CN110933017A - Access request processing method, terminal, server and readable storage medium - Google Patents

Access request processing method, terminal, server and readable storage medium Download PDF

Info

Publication number
CN110933017A
CN110933017A CN201811099905.3A CN201811099905A CN110933017A CN 110933017 A CN110933017 A CN 110933017A CN 201811099905 A CN201811099905 A CN 201811099905A CN 110933017 A CN110933017 A CN 110933017A
Authority
CN
China
Prior art keywords
response information
terminal
server
access request
hijacked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811099905.3A
Other languages
Chinese (zh)
Other versions
CN110933017B (en
Inventor
陈泓锡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Guangzhou Uc Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Uc Network Technology Co ltd filed Critical Guangzhou Uc Network Technology Co ltd
Priority to CN201811099905.3A priority Critical patent/CN110933017B/en
Publication of CN110933017A publication Critical patent/CN110933017A/en
Application granted granted Critical
Publication of CN110933017B publication Critical patent/CN110933017B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The invention provides a processing method of an access request, a terminal, a server and a readable storage medium, wherein a first HTTP access request is initiated to the server through the terminal, and first response information returned by the server is received; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.

Description

Access request processing method, terminal, server and readable storage medium
Technical Field
The present invention relates to computer technologies, and in particular, to a method for processing an access request, a terminal, a server, and a readable storage medium.
Background
With the development of the mobile internet, the mobile application carries huge service demands, and the mobile application can execute a specific service by initiating a network request, and most of the network requests are realized by a hypertext transfer Protocol (HTTP) request.
Generally, when a user requests to execute a service, the user needs to initiate an HTTP request to a service server through a client of a mobile application. In the process, the HTTP request is easily hijacked by the advertisement operator or the mobile network operator, so that a large amount of information irrelevant to the service itself is included in the response information of the service returned by the service server acquired by the user. Therefore, how to avoid hijacking of the HTTP request becomes an urgent problem to be solved.
Disclosure of Invention
In view of the above-mentioned problems of long feedback time and low access processing efficiency in the conventional access request processing method, the present invention provides an access request processing method, a terminal, a server and a readable storage medium.
In one aspect, the present invention provides a method for processing an access request, including:
initiating a first HTTP access request to a server, and receiving first response information returned by the server;
when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier;
and receiving second response information returned by the server, decoding and reading the second response information for display.
In an optional embodiment, the method further comprises:
and when the first response information is not hijacked, decoding and reading the first response information for display.
In an optional implementation manner, after receiving the first response information returned by the server, the method further includes:
judging whether the first response information can be decrypted by using a preset decryption key;
if yes, the first response information is not hijacked; and if not, hijacking the first response information.
In another aspect, the present invention provides a method for processing an access request, including:
receiving an HTTP access request initiated by a terminal;
when the HTTP access request is determined not to include the hijack identifier, generating first response information, and sending the first response information to the terminal for decoding and reading by the terminal;
and when the HTTP access request is determined to include the hijack identification, generating second response information in a picture coding format, and sending the second response information to the terminal for the terminal to decode and read the second response information.
In an optional implementation manner, the generating the first response information includes:
and encrypting the generated first response information by adopting a preset encryption key so that the terminal can decrypt the first response information and judge whether the first response information is hijacked or not.
In another aspect, the present invention provides a terminal, including:
the first communication unit is used for initiating a first HTTP access request to a server and receiving first response information returned by the server;
when the first processing unit is used for judging that the first response information is hijacked, the first communication unit is further used for initiating a second HTTP access request including a hijacked identifier to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier and receives the second response information returned by the server;
the first processing unit is also used for decoding and reading the second response information for display.
In an optional implementation manner, the first processing unit is further configured to decode and read the first response information for presentation when it is determined that the first response information is not hijacked.
In an optional implementation manner, the first processing unit is specifically configured to determine, after receiving the first response information, whether the first response information can be decrypted by using a preset decryption key; if yes, the first response information is not hijacked; and if not, hijacking the first response information.
In another aspect, the present invention provides a server, including:
the second communication unit is used for receiving an HTTP access request initiated by the terminal;
the second processing unit is used for generating first response information when the HTTP access request is determined not to include the hijack identifier, so that the second communication unit sends the first response information to the terminal for the terminal to decode and read; and the HTTP access request is further configured to generate second response information in a picture coding format when it is determined that the HTTP access request includes the hijack identifier, so that the second communication unit speaks the second response information and sends the second response information to the terminal, so that the terminal decodes the second response information and reads the second response information.
In one optional implementation manner, the second processing unit is specifically configured to:
and encrypting the generated first response information by adopting a preset encryption key so that the terminal can decrypt the first response information and judge whether the first response information is hijacked or not.
In yet another aspect, the present invention provides a terminal, including: a memory, a processor coupled to the memory, and a computer program stored on the memory and executable on the processor,
the processor, when executing the computer program, performs the method of any of the above.
In another aspect, the present invention provides a server, including: a memory, a processor coupled to the memory, and a computer program stored on the memory and executable on the processor,
the processor, when executing the computer program, performs the method as described above.
In a further aspect, the invention provides a readable storage medium comprising a program which, when run on a terminal, causes the terminal to perform a method as claimed in any one of the above.
In a final aspect, the invention provides a readable storage medium comprising a program which, when run on a terminal, causes the terminal to perform a method as described above.
The invention provides a processing method of an access request, a terminal, a server and a readable storage medium, wherein the terminal initiates a first HTTP access request to the server and receives first response information returned by the server; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.
Drawings
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
FIG. 1 is a schematic diagram of a network architecture on which the present invention is based;
fig. 2 is a schematic flowchart of a processing method of an access request according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a processing method of an access request according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to a third embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a terminal according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server according to a fifth embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of a server according to a sixth embodiment of the present invention.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
With the development of the mobile internet, the mobile application carries huge service demands, and the mobile application can execute a specific service by initiating a network request, and most of the network requests are realized by a hypertext transfer Protocol (HTTP) request.
Generally, when a user requests to execute a service, the user needs to initiate an HTTP request to a service server through a client of a mobile application. In this process, the HTTP request and the corresponding response information are easily hijacked by the advertisement operator or the mobile network operator, so that the service feedback of the HTTP request obtained by the user is interspersed with a large amount of information unrelated to the service itself.
In order to avoid the aforementioned HTTP request being hijacked, a multi-handshake and an encryption/decryption full Socket hypertext Transfer Protocol (HTTPs) request may be employed to initiate an access request for a service. However, since HTTPS requires multiple handshakes and encryption/decryption, it will take a long time to obtain feedback corresponding to an access request, and the processing efficiency of the access request is reduced, which also reduces the performance of the service server.
It should be noted that the access request processing method, the terminal, the server and the readable storage medium provided by the present application may be applied to various service scenarios that use HTTP access requests, such as an access request for web browsing, an access request for service information query, an access request for obtaining video information, and the like. Fig. 1 is a schematic diagram of a network architecture based on the present invention, and as shown in fig. 1, the network architecture based on the present invention at least includes: a terminal 1 and a server 2. The terminal 1 may specifically include a desktop computer, a tablet computer, a smart phone, an industrial smart terminal, and other devices that may be used to initiate an access request; the server 2 may be a server or a cluster of servers on which a commercial service provider, such as an operator, advertiser, etc., is based. In addition, plug-ins or programs which can be used for implementing the processing method of the access request are loaded or installed in the terminal 1 and the server 2 respectively, and the plug-ins or programs can be written by using languages such as C/C + +, Java, Shell or Python.
Fig. 2 is a flowchart illustrating a processing method of an access request according to an embodiment of the present invention.
As shown in fig. 2, the method for processing the access request includes:
step 101, initiating a first HTTP access request to a server, and receiving first response information returned by the server.
And 102, when the first response information is hijacked, initiating a second HTTP access request including a hijacked identifier to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier.
And 103, receiving second response information returned by the server, decoding and reading the second response information for display.
It should be noted that the execution subject of the testing method provided by the present invention may specifically be the terminal 1 shown in fig. 1. The terminal 1 can make a connection with the server 2 for data exchange through wireless communication.
Since in the prior art, when HTTP request and corresponding response information are employed, it is easily hijacked by an advertisement operator or a mobile network operator. In the application, because the operator cannot hijack the second response information in the picture coding format, the hijack of the response information can be effectively avoided and the user experience is improved compared with the HTTP access request.
Specifically, firstly, a terminal initiates a first HTTP access request to a server and receives first response information returned by the server. Specifically, the first HTTP access request may be an access request initiated by the terminal to the server for the first time, that is, when the terminal initiates an access request to the server for the first time, it is impossible to know whether the response information returned by the server is hijacked. Therefore, the first HTTP access request may include the access content and the non-hijacked identifier, that is, the response information that the terminal may receive by default when the HTTP access request is first transmitted will not be hijacked. Preferably, in this step, in order to facilitate the server to determine the hijacking state, the first HTTP access request may include an un-hijacking identifier, so that the server returns corresponding first response information according to the hijacking identifier.
And then, after the terminal receives the first response message, judging whether the first response message is hijacked or not, and executing corresponding processing. Specifically, when the terminal determines that the first response information is not hijacked, the terminal decodes and reads the first response information for display; and when the terminal determines that the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is initiated to the server so that the server generates second response information in a picture coding format according to the hijacked identifier, and the terminal receives the second response information returned by the server, decodes the second response information and reads the second response information for display.
The terminal can adopt a decryption key for judging whether the first response information is hijacked, specifically, the terminal can preset a decryption key matched with an encryption key in the server, and when the server returns the first response information to the terminal, the server can utilize the encryption key to encrypt the first response information in order to judge whether the first response information is hijacked.
After the terminal receives the first response message, whether the first response message can be decrypted by using the decryption key is determined to determine whether the first response message is hijacked, that is, the terminal determines whether the first response message can be decrypted by using a preset decryption key; if yes, the first response information is not hijacked; and if not, hijacking the first response information. It should be noted that, in the hijacking process, the operator may load information, such as advertisement information, that is irrelevant to the response information into the first response information, and this may destroy the encryption of the first response information, and therefore, the terminal may determine whether the first response information is hijacked by using this characteristic, so as to initiate a second HTTP access request including a hijacking identifier to the server, so that the server generates the second response information in the picture coding format according to the hijacking identifier. Because the second response information adopts the picture coding format, the operator cannot hijack the information in the picture coding format in the HTTP access request, and therefore, the safety of the response information is effectively ensured, and the response information is not hijacked.
The method for processing the access request provided by the embodiment of the invention comprises the steps of initiating a first HTTP access request to a server through a terminal, and receiving first response information returned by the server; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.
Fig. 3 is a flowchart illustrating a processing method of an access request according to a second embodiment of the present invention.
As shown in fig. 3, the method for processing the access request includes:
step 201, receiving an HTTP access request initiated by a terminal.
Step 202, when it is determined that the HTTP access request does not include the hijack identifier, generating first response information, and sending the first response information to the terminal for the terminal to decode and read.
And 203, when it is determined that the HTTP access request includes the hijack identifier, generating second response information in a picture coding format, and sending the second response information to the terminal, so that the terminal decodes the second response information and reads the second response information.
It should be noted that the execution subject of the testing method provided by the present invention may specifically be the server 2 shown in fig. 1. The server 2 can make a connection with the terminal 1 through wireless communication to perform data interaction.
Since in the prior art, when HTTP request and corresponding response information are employed, it is easily hijacked by an advertisement operator or a mobile network operator. In the application, because the operator cannot hijack the second response information in the picture coding format, the hijack of the response information can be effectively avoided and the user experience is improved compared with the HTTP access request.
Specifically, the server receives an HTTP access request initiated by the terminal, and processes the HTTP access request to generate corresponding response information. Different from the prior art, in the second embodiment, two HTTP access requests may be received by the server, where one HTTP access request is an HTTP access request that does not include the hijack identifier, that is, the first HTTP access request in the first embodiment; the other is an HTTP access request including a hijacking flag, i.e. the second HTTP access request in embodiment two.
And the server determines the generation mode of the response information according to whether the HTTP access request comprises the hijack identification. When the HTTP access request is determined not to include the hijack identifier, generating first response information, and sending the first response information to the terminal for decoding and reading by the terminal; and when the HTTP access request is determined to include the hijack identification, generating second response information in a picture coding format, and sending the second response information to the terminal for the terminal to decode and read the second response information. In the process of generating the first response information, the server may encrypt the generated first response information by using a preset encryption key, so that the terminal decrypts the first response information and determines whether the first response information is hijacked. In the process of generating the second response information, the server may steganographically write the content of the response information in the picture, that is, generate the second response information in the picture coding format. Because the second response information adopts the picture coding format, the operator cannot hijack the information in the picture coding format in the HTTP access request, and therefore, the safety of the response information is effectively ensured, and the response information is not hijacked.
In addition, the flow of the method for the opposite side can be found in the corresponding part of the first embodiment, and the second embodiment is not described herein again.
In the processing method for the access request provided by the second embodiment of the present invention, a first HTTP access request is initiated to a server through a terminal, and first response information returned by the server is received; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.
Fig. 4 is a schematic structural diagram of a terminal according to a third embodiment of the present invention, and as shown in fig. 4, the terminal includes:
the first communication unit 10 is configured to initiate a first HTTP access request to a server, and receive first response information returned by the server;
when the first processing unit 11 is configured to determine that the first response information is hijacked, the first communication unit 10 is further configured to initiate a second HTTP access request including a hijacked identifier to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier, and receives the second response information returned by the server;
the first processing unit 11 is further configured to decode and read the second response information for presentation.
Optionally, the first processing unit 11 is further configured to decode and read the first response information for display when it is determined that the first response information is not hijacked.
Optionally, the first processing unit 11 is specifically configured to, after receiving the first response information, determine whether the first response information can be decrypted by using a preset decryption key; if yes, the first response information is not hijacked; and if not, hijacking the first response information.
The terminal provided by the third embodiment of the invention initiates a first HTTP access request to a server through the terminal and receives first response information returned by the server; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.
Fig. 5 is a schematic diagram of a hardware structure of a terminal according to a fourth embodiment of the present invention. As shown in fig. 5, the terminal includes: a memory 41, a processor 42 and a computer program stored on the memory 41 and executable on the processor 42, the processor 42 executing the method of the first embodiment when executing the computer program.
The present invention also provides a readable storage medium comprising a program which, when run on a terminal, causes the electronic device to perform the method of the first embodiment.
Fig. 6 is a schematic structural diagram of a server according to a fifth embodiment of the present invention, and as shown in fig. 6, the server includes:
a second communication unit 20, configured to receive an HTTP access request initiated by a terminal;
the second processing unit 21 is configured to generate first response information when it is determined that the HTTP access request does not include the hijack identifier, so that the second communication unit 20 sends the first response information to the terminal, and the first response information is decoded and read by the terminal; and is further configured to generate second response information in a picture coding format when it is determined that the HTTP access request includes the hijack identifier, so that the second communication unit 20 speaks the second response information and sends the second response information to the terminal, so that the terminal decodes the second response information and reads the second response information.
In an optional implementation manner, the second processing unit 21 is specifically configured to:
and encrypting the generated first response information by adopting a preset encryption key so that the terminal can decrypt the first response information and judge whether the first response information is hijacked or not.
The server provided by the fifth embodiment of the invention initiates a first HTTP access request to the server through the terminal, and receives first response information returned by the server; when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier; and receiving second response information returned by the server, decoding and reading the second response information for display, wherein the operator cannot hijack the second response information in the picture coding format, so that the hijack of the response information can be effectively avoided compared with an HTTP access request, and the user experience is improved.
Fig. 7 is a schematic diagram of a hardware structure of a server according to a sixth embodiment of the present invention. As shown in fig. 7, the terminal includes: a memory 51, a processor 52 and a computer program stored on the memory 51 and executable on the processor 52, wherein the processor 52 executes the method of the second embodiment when executing the computer program.
The invention also provides a readable storage medium comprising a program which, when run on a terminal, causes the electronic device to perform the method of the second embodiment.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (14)

1. A method for processing an access request, comprising:
initiating a first HTTP access request to a server, and receiving first response information returned by the server;
when the first response information is hijacked, a second HTTP access request comprising a hijacked identifier is sent to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier;
and receiving second response information returned by the server, decoding and reading the second response information for display.
2. The method for processing the access request according to claim 1, further comprising:
and when the first response information is not hijacked, decoding and reading the first response information for display.
3. The method for processing the access request according to claim 1, after receiving the first response information returned by the server, further comprising:
judging whether the first response information can be decrypted by using a preset decryption key;
if yes, the first response information is not hijacked; and if not, hijacking the first response information.
4. A method for processing an access request, comprising:
receiving an HTTP access request initiated by a terminal;
when the HTTP access request is determined not to include the hijack identifier, generating first response information, and sending the first response information to the terminal for decoding and reading by the terminal;
and when the HTTP access request is determined to include the hijack identification, generating second response information in a picture coding format, and sending the second response information to the terminal for the terminal to decode and read the second response information.
5. The method for processing the access request according to claim 4, wherein the generating the first response information includes:
and encrypting the generated first response information by adopting a preset encryption key so that the terminal can decrypt the first response information and judge whether the first response information is hijacked or not.
6. A terminal, comprising:
the first communication unit is used for initiating a first HTTP access request to a server and receiving first response information returned by the server;
when the first processing unit is used for judging that the first response information is hijacked, the first communication unit is further used for initiating a second HTTP access request including a hijacked identifier to the server, so that the server generates second response information in a picture coding format according to the hijacked identifier and receives the second response information returned by the server;
the first processing unit is also used for decoding and reading the second response information for display.
7. The terminal according to claim 6, wherein the first processing unit is further configured to decode and read the first response information for presentation when it is determined that the first response information is not hijacked.
8. The terminal according to claim 6 or 7, wherein the first processing unit is specifically configured to, after receiving the first response information, determine whether the first response information can be decrypted by using a preset decryption key; if yes, the first response information is not hijacked; and if not, hijacking the first response information.
9. A server, comprising:
the second communication unit is used for receiving an HTTP access request initiated by the terminal;
the second processing unit is used for generating first response information when the HTTP access request is determined not to include the hijack identifier, so that the second communication unit sends the first response information to the terminal for the terminal to decode and read; and the HTTP access request is further configured to generate second response information in a picture coding format when it is determined that the HTTP access request includes the hijack identifier, so that the second communication unit speaks the second response information and sends the second response information to the terminal, so that the terminal decodes the second response information and reads the second response information.
10. The server according to claim 9, wherein the second processing unit is specifically configured to:
and encrypting the generated first response information by adopting a preset encryption key so that the terminal can decrypt the first response information and judge whether the first response information is hijacked or not.
11. A terminal, comprising: a memory, a processor coupled to the memory, and a computer program stored on the memory and executable on the processor,
the processor, when executing the computer program, performs the method of any of claims 1-3.
12. A server, comprising: a memory, a processor coupled to the memory, and a computer program stored on the memory and executable on the processor,
the processor, when executing the computer program, performs the method of claim 4 or 5.
13. A readable storage medium, characterized by comprising a program which, when run on a terminal, causes the terminal to perform the method of any one of claims 1-3.
14. A readable storage medium, characterized by comprising a program which, when run on a terminal, causes the terminal to perform the method of claim 4 or 5.
CN201811099905.3A 2018-09-20 2018-09-20 Access request processing method, terminal, server and readable storage medium Active CN110933017B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811099905.3A CN110933017B (en) 2018-09-20 2018-09-20 Access request processing method, terminal, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811099905.3A CN110933017B (en) 2018-09-20 2018-09-20 Access request processing method, terminal, server and readable storage medium

Publications (2)

Publication Number Publication Date
CN110933017A true CN110933017A (en) 2020-03-27
CN110933017B CN110933017B (en) 2022-05-20

Family

ID=69856120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811099905.3A Active CN110933017B (en) 2018-09-20 2018-09-20 Access request processing method, terminal, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN110933017B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202824A (en) * 2020-12-07 2021-01-08 杭州筋斗腾云科技有限公司 Network resource access processing method and device, server and terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060013488A1 (en) * 2002-08-09 2006-01-19 Hisashi Inoue Information-embedding apparatus, encoder, tamper-detecting apparatus, information-embedding method, tamper-detecting method, and recording medium having program recorded therein for executing both of the methods
CN103780392A (en) * 2014-01-15 2014-05-07 杭州晟元芯片技术有限公司 Man-machine-interaction security confirmation method for handset security unit
CN103929440A (en) * 2014-05-09 2014-07-16 国家电网公司 Web page tamper prevention device based on web server cache matching and method thereof
CN106446617A (en) * 2016-09-21 2017-02-22 河南科技大学 Static webpage access method with active file protection function
CN107911456A (en) * 2017-11-17 2018-04-13 深圳泉眼体育运营管理有限公司 Flow optimization method, device, terminal device and the storage medium of picture loading
CN108282451A (en) * 2017-01-20 2018-07-13 广州市动景计算机科技有限公司 Hijacking data judgment method, device and user terminal
CN108494762A (en) * 2018-03-15 2018-09-04 广州优视网络科技有限公司 Web access method, device and computer readable storage medium, terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060013488A1 (en) * 2002-08-09 2006-01-19 Hisashi Inoue Information-embedding apparatus, encoder, tamper-detecting apparatus, information-embedding method, tamper-detecting method, and recording medium having program recorded therein for executing both of the methods
CN103780392A (en) * 2014-01-15 2014-05-07 杭州晟元芯片技术有限公司 Man-machine-interaction security confirmation method for handset security unit
CN103929440A (en) * 2014-05-09 2014-07-16 国家电网公司 Web page tamper prevention device based on web server cache matching and method thereof
CN106446617A (en) * 2016-09-21 2017-02-22 河南科技大学 Static webpage access method with active file protection function
CN108282451A (en) * 2017-01-20 2018-07-13 广州市动景计算机科技有限公司 Hijacking data judgment method, device and user terminal
CN107911456A (en) * 2017-11-17 2018-04-13 深圳泉眼体育运营管理有限公司 Flow optimization method, device, terminal device and the storage medium of picture loading
CN108494762A (en) * 2018-03-15 2018-09-04 广州优视网络科技有限公司 Web access method, device and computer readable storage medium, terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202824A (en) * 2020-12-07 2021-01-08 杭州筋斗腾云科技有限公司 Network resource access processing method and device, server and terminal

Also Published As

Publication number Publication date
CN110933017B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
US10206104B2 (en) Session completion through co-browsing
US8909933B2 (en) Decoupled cryptographic schemes using a visual channel
US9608945B2 (en) Sending messages to multiple receiving electronic devices using a message server
US11907700B2 (en) Upgrading method and system, server, and terminal device
CN109729100B (en) Webpage data hijacking monitoring method and device and computer readable storage medium
WO2012081404A1 (en) Authentication system, authentication server, service provision server, authentication method, and computer-readable recording medium
CN111258602B (en) Information updating method and device
EP3384493A1 (en) Method and apparatus for transmitting video data
CN107959660A (en) A kind of static file access method and device based on Nginx
CN111756847B (en) Method and device for supporting https protocol by website
US20230247007A1 (en) Quic transport protocol-based communication method and system
US11070533B2 (en) Encrypted server name indication inspection
CN105141567A (en) Interactive data processing method and system of terminal application and service end and interaction method
JP2010072916A (en) Data protection system and data protection method
CN111049832B (en) Reverse proxy method and related device
CN110933017B (en) Access request processing method, terminal, server and readable storage medium
JP6132021B2 (en) Delivery control apparatus and method, push delivery system, and computer program
CA3052849C (en) Payment control method and device, electronic device, and storage medium
CN113704206B (en) Metadata processing method and device, electronic equipment and storage medium
US20170359212A1 (en) Information processing method, device and computer readable storage medium
CN112948869A (en) Data interaction method and device, computer equipment and storage medium
CN114553449A (en) Encryption and decryption method, device, system, electronic equipment and storage medium based on HTTPS
JP6502395B2 (en) Terminal management method and system, server, terminal
CN110636374A (en) Method and device for searching information
CN113507363B (en) Data processing method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200420

Address after: 310052 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Alibaba (China) Co.,Ltd.

Address before: 510627 Guangdong city of Guangzhou province Whampoa Tianhe District Road No. 163 Xiping Yun Lu Yun Ping square B radio tower 15 layer self unit 02

Applicant before: GUANGZHOU UC NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
CB02 Change of applicant information

Address after: Room 554, 5 / F, building 3, 969 Wenyi West Road, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant after: Alibaba (China) Co.,Ltd.

Address before: 310052 room 508, 5th floor, building 4, No. 699 Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant before: Alibaba (China) Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant