can execute the method above with reference to Fig. 1 and Fig. 2 description, to carry out Message Processing.
Specifically, processor 310 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 310 can also include using for caching The onboard storage device on way.Processor 310 can be for executing the side according to the embodiment of the present disclosure for referring to Fig. 1 and Fig. 2 and describing Single treatment unit either multiple processing units of the different movements of method process.
Computer readable storage medium 320, such as can be times can include, store, transmitting, propagating or transmitting instruction Meaning medium.For example, readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, Device or propagation medium.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Optical storage Device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication chain Road.
Computer readable storage medium 320 may include computer program 321, which may include generation Code/computer executable instructions execute processor 310 for example above in conjunction with Fig. 1 and figure Method flow described in 2 and its any deformation.
Computer program 321 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 321 may include one or more program modules, for example including 321A, module 321B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 310 When execution, processor 310 is executed for example above in conjunction with method flow described in Fig. 1 and Fig. 2 and its any deformation.
In accordance with an embodiment of the present disclosure, computer-readable medium can be computer-readable signal media or computer can Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In the disclosure, computer readable storage medium can be it is any include or storage program Tangible medium, which can be commanded execution system, device or device use or in connection.And in this public affairs In opening, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or Above-mentioned any appropriate combination.
Fig. 4 diagrammatically illustrates the block diagram of the system of the information processing of the embodiment of the present disclosure.
As shown in figure 4, the system of information processing includes screen capture module 410, deletion and noise reduction module 420, monitoring module 430。
Specifically, screen capture module 410, for receiving the URL and domain name of user's transmission, at a certain time interval to user The URL and domain name of request classify, if the malicious websites in the URL and corresponding first grouping of the page of domain name request, to this URL and domain name carry out screenshot, store the screenshot, and will be in the URL and domain name deposit database.
Deletion and noise reduction module 420, for carrying out classification judgement again to obtained screenshot, if URL and domain in screenshot The request page returned after name access is the port exception page or the error status code page, the screenshot is deleted, otherwise, to the URL Screenshot is carried out with the webpage of domain name request access, the screenshot of the screenshot of the URL and domain name and the webpage of its request is saved, to guarantor The screenshot stayed carries out noise reduction process, so that the gray value of screenshot is within a preset range, to the screenshot obtained after noise reduction process It is saved, the URL and domain name of the access malicious websites stored in more new database.
Monitoring module 430, is periodically monitored aforesaid operations, the time interval phase of this time interval and aforesaid operations Together, the process that monitoring executes aforesaid operations whether normal operation, judges whether there is situations such as process is ossified, if there is process appearance It is abnormal, the pull-up process, or periodically pull-up associated process, to guarantee the normal operation of aforesaid operations.
It is understood that screen capture module 410, deletion and noise reduction module 420, monitoring module 430 may be incorporated in one It is realized in module or any one module therein can be split into multiple modules.Alternatively, one in these modules or At least partly function of multiple modules can be combined at least partly function of other modules, and be realized in a module. According to an embodiment of the invention, screen capture module 410, deleting and at least one of noise reduction module 420, monitoring module 430 can be with At least it is implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), piece The system in system, encapsulation, specific integrated circuit (ASIC) in upper system, substrate, or can with to circuit carry out it is integrated or The hardware such as any other rational method or firmware of encapsulation realize, or with three kinds of software, hardware and firmware implementations Appropriately combined realize.Alternatively, screen capture module 410, deleting and at least one of noise reduction module 420, monitoring module 430 can To be at least implemented partly as computer program module, when the program is run by computer, corresponding module can be executed Function.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations or/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, those skilled in the art are shown and described with reference to the certain exemplary embodiments of the disclosure It, can be with it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents A variety of changes in form and details are carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, but It should be not only determined by appended claims, be also defined by the equivalent of appended claims.

Claims (10)

1. a kind of method of information processing, which is characterized in that method includes:
S1 receives the solicited message of user, if the request page of the solicited message first grouping in, to the solicited message Carry out screenshot;
S2 deletes the screenshot if the request page of solicited message is in second packet in the screenshot, otherwise, to described section Figure carries out noise reduction process, so that the gray value of the screenshot is within a preset range;
S3, the process of real time monitoring operation above-mentioned steps, when the process occurs abnormal, process described in pull-up.
2. the method for information processing according to claim 1, which is characterized in that the solicited message includes URL and domain name, First grouping includes a kind of or more malicious websites, the step S1 further include:
Timing judges the URL and domain name, if the request page of the URL and domain name is the malicious websites, to institute It states URL and domain name carries out screenshot.
3. the method for information processing according to claim 2, which is characterized in that according to the request of the user received The quantity of information determines the time interval of the timing.
4. the method for information processing according to claim 1, which is characterized in that the step S2 further include:
If the request page of solicited message is not in the second packet in the screenshot, to the request page of the solicited message into Row screenshot saves the screenshot of the screenshot of the solicited message and the request page of the solicited message.
5. the method for information processing according to claim 4, which is characterized in that any solicited message include it is a kind of and Above request page carries out screenshot and preservation to the request page of described one kind or more.
6. the method for information processing according to claim 1, which is characterized in that the method also includes:
Record the completion status of the screenshot, wherein the completion status includes successfully, fails and operate again.
7. the method for information processing according to claim 1, which is characterized in that the second packet includes port exception page Face and the error status code page.
8. a kind of electronic equipment of information processing characterized by comprising
Processor;
Memory is stored with computer executable program, and described program by the processor when being executed, so that the processing Device executes the method such as information processing in claim 1-7.
9. a kind of system of information processing, which is characterized in that the system of the information processing includes:
Screen capture module, for receiving the solicited message of user, if the request page of the solicited message first grouping in, to institute It states solicited message and carries out screenshot;
It deletes and noise reduction module, for judging the request page of solicited message in the screenshot in second packet, if deleting Otherwise the screenshot carries out noise reduction process to the screenshot, so that the gray value of the screenshot is within a preset range;
Monitoring module, for monitoring the process for running above-mentioned module in real time, when the process occurs abnormal, described in pull-up into Journey.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is processed The method such as information processing in claim 1-7 is realized when device executes.
CN201811566394.1A 2018-12-20 2018-12-20 A kind of method of information processing, equipment, system and medium Pending CN109784034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811566394.1A CN109784034A (en) 2018-12-20 2018-12-20 A kind of method of information processing, equipment, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811566394.1A CN109784034A (en) 2018-12-20 2018-12-20 A kind of method of information processing, equipment, system and medium

Publications (1)

Publication Number Publication Date
CN109784034A true CN109784034A (en) 2019-05-21

Family

ID=66497932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811566394.1A Pending CN109784034A (en) 2018-12-20 2018-12-20 A kind of method of information processing, equipment, system and medium

Country Status (1)

Country Link
CN (1) CN109784034A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818019A (en) * 2020-06-19 2020-10-23 五八有限公司 Method, device, equipment and medium for determining network hijacking data or network hijacking

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331172A (en) * 2016-10-20 2017-01-11 杭州迪普科技有限公司 Method and device for detecting resources for content distribution network
CN206805775U (en) * 2017-05-25 2017-12-26 长沙普德利生科技有限公司 A kind of motor vehicle illegal road occupation capturing system based on pulsed laser ranging
CN107682734A (en) * 2017-10-20 2018-02-09 国信嘉宁数据技术有限公司 The evidence collecting method and relevant apparatus and readable storage medium storing program for executing of a kind of electronic evidence
CN108092962A (en) * 2017-12-08 2018-05-29 北京奇安信科技有限公司 A kind of malice URL detection method and device
US20180247250A1 (en) * 2017-02-08 2018-08-30 Kanger Shum System and method for transmitting peer performance evaluation data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331172A (en) * 2016-10-20 2017-01-11 杭州迪普科技有限公司 Method and device for detecting resources for content distribution network
US20180247250A1 (en) * 2017-02-08 2018-08-30 Kanger Shum System and method for transmitting peer performance evaluation data
CN206805775U (en) * 2017-05-25 2017-12-26 长沙普德利生科技有限公司 A kind of motor vehicle illegal road occupation capturing system based on pulsed laser ranging
CN107682734A (en) * 2017-10-20 2018-02-09 国信嘉宁数据技术有限公司 The evidence collecting method and relevant apparatus and readable storage medium storing program for executing of a kind of electronic evidence
CN108092962A (en) * 2017-12-08 2018-05-29 北京奇安信科技有限公司 A kind of malice URL detection method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818019A (en) * 2020-06-19 2020-10-23 五八有限公司 Method, device, equipment and medium for determining network hijacking data or network hijacking

Similar Documents

Publication Publication Date Title
CN109040316B (en) HTTP service processing method and device
EP3561708B1 (en) Method and device for classifying uniform resource locators based on content in corresponding websites
JP6228966B2 (en) Computing device that detects malware
CN113489713B (en) Network attack detection method, device, equipment and storage medium
CN108667770B (en) Website vulnerability testing method, server and system
CN101582887A (en) Safety protection method, gateway device and safety protection system
CN109446819A (en) It goes beyond one's commission leak detection method and device
US11627148B2 (en) Advanced threat detection through historical log analysis
CN103095530A (en) Method and system for sensitive information monitoring and leakage prevention based on front-end gateway
CN103973635A (en) Page access control method, and related device and system
CN109800140A (en) Method, apparatus, equipment and the medium of service alarm event analysis of causes
CN112003864A (en) Website security detection system and method based on full flow
CN109688483A (en) A kind of method, apparatus and electronic equipment obtaining video
JP2023099121A (en) Insurance examination device, insurance examination method, and program
CN109002550B (en) Test method and device for reduction equipment
CN109784034A (en) A kind of method of information processing, equipment, system and medium
CN103618761B (en) Method and browser for processing cookie information
CN108400884B (en) Method, system and device for improving stability of website service
CN110781500A (en) Data wind control system and method
US9118563B2 (en) Methods and apparatus for detecting and filtering forced traffic data from network data
CN113726855B (en) Service aggregation method, device, electronic equipment and computer-readable storage medium
CN109784049A (en) Method, equipment, system and the medium of threat data processing
CN110851822B (en) Network download security processing method and device
CN114221807A (en) Access request processing method and device, monitoring equipment and storage medium
CN109523591A (en) Processing method, device, equipment and the storage medium of picture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant after: Qianxin Technology Group Co., Ltd.

Address before: Beijing Chaoyang District Jiuxianqiao Road 10, building 15, floor 17, layer 1701-26, 3

Applicant before: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521

RJ01 Rejection of invention patent application after publication