CN111193690A - Request message processing method and device and computer readable storage medium - Google Patents

Request message processing method and device and computer readable storage medium Download PDF

Info

Publication number
CN111193690A
CN111193690A CN201811361342.0A CN201811361342A CN111193690A CN 111193690 A CN111193690 A CN 111193690A CN 201811361342 A CN201811361342 A CN 201811361342A CN 111193690 A CN111193690 A CN 111193690A
Authority
CN
China
Prior art keywords
message
terminal
issued
connection channel
issued message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811361342.0A
Other languages
Chinese (zh)
Other versions
CN111193690B (en
Inventor
张建厂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201811361342.0A priority Critical patent/CN111193690B/en
Publication of CN111193690A publication Critical patent/CN111193690A/en
Application granted granted Critical
Publication of CN111193690B publication Critical patent/CN111193690B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The application relates to a method, a device and a computer readable storage medium for processing a request message, wherein the method comprises the following steps: detecting whether a terminal establishes a data service connection channel with the outside or not; when the terminal establishes a data service connection channel with the outside, judging whether to receive an issued message through the data service connection channel; when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal; if yes, executing the operation corresponding to the issued message. According to the method and the device, under the condition that the data service connection channel is established between the terminal and the outside, whether the terminal receives the issued message through the data service connection channel is judged, when the issued message is received, the operation corresponding to the issued message is executed only when the issued message meets the preset execution condition of the terminal, the phenomenon that the terminal is repeatedly restarted or crashed due to malicious tampering of terminal information is avoided, and the normal use of a user is affected, so that the safety and the stability of the terminal are improved.

Description

Request message processing method and device and computer readable storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for processing a request message, and a computer-readable storage medium.
Background
At present, data terminal products with a USB network card function and a WIFI function are used more and more widely, but the security of the products also has a certain risk and an increasing number of situations occur, the data terminal products are usually attacked by messages from external data and messages from a control pipeline, and the types of the message attacks mainly include the following types:
(1) part of software on the host sends a control request message which does not conform to a standard protocol to a data terminal product side, and the data terminal product side receives the control request message and then causes the identification of an operating system to be disordered; (2) the host sends a control request message without a corresponding port to the data terminal product side, when the data terminal product side receives the control request message, the data terminal product side cannot avoid the existence of a bug due to the absence of a corresponding interface, and the data terminal product can be repeatedly restarted or halted, so that the normal use of a user is influenced; (3) and the external part utilizes third-party software or other modes to maliciously switch the data terminal product from the network card mode to the mode of the diagnosis interface and the android debugging bridge port, tries to read the side information of the data terminal product, and modifies or deletes the side part files of the data terminal product, so that the data terminal product finally crashes or cannot be started and the like.
The attack mode may affect the use of the data terminal product, so that the data terminal product has fault conditions of repeated restart, repeated port flushing, halt, incapability of loading port drivers and the like, and further a user cannot normally use the data terminal product. In order to solve the above problems, a new encryption system is conventionally used, which encrypts TCP/IP packets based on the TCP/IP Protocol, makes an agreement of encryption/decryption logic between a transmitting side and a receiving side, and applies the agreement to payloads of protocols corresponding to a transmission Layer TCP or UDP (User Datagram Protocol) in order to enhance a function of preventing leakage, falsification, disguise, entry, and attack of data without changing a program of a higher-level application.
However, the above method can only perform encryption processing on data packets corresponding to a network layer such as TCP or UDP, and cannot protect against data packets from a physical layer or other non-TCP or UDP network layers or attack data packets sent in other manners, such as data packets from a control pipe or a data pipe simulating USB or data packets in HTTP format, so that security protection cannot be achieved due to security holes, and stability, security or other functions of a data terminal product are affected.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the present application provides a method, an apparatus, and a computer-readable storage medium for processing a request message.
In a first aspect, the present application provides a method for processing a request message, which is applied to a terminal, and the method includes the following steps:
detecting whether a terminal establishes a data service connection channel with the outside or not;
when the terminal establishes a data service connection channel with the outside, judging whether a sent message is received through the data service connection channel;
when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal;
and if so, executing the operation corresponding to the issued message.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the determining whether the delivered message meets a preset execution condition of the terminal includes:
if not, generating a feedback message corresponding to the issued message;
and sending the feedback message through the data service connection channel.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the generating a feedback message corresponding to the issued message includes:
and generating different feedback messages according to the issued messages of different types.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the determining whether the delivered message meets a preset execution condition of the terminal includes:
judging whether the type of the issued message is a preset type of the terminal;
when the type of the issued message is the preset type of the terminal, judging whether the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal;
if yes, judging whether the password verification result of the issued message is correct or not;
and when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the executing the operation corresponding to the issued message includes:
responding by using the kernel of the terminal according to the type, the index value, the data packet length and the password verification result of the issued message;
generating a response result corresponding to the issued message;
and sending the response result through the data service connection channel.
With reference to the first aspect, in a fifth possible implementation manner of the first aspect, the determining whether a password verification result of the delivered message is correct includes:
judging whether an instruction for switching a debugging port of the terminal in the issued message is legal or not;
and if so, determining that the password verification result of the issued message is correct.
With reference to the first aspect, in a sixth possible implementation manner of the first aspect, the method further includes:
and adjusting the preset execution condition of the terminal according to the difference of the interface types of the terminal.
In a second aspect, the present application provides a device for processing a request message, which is applied to a terminal, and the device includes:
the detection unit is used for detecting whether the terminal establishes a data service connection channel with the outside;
a first judging unit, configured to judge whether an issued message is received through a data service connection channel when the terminal establishes the data service connection channel with the outside;
the second judging unit is used for judging whether the issued message meets the preset execution condition of the terminal or not when the issued message is received;
and the execution unit is used for executing the operation corresponding to the issued message when the issued message meets the preset execution condition of the terminal.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the second determining unit further includes:
a feedback message generating subunit, configured to generate a feedback message corresponding to the issued message when the issued message does not meet a preset execution condition of the terminal;
and the feedback message sending subunit is configured to send the feedback message through the data service connection channel.
In a third aspect, the present application provides a computer-readable storage medium, on which a processing program of a request message is stored, and when executed by a processor, the processing program of the request message implements the steps of the processing method of the request message according to the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
compared with the prior art that the encryption processing can only be performed on the data packet corresponding to the network layer, and the data packet from the physical layer or other non-TCP or UDP network layer or the attack data packet sent in other modes cannot be defended, so that the security vulnerability cannot achieve the security protection, the method provided by the embodiment judges whether the terminal receives the issued message through the data service connection channel under the condition that the terminal establishes the data service connection channel with the outside, and executes the operation corresponding to the issued message only when the issued message meets the preset execution condition of the terminal when the issued message is received, so that the normal use of a user is prevented from being influenced due to the fact that the terminal is repeatedly restarted or crashed due to tampering with malicious terminal information, and the security and the stability of the terminal are improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flowchart of a method for processing a request message according to an embodiment of the present application;
fig. 2 is a flowchart of another request message processing method according to an embodiment of the present application;
fig. 3 is a flowchart of another request message processing method according to an embodiment of the present application;
fig. 4 is a flowchart of another request message processing method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a device for processing a request message according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a processing method of a request message provided in an embodiment of the present application, which is applied to a terminal, and the method includes the following steps:
s101, detecting whether a terminal establishes a data service connection channel with the outside or not.
S102, when the terminal establishes a data service connection channel with the outside, whether the issued message is received through the data service connection channel is judged.
S103, when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal, if so, turning to the step S104; otherwise, go to step S105.
And S104, executing the operation corresponding to the issued message.
And S105, generating a feedback message corresponding to the issued message, and turning to the step S106.
And S106, sending a feedback message through the data service connection channel.
In the embodiment of the application, when the terminal and the host establish the data service connection channel, the issued message received through the data service connection channel includes a control message, a data message and an HTTP message, and the preset execution condition of the terminal may also be adjusted according to a change of a requirement of the terminal and a difference of an interface type, and for example, the preset execution condition of the terminal may be adjusted through a background upgrade or a download upgrade system.
As shown in fig. 2, in another embodiment of the present application, the step S103, when receiving the delivered message, of determining whether the delivered message meets the preset execution condition of the terminal, includes the following steps:
and S1031, judging whether the type of the issued message is a preset type of the terminal.
And S1032, when the type of the sent message is the preset type of the terminal, judging whether the index value and the data packet length of the sent message are respectively the preset index value and the preset data packet length of the terminal.
S1033, if the index value and the data packet length of the issued message are the preset index value and the preset data packet length of the terminal, judging whether the password verification result of the issued message is correct.
S1034, when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal.
It should be noted that some malicious software in the network layer may be automatically downloaded and installed in the background, and the software may simulate protocols of different operating systems to issue control messages or data messages, and the packet configurations of these issued messages and standard messages are very similar, such as packet headers, index values, lengths, etc. of the packets, but there still exists at least one or more of the type of the issued message, the index information (index value), and the packet length that are not supported by the terminal. If the kernel of the terminal does not conform to the standard protocol of the operating system or the standard protocol of the operating system but has a certain vulnerability, the issued message which does not conform to the standard protocol of the operating system is sent to the kernel, and the kernel can repeatedly refresh or repeatedly switch ports and the like, so that the user cannot normally use the terminal; the terminal and the host can not establish a data service connection channel with the outside (the host), and a user can not normally use the terminal.
As shown in fig. 3, in another embodiment of the present application, the step S104, executing the operation corresponding to the message issuing, includes the following steps:
and S1041, responding by using the kernel of the terminal according to the type, the index value, the data packet length and the password verification result of the issued message.
S1042, generating a response result corresponding to the issued message.
And S1043, sending a response result through the data service connection channel.
In another embodiment of the present application, the step S105 of generating a feedback message corresponding to the delivered message further includes: and generating different feedback messages according to the different types of issued messages.
In the embodiment of the application, when the issued message is determined not to belong to the message supported by the terminal according to the type of the issued message, the index value, the data packet length and the judgment result of the password verification, different feedback messages are generated according to different types of the issued message, and the feedback messages are sent to the host through the data service connection channel.
For example, if the issued message causes an exception to a core processing subsystem of the terminal, for example, the null pointer is not processed or the length of the received data packet exceeds the length of the preset data packet, which further causes the terminal to be continuously restarted or the port to be repeatedly refreshed, so that the user cannot use the terminal, the embodiment of the present application has performed corresponding processing on the issued message not supported by the terminal before the issued message is sent to the core processing subsystem of the terminal, so as to ensure that the issued message not supported by the terminal is not sent to the core processing subsystem of the terminal, and the exception of the core processing subsystem is not caused. For example, data sent by a host or a network, especially a control message sent by an analog host, is a sent message that a terminal must respond to, but the sent message may cause an abnormality of a terminal kernel or an upper-layer host, which affects normal use of a user.
As shown in fig. 4, in another embodiment of the present application, the step S1033 of determining whether the password verification result of the delivered message is correct includes the following steps:
s10331, judging whether the instruction for switching the debugging port (adb debugging port) of the terminal in the issued message is legal or not.
S10332, if the instruction for switching the debugging port (adb debugging port) of the terminal is legal, determining that the password verification result of the issued message is correct.
It should be noted that, an adb debugging port of a terminal is opened by default at present, and board side information of the terminal can be modified through the adb debugging port, so that the method performs password verification on the issued message by judging whether an instruction for switching the adb debugging port in the issued message is legal or not, opens a processing message for closing the adb debugging port at the same time, closes the adb debugging port by default, opens the adb debugging port only when a password verification result of the issued message is correct, and otherwise, cannot be used, so that the safety of the terminal can be improved, and the influence of malicious tampering on the board side information of the terminal on normal use of a user is avoided.
In another embodiment of the application, when a user uses the terminal for the first time through a USB interface, wifi or bluetooth, etc., the user needs to select to install corresponding software to the host or the terminal, the installed software is used to set network parameters or other values, when the terminal establishes a data service connection channel with the host and the user performs data service through the data service connection channel, at this time, the software is automatically pushed from a network layer or the user performs misoperation to download and install software that does not conform to different operating system protocols, and the installed software will automatically issue some messages to the kernel of the terminal.
Illustratively, when a user uses the terminal through a USB interface, part of software sends an issued message (control message or data message) to a kernel of the terminal through the USB interface (e.g., a network card, etc.), processes the issued message, directly sends the issued message to the kernel of the terminal for the issued message meeting a preset execution condition of the terminal, responds according to the type, index value, data packet length and password verification result of the issued message by using the kernel of the terminal, generates a response result corresponding to the issued message, sends the response result to a host through a data service connection channel, and the terminal normally operates, so that the user can normally use the terminal; for the issued message which does not meet the preset execution condition of the terminal, a feedback message corresponding to the issued message is generated, the feedback message is sent to the host through a data service connection channel between the terminal and the host, and specifically, a corresponding protocol specified value is fed back to the host according to the type of the issued message, an index value, a data packet length and a protocol specification of password verification. By carrying out different processing on different issued messages, the terminal is prevented from being attacked by illegal issued messages, and abnormal phenomena such as repeated restart or crash and the like can not occur in the terminal, so that the safety and the stability of the terminal are improved, and the user experience is further improved.
Illustratively, malware or other methods on the host send a request message to the terminal, which may issue a USB control message, an HTTP message, or other types of request messages, for example, a setup data packet beginning with 80 and C0, after receiving the request message, the terminal needs to determine the type of the request message, and if the request message is not a preset type supported by the terminal, the terminal directly sends a feedback message to the host; if the message is a preset type supported by the terminal, further judging the index information (index value) of the request message (it needs to be explained that the request message which does not conform to the standard protocol or is not supported by the terminal is issued according to the format defined by the USB protocol standard or other protocols basically), if the index information of the request message is supported by the terminal, further judging the data packet length of the request message, and if the index information of the request message is not supported by the terminal, directly sending a feedback message to the host; if the data packet length is not supported by the terminal, directly sending a feedback message to the host; if the mode is switched to the mode with the debugging port, whether the password is correct needs to be further verified, and if the password is verified to be correct, the debugging port can be normally switched.
For example, as long as any one of the type, index value, packet length, password check, and the like of the request message is not supported by the terminal, the corresponding kernel specification value is directly returned, for example, if an interface corresponding to the issued message does not exist in the kernel of the terminal, the kernel specification value without the interface is directly returned to the host; if an interface corresponding to the issued message exists in the kernel of the terminal, but the packet length of the issued message and the like do not meet the requirements of the standard protocol of the operating system, directly returning a kernel specified value with inconsistent packet length; and if the kernel of the terminal has incomplete judgment on the interface operation, and the phenomenon of null pointer occurs, directly returning to null. And only when the type, the index value, the data packet length, the password verification and the like of the request message are all supported by the terminal, the request message is sent to a kernel of the terminal, the kernel of the terminal responds according to the request message, and meanwhile, the response result is sent to the host.
The method comprises the steps that the type, the index value, the data packet length, the password verification and the like of a request message issued by a host or other modes are judged, and if the request message which does not accord with the protocol standard of an operating system is issued to a terminal, the terminal can perform interception processing by using the index value and the data packet length of the request message; if the request message without the interface is sent to the terminal, the terminal can judge according to the type of the request message supported by the terminal, and perform exception handling operation on the request message of the type which is not supported; if a switching instruction is issued to the terminal, the switching instruction is used for switching the terminal from a network card mode to a mode containing a diagnosis port and an android debugging bridge, password verification steps can be added to the terminal, each terminal has an independent password, whether the switching instruction is executed or not is determined according to whether a password verification result is correct or not, and if the verification result is incorrect, the terminal cannot be switched to the mode containing the diagnosis port and the android debugging bridge, so that the terminal can be effectively prevented from being maliciously attacked by external messages or tampering board side information, abnormal conditions that a user cannot use or crashes and the like due to loss of the board side information are avoided, and the safety and stability of restarting the terminal are improved.
Fig. 5 is a device for processing a request message according to an embodiment of the present application, where the device is applied to a terminal, and the device includes:
the detection unit 11 is configured to detect whether the terminal establishes a data service connection channel with the outside;
a first judging unit 12, configured to, when a data service connection channel is established between the terminal and the outside, judge whether an issued message is received through the data service connection channel;
a second judging unit 13, configured to, when receiving the delivered message, judge whether the delivered message meets a preset execution condition of the terminal;
and the execution unit 14 is configured to execute an operation corresponding to the issued message when the issued message meets a preset execution condition of the terminal.
In another embodiment of the present application, the second judging unit 13 further includes:
a feedback message generating subunit, configured to generate a feedback message corresponding to the issued message when the issued message does not meet the preset execution condition of the terminal;
and the feedback message sending subunit is used for sending the feedback message through the data service connection channel.
The embodiment of the present application further provides a computer-readable storage medium, on which a processing program of a request message is stored, and when being executed by a processor, the processing program of the request message implements the steps of the processing method of the request message as shown in fig. 1.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A processing method of a request message is applied to a terminal, and the method comprises the following steps:
detecting whether a terminal establishes a data service connection channel with the outside or not;
when the terminal establishes a data service connection channel with the outside, judging whether a sent message is received through the data service connection channel;
when the issued message is received, judging whether the issued message meets the preset execution condition of the terminal;
and if so, executing the operation corresponding to the issued message.
2. The method for processing the request message according to claim 1, wherein the determining whether the delivered message satisfies a preset execution condition of the terminal comprises:
if not, generating a feedback message corresponding to the issued message;
and sending the feedback message through the data service connection channel.
3. The method for processing the request message according to claim 2, wherein the generating the feedback message corresponding to the issued message includes:
and generating different feedback messages according to the issued messages of different types.
4. The method for processing the request message according to claim 1, wherein the determining whether the delivered message satisfies a preset execution condition of the terminal comprises:
judging whether the type of the issued message is a preset type of the terminal;
when the type of the issued message is the preset type of the terminal, judging whether the index value and the data packet length of the issued message are respectively the preset index value and the preset data packet length of the terminal;
if yes, judging whether the password verification result of the issued message is correct or not;
and when the password verification result of the issued message is correct, determining that the issued message meets the preset execution condition of the terminal.
5. The method according to claim 4, wherein the executing the operation corresponding to the issued message comprises:
responding by using the kernel of the terminal according to the type, the index value, the data packet length and the password verification result of the issued message;
generating a response result corresponding to the issued message;
and sending the response result through the data service connection channel.
6. The method of claim 4, wherein the determining whether the password verification result of the delivered message is correct comprises:
judging whether an instruction for switching a debugging port of the terminal in the issued message is legal or not;
and if so, determining that the password verification result of the issued message is correct.
7. The method for processing the request message according to claim 1, wherein the method further comprises:
and adjusting the preset execution condition of the terminal according to the difference of the interface types of the terminal.
8. A device for processing a request message, applied to a terminal, the device comprising:
the detection unit is used for detecting whether the terminal establishes a data service connection channel with the outside;
a first judging unit, configured to judge whether an issued message is received through a data service connection channel when the terminal establishes the data service connection channel with the outside;
the second judging unit is used for judging whether the issued message meets the preset execution condition of the terminal or not when the issued message is received;
and the execution unit is used for executing the operation corresponding to the issued message when the issued message meets the preset execution condition of the terminal.
9. The apparatus for processing the request message according to claim 8, wherein the second determining unit further comprises:
a feedback message generating subunit, configured to generate a feedback message corresponding to the issued message when the issued message does not meet a preset execution condition of the terminal;
and the feedback message sending subunit is configured to send the feedback message through the data service connection channel.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a processing program of a request message, which when executed by a processor implements the steps of the processing method of a request message according to any one of claims 1 to 7.
CN201811361342.0A 2018-11-15 2018-11-15 Method and device for processing request message and computer readable storage medium Active CN111193690B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811361342.0A CN111193690B (en) 2018-11-15 2018-11-15 Method and device for processing request message and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811361342.0A CN111193690B (en) 2018-11-15 2018-11-15 Method and device for processing request message and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111193690A true CN111193690A (en) 2020-05-22
CN111193690B CN111193690B (en) 2023-08-22

Family

ID=70708961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811361342.0A Active CN111193690B (en) 2018-11-15 2018-11-15 Method and device for processing request message and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111193690B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116743885A (en) * 2023-08-15 2023-09-12 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060058015A1 (en) * 2004-09-14 2006-03-16 Ntt Docomo, Inc. Application control system and application control method
CN1829144A (en) * 2005-02-28 2006-09-06 株式会社日立制作所 Cryptographic communication system and method
US20120076010A1 (en) * 2010-09-23 2012-03-29 Motorola, Inc. Method for determining data rate and packet length in mobile wireless networks
CN102938034A (en) * 2012-10-26 2013-02-20 飞天诚信科技股份有限公司 Working method for conversion device
CN103458406A (en) * 2012-06-04 2013-12-18 北京三星通信技术研究有限公司 Terminal data access method and device
CN104008158A (en) * 2014-05-27 2014-08-27 青岛海信移动通信技术股份有限公司 Data verification method, verification device and mobile terminal
CN104156328A (en) * 2013-05-15 2014-11-19 中兴通讯股份有限公司 Method for identifying type of operating system and USB device
CN105471940A (en) * 2014-08-22 2016-04-06 中兴通讯股份有限公司 Data processing method, data transmitting and receiving terminal and data transmission system
CN106022106A (en) * 2016-05-30 2016-10-12 努比亚技术有限公司 Application installation method and device and terminal
CN107679423A (en) * 2017-10-10 2018-02-09 上海闻泰电子科技有限公司 Partition integrity inspection method and device
CN107846432A (en) * 2016-09-19 2018-03-27 北京智驾互联信息服务有限公司 Data processing equipment and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060058015A1 (en) * 2004-09-14 2006-03-16 Ntt Docomo, Inc. Application control system and application control method
CN1829144A (en) * 2005-02-28 2006-09-06 株式会社日立制作所 Cryptographic communication system and method
US20120076010A1 (en) * 2010-09-23 2012-03-29 Motorola, Inc. Method for determining data rate and packet length in mobile wireless networks
CN103458406A (en) * 2012-06-04 2013-12-18 北京三星通信技术研究有限公司 Terminal data access method and device
CN102938034A (en) * 2012-10-26 2013-02-20 飞天诚信科技股份有限公司 Working method for conversion device
CN104156328A (en) * 2013-05-15 2014-11-19 中兴通讯股份有限公司 Method for identifying type of operating system and USB device
CN104008158A (en) * 2014-05-27 2014-08-27 青岛海信移动通信技术股份有限公司 Data verification method, verification device and mobile terminal
CN105471940A (en) * 2014-08-22 2016-04-06 中兴通讯股份有限公司 Data processing method, data transmitting and receiving terminal and data transmission system
CN106022106A (en) * 2016-05-30 2016-10-12 努比亚技术有限公司 Application installation method and device and terminal
CN107846432A (en) * 2016-09-19 2018-03-27 北京智驾互联信息服务有限公司 Data processing equipment and system
CN107679423A (en) * 2017-10-10 2018-02-09 上海闻泰电子科技有限公司 Partition integrity inspection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李宝静: "Android恶意软件无感植入技术的研究与防范", 《信息技术》 *
李宝静: "Android恶意软件无感植入技术的研究与防范", 《信息技术》, 2 October 2015 (2015-10-02), pages 164 - 168 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116743885A (en) * 2023-08-15 2023-09-12 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium
CN116743885B (en) * 2023-08-15 2023-10-13 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium

Also Published As

Publication number Publication date
CN111193690B (en) 2023-08-22

Similar Documents

Publication Publication Date Title
JP3900501B2 (en) Network connection control program, network connection control method, and network connection control system
EP3476101B1 (en) Method, device and system for network security
KR102195788B1 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
CN108768960B (en) Virus detection method, device, storage medium and computer equipment
CN109922062B (en) Source code leakage monitoring method and related equipment
CN103166996B (en) HTTP connects and HTTPS connects self-adaptation method, Apparatus and system
CN102663274A (en) Method and system for detecting remote computer-invading behavior
US20180191520A1 (en) Gateway and diagnosing method thereof
KR102379720B1 (en) System for controlling data flow in virtualization terminal and method of the same
JP2006243878A (en) Unauthorized access detection system
GB2532630A (en) Network intrusion alarm method and system for nuclear power station
CN104935551A (en) Webpage tampering protecting device and method thereof
CN111193690A (en) Request message processing method and device and computer readable storage medium
CN112910882B (en) Network management method, device, system and computer readable storage medium
CN113226858B (en) Information processing apparatus
JP2020119596A (en) Log analysis system, analysis device, analysis method, and analysis program
US10785242B1 (en) Intrusion detection in airborne platform
WO2020113401A1 (en) Data detection method, apparatus and device
JP2007213550A (en) Network connection control program, network connection control method, and network connection control system
US10637877B1 (en) Network computer security system
Negi et al. Intrusion Detection & Prevention in Programmable Logic Controllers: A Model-driven Approach
KR101483859B1 (en) A method of stopping malicious code using a management system monitering the status of the vaccine
CN108667773B (en) Network protection system, method, device and server
JP4412489B2 (en) Defense policy creation system and method for unauthorized access and program thereof
JP2005085157A (en) Improper access detection device, improper access detection method, and management terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant