CN111770161B - https sniffing jump method and device - Google Patents

https sniffing jump method and device Download PDF

Info

Publication number
CN111770161B
CN111770161B CN202010594799.7A CN202010594799A CN111770161B CN 111770161 B CN111770161 B CN 111770161B CN 202010594799 A CN202010594799 A CN 202010594799A CN 111770161 B CN111770161 B CN 111770161B
Authority
CN
China
Prior art keywords
https
link
domain name
group
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010594799.7A
Other languages
Chinese (zh)
Other versions
CN111770161A (en
Inventor
杨松
刘涛
商智洲
李永博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010594799.7A priority Critical patent/CN111770161B/en
Publication of CN111770161A publication Critical patent/CN111770161A/en
Application granted granted Critical
Publication of CN111770161B publication Critical patent/CN111770161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9558Details of hyperlinks; Management of linked annotations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/148Migration or transfer of sessions

Abstract

The application discloses a https sniffing jump method and a https sniffing jump device, and relates to the technical field of intelligent search. The specific implementation scheme is as follows: acquiring at least one link on a current page; grouping at least one link by domain name; for each group of domain names, initiating access to a server corresponding to the group of domain names by using an https protocol in advance to obtain an access result; and responding to the operation of detecting the click of the target link, and if the access result of the domain name group to which the target link belongs is successful, jumping to the page corresponding to the target link through an https protocol. The implementation method can know the support condition of the next page to https in advance, and can select a proper protocol for jumping. Meanwhile, pre-connection can be established with a target website in a sniffing mode, so that the opening speed of the webpage is increased. The method is also applicable to searching based on artificial intelligence pictures.

Description

https sniffing jump method and device
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of intelligent search, and is also applicable to searching based on artificial intelligent pictures.
Background
With the development of the internet, the hijacking of network traffic is more and more serious. Since the http protocol belongs to the plaintext protocol, the web page is easily hijacked. For the security of the web page, the web page can be encrypted by using the https protocol, so that harmful contents are prevented from being forcibly added by some third-party organizations or hackers during the transmission of the web page. Since different websites belong to different companies and it is impossible that all websites support the https protocol at the same time, there will be a large number of websites on the internet that use the http protocol and the https protocol, respectively.
The https protocol brings security and also brings the problem that the opening speed of the web page is reduced. Since the http protocol is more complicated than the http protocol connection establishment process, the time for creating the connection is longer, and the web page opening speed is reduced from the user's perspective.
Disclosure of Invention
The disclosure provides a method, a device, equipment and a storage medium for a https sniffing jump method.
According to a first aspect of the present disclosure, there is provided a sniffing jump method of https, including: acquiring at least one link on a current page; grouping at least one link by domain name; for each group of domain names, initiating access to a server corresponding to the group of domain names by using an https protocol in advance to obtain an access result; and responding to the operation of detecting the click of the target link, and if the access result of the domain name group to which the target link belongs is successful, jumping to the page corresponding to the target link through an https protocol.
According to a second aspect of the present disclosure, there is provided a sniffing jump apparatus of https, comprising: an acquisition unit configured to acquire at least one link on a current page; a grouping unit configured to group at least one link by domain name; the connection unit is configured to initiate access to the server corresponding to each group of domain names by using an https protocol in advance to obtain an access result; and the jumping unit is configured to respond to the operation of detecting the clicking of the target link, and jump to the page corresponding to the target link through the https protocol if the access result of the domain name group to which the target link belongs is successful.
According to a third aspect of the present disclosure, there is provided an electronic apparatus, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the first aspects.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions, wherein the computer instructions are for causing a computer to perform the method of any one of the first aspects.
According to a fifth aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of the first aspects.
According to the technology of the application, the problem that the webpage opening speed is slow or the webpage cannot be opened due to the adoption of the https protocol is solved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for sniffing jump of https according to the present application;
FIG. 3 is a schematic diagram of an application scenario of a sniff jump method according to https of the present application;
FIG. 4 is a flow diagram of yet another embodiment of a method for sniffing jump in https according to the present application;
FIG. 5 is a schematic diagram of an embodiment of a sniffing jump apparatus for https according to the present application;
fig. 6 is a block diagram of an electronic device for implementing a method for sniffing jumps for https according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the https sniff jump method or https sniff jump apparatus of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, and so forth.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 105 may be a server providing various services, such as a background web server providing support for web pages displayed on the terminal devices 101, 102, 103. The background web server may analyze and perform other processing on the received data such as the web page request, and feed back a processing result (e.g., web page data) to the terminal device.
It should be noted that the https sniffing jump method provided by the embodiment of the present application is generally executed by a terminal device, and accordingly, the https sniffing jump apparatus is generally disposed in the terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for an implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a sniff jump method of https according to the present application is shown. The https sniffing jump method comprises the following steps:
step 201, at least one link on the current page is obtained.
In this embodiment, a browser of an execution subject (e.g., a terminal device shown in fig. 1) of the https sniff jump method opens a web page and then acquires at least one link on the current page. The page is linkable to another page. But the browser does not know which link the user wants to be focused on next, and therefore acquires all links on the current page.
At least one link is grouped by domain name, step 202.
In this embodiment, although the links are different, they may belong to the same domain name. And thus may be grouped by domain name. Links of the same domain name point to the same server.
Step 203, for each group of domain names, initiating access to the server corresponding to the group of domain names by using an https protocol in advance, and obtaining an access result.
In this embodiment, for each group of domain names, the https connection between the terminal device and the server corresponding to the group of domain names is tentatively established, and then the resource pointed by the link under the group of domain names is accessed. Resources that are not pointed to by links on the current page may also be accessed. Since the purpose of the pre-connection is only to establish a connection of the terminal device to the server, there is no concern about what the accessed content is. The access result is success or failure. The reason for the failure may be that the server does not support the https protocol, or that the current network environment is not good and https connection cannot be established.
And step 204, responding to the operation of detecting the click of the target link, and if the access result of the domain name group to which the target link belongs is successful, jumping to a page corresponding to the target link through an https protocol.
In this embodiment, the target link is one of the at least one link. And after clicking the target link, the user can jump to the page corresponding to the target link. If the previous access result to the domain name group to which the target link belongs is successful, which indicates that the server supports https and the current network state is good, the page corresponding to the target link can be skipped through the https protocol.
In some optional implementation manners of this embodiment, if the result of the previous access to the domain name group to which the target link belongs is failure, which indicates that the server does not support https or the current network state is not good, the page corresponding to the target link is skipped through an http protocol. The condition that the https protocol fails to jump can be avoided, and the user experience is better.
In some optional implementations of this embodiment, the method further includes: for a link in at least one link, acquiring a resource domain name of a resource to be loaded on a page pointed by the link; and for each resource domain name, establishing https connection of a server corresponding to the resource domain name in advance. In addition to increasing sniffing of the primary domain name, sniffing of other resource domain names may also be increased. The method mainly aims to improve the speed of acquiring resources after the page is skipped by a pre-connection mode.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the https sniff jump method according to the present embodiment. In the application scenario of fig. 3, the user opens page a using the terminal device. The browser may obtain link 1, link 2, link 3, link 4 on page a. The links are then grouped according to domain name, with the domain names of link 1, link 2 being the same, corresponding to server 1. The domain names of the link 3 and the link 4 are the same and correspond to the server 2. The terminal device attempts to access the server 1 and the server 2 through https, respectively. Access to server 1 fails and access to server 2 succeeds. If the user clicks link 1 or link 2, then a jump is made to page B via http. If the user clicks on link 3 or link 4, then a jump is made to page C via https.
The method provided by the above embodiment of the present application can dynamically select the protocol type. On the basis of keeping the accessibility of the webpage, the safety of webpage access is improved. The problem of reduction of the speed of the webpage caused by the use of the https protocol is reduced by means of pre-connection. The implementation mode is simple.
With further reference to FIG. 4, a flow 400 of yet another embodiment of a sniff jump method for https is shown. The flow 400 of the https sniffing jump method includes the following steps:
step 401, at least one link on the current page is obtained.
Step 402, grouping the at least one link by domain name.
Steps 401-402 are substantially the same as step 201-202 and thus are not described again.
Step 403, for each group of domain names, initiating access to a predetermined file under a root directory of a server corresponding to the group of domain names by using an https protocol in advance, and obtaining an access result.
In this embodiment, in the process of jumping from the a page to the B page, the purpose of sniffing is mainly to determine whether the domain name of the B page supports https, and does not depend on the specific content requested, so in an actual item, a predetermined file, for example, a very small picture, is stored under the root directory of the domain name of the B page. It is this thumbnail that https actually used by the a page accesses. If the small picture can be acquired, the access is successful, otherwise, the access is failed.
In some optional implementation manners of this embodiment, an https request including a timestamp parameter is initiated to a predetermined file under a root directory of a server corresponding to the group of domain names in advance. In fact, if https is supported from the a page to the B page, logically speaking, the https protocol can be skipped directly without sniffing. However, since the web page is stateless, the B page is sniffed each time the a page is accessed. In addition, because the environment of the mobile network on the mobile phone is also changing, the current B page can support https, and cannot always support https at all. To solve the needs of these two aspects, in the actual project, when a small picture for sniffing is requested, a parameter is added with a time stamp. When this timestamp does not change, multiple requests may reduce stress on the server due to a hit in the cache. Meanwhile, the timestamp can also change along with the time, so that the sniffing state cannot be updated timely. The time stamp parameter may be added in real time or may be added periodically, for example, every 1 minute. The timed addition of the timestamp parameter may reduce stress on the server. Adding timestamp parameters in real time can ensure that the sniff state is updated in time.
Step 404, in response to the operation of detecting the click of the target link, if the access result of the domain name group to which the target link belongs is successful, jumping to the page corresponding to the target link through the https protocol.
Step 404 is substantially the same as step 204 and thus will not be described again.
As can be seen from fig. 4, compared with the embodiment corresponding to fig. 2, the flow 400 of the https sniff jump method in this embodiment embodies the steps of accessing a predetermined file. Therefore, the scheme described in the embodiment can further accelerate the sniffing speed and update the sniffing state in time.
With further reference to fig. 5, as an implementation of the methods shown in the above-mentioned figures, the present application provides an embodiment of a https sniffing jump apparatus, where the apparatus embodiment corresponds to the method embodiment shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 5, the https sniff jump apparatus 500 of the present embodiment includes: an acquisition unit 501, a grouping unit 502, a connection unit 503, and a hopping unit 504. The acquiring unit 501 is configured to acquire at least one link on a current page; a grouping unit 502 configured to group at least one link by domain name; the connection unit 503 is configured to, for each group of domain names, initiate access to servers corresponding to the group of domain names using an https protocol in advance, and obtain an access result; and the skipping unit 504 is configured to skip to the page corresponding to the target link through the https protocol in response to detecting the operation of clicking the target link, if the access result of the domain name group to which the target link belongs is successful.
In this embodiment, the specific processing of the acquisition unit 501, the grouping unit 502, the connection unit 503 and the jumping unit 504 of the https sniffing jumping device 500 may refer to step 201, step 202, step 203 and step 204 in the corresponding embodiment of fig. 2.
In some optional implementations of this embodiment, the jumping unit 504 is further configured to: and if the access result of the domain name corresponding to the target link is failure, jumping to the page corresponding to the target link through an http protocol.
In some optional implementations of this embodiment, the connection unit 503 is further configured to: initiating access to a predetermined file under a root directory of a server corresponding to the group of domain names by using an https protocol in advance; if the file is obtained, the access result is successful, otherwise, the access result is failed.
In some optional implementations of this embodiment, the connection unit 503 is further configured to: and initiating an https request comprising a timestamp parameter to a predetermined file under a root directory of the server corresponding to the group of domain names in advance.
In some optional implementations of this embodiment, the connection unit 503 is further configured to: for a link in at least one link, acquiring a resource domain name of a resource to be loaded on a page pointed by the link; and for each resource domain name, establishing https connection of a server corresponding to the resource domain name in advance.
There is also provided, in accordance with an embodiment of the present application, an electronic device, a readable storage medium, and a computer program product.
As shown in fig. 6, it is a block diagram of an electronic device according to the method for sniffing jump of https in the embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 6, the electronic apparatus includes: one or more processors 601, memory 602, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 6, one processor 601 is taken as an example.
The memory 602 is a non-transitory computer readable storage medium as provided herein. Wherein the memory stores instructions executable by at least one processor to cause the at least one processor to perform the method for https sniffing jumps provided herein. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to perform the method of sniffing jumps of https as provided herein.
The memory 602 is used as a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method for sniffing jump of https in the embodiment of the present application (for example, the obtaining unit 501, the grouping unit 502, the connecting unit 503, and the jumping unit 504 shown in fig. 5). The processor 601 executes various functional applications of the server and data processing, i.e., a method for realizing the sniff jump of https in the above-described method embodiment, by running non-transitory software programs, instructions and modules stored in the memory 602.
The memory 602 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by use of the electronic device according to sniffing jump of https, or the like. Further, the memory 602 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 602 optionally includes memory remotely located from processor 601, and these remote memories may be connected over a network to https's electronics that sniff hops. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the method for sniffing jumps of https may further comprise: an input device 603 and an output device 604. The processor 601, the memory 602, the input device 603 and the output device 604 may be connected by a bus or other means, and fig. 6 illustrates the connection by a bus as an example.
The input device 603 may receive input numeric or character information and key signal inputs related to user settings and function controls of the electronic device that generate the https sniff jump, such as a touch screen, keypad, mouse, track pad, touch pad, pointer stick, one or more mouse buttons, track ball, joystick, etc. The output devices 604 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the protocol type can be dynamically selected. On the basis of keeping the accessibility of the webpage, the safety of webpage access is improved. The problem of reduction of the speed of the webpage caused by the use of the https protocol is reduced by means of pre-connection. The implementation mode is simple.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments are not intended to limit the scope of the present disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (13)

1. A https sniffing jump method includes:
acquiring at least one link on a current page;
grouping the at least one link by domain name, wherein the links of the same domain name point to the same server;
for each group of domain names, initiating access to a server corresponding to the group of domain names by using an https protocol in advance to obtain an access result;
responding to the operation of detecting the click of the target link, and if the access result of the domain name group to which the target link belongs is successful, jumping to the page corresponding to the target link through the https protocol.
2. The method of claim 1, wherein the method further comprises:
and if the access result of the domain name corresponding to the target link is failure, jumping to the page corresponding to the target link through an http protocol.
3. The method according to claim 1, wherein the initiating, by using https protocol in advance, access to the server corresponding to the group of domain names to obtain an access result includes:
initiating access to a predetermined file under a root directory of a server corresponding to the group of domain names by using an https protocol in advance;
if the file is obtained, the access result is successful, otherwise, the access result is failed.
4. The method according to claim 3, wherein the initiating, by using https protocol in advance, access to a predetermined file under a root directory of a server corresponding to the group of domain names includes:
and initiating an https request comprising a timestamp parameter to a predetermined file under a root directory of the server corresponding to the group of domain names in advance.
5. The method of claim 1, wherein the method further comprises:
for a link in the at least one link, acquiring a resource domain name of a resource to be loaded on a page pointed by the link;
and for each resource domain name, establishing https connection of a server corresponding to the resource domain name in advance.
6. A sniffing jump device of https, comprising:
an acquisition unit configured to acquire at least one link on a current page;
a grouping unit configured to group the at least one link by domain name, wherein links of the same domain name point to the same server;
the connection unit is configured to initiate access to the server corresponding to each group of domain names by using an https protocol in advance to obtain an access result;
and the jumping unit is configured to respond to the operation of detecting the clicking of the target link, and jump to the page corresponding to the target link through the https protocol if the access result of the domain name group to which the target link belongs is successful.
7. The apparatus of claim 6, wherein the jumping unit is further configured to:
and if the access result of the domain name corresponding to the target link is failure, jumping to the page corresponding to the target link through an http protocol.
8. The apparatus of claim 6, wherein the connection unit is further configured to:
initiating access to a predetermined file under a root directory of a server corresponding to the group of domain names by using an https protocol in advance;
if the file is obtained, the access result is successful, otherwise, the access result is failure.
9. The apparatus of claim 8, wherein the connection unit is further configured to:
and initiating an https request comprising a timestamp parameter to a predetermined file under a root directory of the server corresponding to the group of domain names in advance.
10. The apparatus of claim 6, wherein the connection unit is further configured to:
for a link in the at least one link, acquiring a resource domain name of a resource to be loaded on a page pointed by the link;
and for each resource domain name, establishing https connection of a server corresponding to the resource domain name in advance.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-5.
13. A computer-readable storage medium comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-5.
CN202010594799.7A 2020-06-28 2020-06-28 https sniffing jump method and device Active CN111770161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010594799.7A CN111770161B (en) 2020-06-28 2020-06-28 https sniffing jump method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010594799.7A CN111770161B (en) 2020-06-28 2020-06-28 https sniffing jump method and device

Publications (2)

Publication Number Publication Date
CN111770161A CN111770161A (en) 2020-10-13
CN111770161B true CN111770161B (en) 2022-06-07

Family

ID=72722122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010594799.7A Active CN111770161B (en) 2020-06-28 2020-06-28 https sniffing jump method and device

Country Status (1)

Country Link
CN (1) CN111770161B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10320746B2 (en) * 2014-05-12 2019-06-11 Michael C. Wood Computer security system and method based on user-intended final destination
CN113489678A (en) * 2021-06-01 2021-10-08 深圳市景阳信息技术有限公司 Network protocol switching method and device, computing equipment and storage medium
CN113905033A (en) * 2021-10-25 2022-01-07 北京知道创宇信息技术股份有限公司 Webpage jump processing method and device, storage medium and electronic equipment
CN114900330A (en) * 2022-04-07 2022-08-12 京东科技信息技术有限公司 Page protection method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027600A (en) * 2016-04-29 2016-10-12 北京小米移动软件有限公司 Connection establishing method and device
CN106528657A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Control method and device for browser skipping to application program
CN108256104A (en) * 2018-02-05 2018-07-06 恒安嘉新(北京)科技股份公司 Internet site compressive classification method based on multidimensional characteristic
CN109359252A (en) * 2018-10-30 2019-02-19 北京小米移动软件有限公司 Browser selection method and device
CN109600458A (en) * 2019-02-22 2019-04-09 北京知道创宇信息技术股份有限公司 Website access method and device
CN109688127A (en) * 2018-12-20 2019-04-26 深圳市吉祥腾达科技有限公司 A kind of web authentication method for supporting HTTPS page jump
CN110191203A (en) * 2019-05-15 2019-08-30 聚好看科技股份有限公司 Realize the method and electronic equipment of server dynamic access

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205078A (en) * 2014-06-26 2015-12-30 优视科技有限公司 Webpage access method and device
CN105791451B (en) * 2014-12-22 2020-02-21 华为技术有限公司 Message response method and device
US10044620B2 (en) * 2015-05-01 2018-08-07 Hughes Network Systems, Llc Multi-phase IP-flow-based classifier with domain name and HTTP header awareness
US9888290B1 (en) * 2016-03-24 2018-02-06 Sprint Communications Company L.P. Service denial notification in secure socket layer (SSL) processing
PT3247084T (en) * 2016-05-17 2019-06-06 Nolve Dev S L Server and method for providing secure access to web-based services
CN106453675B (en) * 2016-09-19 2022-07-08 网宿科技股份有限公司 302 jump method, URL (Uniform resource locator) generation method and system and domain name resolution method and system
US11308592B2 (en) * 2018-10-04 2022-04-19 Canon Kabushiki Kaisha Image processing method, image processing apparatus, imaging apparatus, and storage medium, that correct a captured image using a neutral network
CN110266661B (en) * 2019-06-04 2021-09-14 东软集团股份有限公司 Authorization method, device and equipment
CN111079040B (en) * 2019-11-26 2023-09-01 北京达佳互联信息技术有限公司 Resource sniffing method, device, terminal, server and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027600A (en) * 2016-04-29 2016-10-12 北京小米移动软件有限公司 Connection establishing method and device
CN106528657A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Control method and device for browser skipping to application program
CN108256104A (en) * 2018-02-05 2018-07-06 恒安嘉新(北京)科技股份公司 Internet site compressive classification method based on multidimensional characteristic
CN109359252A (en) * 2018-10-30 2019-02-19 北京小米移动软件有限公司 Browser selection method and device
CN109688127A (en) * 2018-12-20 2019-04-26 深圳市吉祥腾达科技有限公司 A kind of web authentication method for supporting HTTPS page jump
CN109600458A (en) * 2019-02-22 2019-04-09 北京知道创宇信息技术股份有限公司 Website access method and device
CN110191203A (en) * 2019-05-15 2019-08-30 聚好看科技股份有限公司 Realize the method and electronic equipment of server dynamic access

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
微信网页版的模拟登录方案;张振扬;《数码世界》;20180201(第02期);全文 *

Also Published As

Publication number Publication date
CN111770161A (en) 2020-10-13

Similar Documents

Publication Publication Date Title
CN111770161B (en) https sniffing jump method and device
US11868591B2 (en) Dynamic user interface customization
US11134101B2 (en) Techniques for detecting malicious behavior using an accomplice model
US9009334B1 (en) Remote browsing session management
US9037975B1 (en) Zooming interaction tracking and popularity determination
CN111158799A (en) Page rendering method and device, electronic equipment and storage medium
US10257316B2 (en) Monitoring of node.js applications
CN112000394B (en) Method, apparatus, device and storage medium for accessing applet
CN111756847B (en) Method and device for supporting https protocol by website
CN104965842A (en) Search recommending method and apparatus
CN111090691B (en) Data processing method and device, electronic equipment and storage medium
JP7087121B2 (en) Landing page processing methods, equipment, equipment and media
US11831735B2 (en) Method and device for processing mini program data
US9722851B1 (en) Optimized retrieval of network resources
KR20210133161A (en) Comments-ordering method, apparatus, device and computer storage medium
US11113455B2 (en) Web page rendering on wireless devices
CN111813623A (en) Page monitoring method and device, electronic equipment and storage medium
CN111246305A (en) Video preview method, device, equipment and storage medium
US9942177B1 (en) Method and system for real-time data updates
CN112764746B (en) Data processing method, device, electronic equipment and storage medium
CN112069137A (en) Method and device for generating information, electronic equipment and computer readable storage medium
CN109145182B (en) Data acquisition method and device, computer equipment and system
JP7307766B2 (en) Traffic adjustment method, apparatus, electronic equipment, computer readable recording medium and computer program
CN115470432A (en) Page rendering method and device, electronic equipment and computer readable medium
CN111273950B (en) Application awakening method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant