CN111832060A - Data processing method and device and electronic equipment - Google Patents

Data processing method and device and electronic equipment Download PDF

Info

Publication number
CN111832060A
CN111832060A CN201910309468.1A CN201910309468A CN111832060A CN 111832060 A CN111832060 A CN 111832060A CN 201910309468 A CN201910309468 A CN 201910309468A CN 111832060 A CN111832060 A CN 111832060A
Authority
CN
China
Prior art keywords
mode
data
dimensions
browser
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910309468.1A
Other languages
Chinese (zh)
Other versions
CN111832060B (en
Inventor
贺跃松
杨浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201910309468.1A priority Critical patent/CN111832060B/en
Publication of CN111832060A publication Critical patent/CN111832060A/en
Application granted granted Critical
Publication of CN111832060B publication Critical patent/CN111832060B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides an information protection method, an information protection device and electronic equipment, wherein the method comprises the following steps: determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes; protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimension, hardware fingerprint dimension, software monitoring dimension and network access dimension; thereby guaranteeing the information security.

Description

Data processing method and device and electronic equipment
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to an information protection method and apparatus, and an electronic device.
Background
With the development of internet technology and browser technology, browsers have become an important channel for most users to obtain information, and users can access web pages in browsers to obtain required information from the web pages.
When a user accesses a webpage by using a browser, the safety of user information is difficult to guarantee, for example, a third-party website such as a map is used for acquiring the position of the user through an IP address, and for example, the third-party website limits the access times of the user according to the hardware fingerprint of the user, and the like; therefore, information security is one of the problems to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides an information protection method for guaranteeing information safety.
Correspondingly, the embodiment of the invention also provides an information protection device and electronic equipment, which are used for ensuring the realization and application of the method.
In order to solve the above problem, an embodiment of the present invention discloses an information protection method, which specifically includes: determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes; protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Optionally, the protecting the schema from the data storage dimension includes: storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Optionally, the method further comprises: and storing the data shared in the mode into a shared data directory.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: drawing a graph according to the drawing parameters corresponding to the mode in the page rendering process; wherein, the drawing parameters corresponding to different modes are different.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: determining pixel points corresponding to a graph to be drawn in a page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
Optionally, the protecting the pattern from the software monitoring dimension includes: presetting a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
Optionally, the protecting the pattern from the network access dimension includes: when a webpage access instruction is obtained, accessing a server of a page corresponding to the webpage access instruction through a server corresponding to the mode, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
The embodiment of the invention also discloses an information protection device, which specifically comprises: the mode determining module is used for determining the current running mode of the browser, wherein the browser comprises a plurality of modes; a pattern protection module to protect the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Optionally, the mode protection module includes: the data protection sub-module is used for storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Optionally, the apparatus further comprises: and the shared protection module is used for storing the data shared in the mode to a shared data directory.
Optionally, the mode protection module includes: the first hardware protection submodule is used for drawing a graph according to the drawing parameters corresponding to the mode in the process of rendering a page; wherein, the drawing parameters corresponding to different modes are different.
Optionally, the mode protection module includes: the second hardware protection submodule is used for determining pixel points corresponding to a graph to be drawn in the process of rendering a page; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
Optionally, the mode protection module includes: the software protection submodule is used for presetting a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
Optionally, the mode protection module includes: the network protection sub-module is used for accessing the server of the page corresponding to the webpage access instruction through the server corresponding to the mode when the webpage access instruction is obtained, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
The embodiment of the invention also discloses a readable storage medium, and when the instructions in the storage medium are executed by a processor of the electronic equipment, the electronic equipment can execute the information protection method in any one of the embodiments of the invention.
An embodiment of the present invention also discloses an electronic device, including a memory, and one or more programs, where the one or more programs are stored in the memory, and configured to be executed by one or more processors, and the one or more programs include instructions for: determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes; protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Optionally, the protecting the schema from the data storage dimension includes: storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Optionally, further comprising instructions for: and storing the data shared in the mode into a shared data directory.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: drawing a graph according to the drawing parameters corresponding to the mode in the page rendering process; wherein, the drawing parameters corresponding to different modes are different.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: determining pixel points corresponding to a graph to be drawn in a page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
Optionally, the protecting the pattern from the software monitoring dimension includes: presetting a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
Optionally, the protecting the pattern from the network access dimension includes: when a webpage access instruction is obtained, accessing a server of a page corresponding to the webpage access instruction through a server corresponding to the mode, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, the browser can comprise a plurality of modes, and after the current running mode of the browser is determined, the mode can be protected through a plurality of dimensions such as a data storage dimension, a hardware fingerprint dimension, a software monitoring dimension, a network access dimension and the like, so that the information safety is guaranteed.
Drawings
FIG. 1 is a flow chart of the steps of an embodiment of a method of information protection of the present invention;
FIG. 2 is a flow chart illustrating the steps of an embodiment of a method for protecting information in a data storage dimension according to the present invention;
FIG. 3 is a flowchart illustrating steps of an embodiment of a method for protecting information of a hardware fingerprint dimension according to the present invention;
FIG. 4 is a flowchart illustrating the steps of an embodiment of a method for protecting information in a software monitoring dimension according to the present invention;
FIG. 5 is a flow chart of steps of an embodiment of a method for information protection for a network access dimension of the present invention;
FIG. 6 is a block diagram of an embodiment of an information protection apparatus according to the present invention;
FIG. 7 is a block diagram of an alternative embodiment of an information protection device of the present invention;
FIG. 8 illustrates a block diagram of an electronic device for information protection, according to an example embodiment;
fig. 9 is a schematic structural diagram of an electronic device for information protection according to another exemplary embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
One of the core ideas of the embodiment of the invention is that a browser can provide a plurality of modes, a user can select different modes in different scenes, and the mode can be protected from a plurality of dimensions in the process of running any mode of the browser, so that the information safety is ensured by protecting data.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of an information protection method according to the present invention is shown, which may specifically include the following steps:
step 102, determining a current operation mode of a browser, wherein the browser comprises a plurality of modes.
Step 104, protecting the mode from a plurality of dimensions, the dimensions including: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
In the embodiment of the invention, the browser can provide multiple modes, and a user can select at least one mode according to the current scene; after the user selects the mode, the browser can operate the mode selected by the user, and then the user can open the webpage according to the requirement in the selected mode. For example, the browser provides an office mode and an entertainment mode, if the current scene is an office scene, the office mode can be selected, and at the moment, the user can open forum type webpages, academic type webpages and other webpages in the mode; if the current scene is a family scene, an entertainment mode can be selected, and at the moment, a user can open webpages such as a travel webpage, a shopping webpage, a game webpage and the like in the mode.
In the embodiment of the invention, in order to ensure the safety of user information, the browser can determine the current operation mode, wherein the current operation mode of the browser can comprise at least one; then, for each mode, the mode can be protected from multiple dimensions, and user information in the mode can be protected. Wherein the dimensions may include a data storage dimension, a hardware fingerprint dimension, a software monitoring dimension, and a network access dimension: the protection of the data storage dimension may refer to protection of locally stored data, the protection of the hardware fingerprint dimension may refer to protection of a hardware fingerprint corresponding to the terminal device, the protection of the software monitoring dimension may refer to protection of monitoring of a third-party plug-in, and the protection of the network access dimension may refer to protection of an IP (Internet protocol) address corresponding to the terminal device. Furthermore, each mode is protected from multiple dimensions, so that local data leakage and tracking are prevented, and information safety is guaranteed.
In summary, in the embodiment of the present invention, the browser may include multiple modes, and after the current operation mode of the browser is determined, the browser may be protected by the mode in multiple dimensions, such as a data storage dimension, a hardware fingerprint dimension, a software monitoring dimension, and a network access dimension, so as to ensure information security.
In another embodiment of the present invention, the protection of the schema from the data storage dimension is described as follows:
referring to fig. 2, a flowchart illustrating steps of an embodiment of a method for protecting information of a data storage dimension according to the present invention is shown, which may specifically include the following steps:
step 202, determining the current running mode of the browser.
Step 204, storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Step 206, storing the data shared in the mode to a shared data directory.
In the embodiment of the present invention, a current operation mode of a browser may be determined, where the current operation mode may include one or more modes; when the mode in which the browser is currently running includes a plurality of modes, the mode can be protected from the data storage dimension for each mode. In the embodiment of the invention, the mode is protected from the data storage dimension, and the data acquired in the mode can be protected; after data is acquired in the mode, such as documents, music, videos, and the like downloaded from a web page, the acquired data may be stored in the data directory corresponding to the mode. The browser is provided with a data directory corresponding to each mode in advance, different data directories can be configured in different modes, and the data acquired in different modes can be stored in different data directories when the browser runs in different modes; therefore, local data in different modes are isolated, and user information corresponding to the different modes is protected respectively. In an optional embodiment of the present invention, when creating a mode, the browser may configure a corresponding data directory for each mode, where the data directory may be automatically configured by the browser, or the data directory may be configured by the browser according to a user operation, which is not limited in this embodiment of the present invention.
In an optional embodiment of the present invention, in the process of storing the data acquired in any mode, the browser may encrypt the data, and then store the encrypted data in the data directory corresponding to the mode, so as to further ensure information security.
In an optional embodiment of the invention, the user can selectively share the data according to the requirement, and after the user selects the shared data, the browser can store the data shared in the mode into the shared data directory. Furthermore, in other modes, the data in the shared data directory can be acquired, and the data sharing among the modes can be realized. The shared data may include a URL (Uniform Resource Locator), a domain name, and the like.
In the embodiment of the invention, after the current operation mode of the browser is determined, the mode can be protected from the data storage dimension, wherein the data directories corresponding to different modes are different, so that the data acquired in the mode can be stored in the data directory corresponding to the mode; therefore, data of each mode is isolated, and user information corresponding to different modes is protected.
In the embodiment of the invention, the shared data can be selected in the mode, then the shared data is stored in the shared data directory, and then the data in the shared data directory can be acquired by other modes, so that the data sharing in different modes can be realized.
In another embodiment of the present invention, the protection of the mode from the hardware fingerprint dimension is described as follows:
referring to fig. 3, a flowchart illustrating steps of an embodiment of a method for protecting hardware fingerprint dimension according to the present invention is shown, which may specifically include the following steps:
step 302, determining the current running mode of the browser.
In the embodiment of the invention, after the current running mode of the browser is determined, the mode can be protected from the hardware fingerprint dimension; the third-party website can track the user in a plurality of ways, wherein one way is to track the user based on the hardware fingerprint of the equipment; therefore, the embodiment of the present invention can protect the mode from the hardware fingerprint dimension by changing the hardware fingerprint (refer to step 304, or step 306), so as to prevent the tracking of the third-party website.
Each hardware environment is fixed and has certain fingerprint characteristics, such as fonts displayed on a webpage, plug-ins downloaded in a browser, video card information, a system and the like, and a third-party website can calculate the hardware fingerprint of a user based on the fingerprint characteristics; therefore, even if different modes are operated on the same terminal, the third-party website can determine that the different modes correspond to the same user, and further track the user. In the process of calculating the hardware fingerprint of the third-party website, the display card information occupies relatively large weight and is determined according to the coordinates of pixel points displayed by the graph in the page; therefore, in the embodiment of the invention, the third-party website can be prevented from identifying that the users corresponding to different modes are the same user by enabling the coordinates of the pixel points corresponding to the graphs in the pages corresponding to the same third-party website to be different in different modes.
And 304, drawing the graph according to the drawing parameters corresponding to the mode in the page rendering process.
In the embodiment of the invention, a mode of enabling the same third website to correspond to the graphs in the page, and corresponding pixel point coordinates are different under different modes is that the graphs are drawn according to drawing parameters corresponding to the modes in the process of rendering the page. The display card of the terminal equipment can support a plurality of drawing parameters, so that the corresponding drawing parameters can be configured for each mode in advance in the browser, a mapping relation between the drawing parameters can be established, and different drawing parameters can be configured for different modes; and after the current operation mode of the browser is determined, the mapping relation can be searched according to the mode, the drawing parameters corresponding to the mode are determined, and then the graph is drawn according to the drawing parameters corresponding to the mode in the process of rendering the page.
Step 306, determining pixel points corresponding to the graph to be drawn in the page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
In the embodiment of the invention, another mode of enabling the same third website to correspond to the graphs in the page and enabling the corresponding pixel point coordinates to be different in different modes is to disturb the pixel points of the pixel points corresponding to the drawn graphs in the process of rendering the page. The method comprises the steps of firstly determining an image to be drawn, namely a graph to be drawn, and then selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn; the selected target pixel point may be selected randomly or according to a preset selection rule, which is not limited in this embodiment of the present invention. Changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values; the preset rule can be set as required, and can be that the difference value between the pixel value after the change and the pixel value before the change corresponding to the target pixel point is smaller than a threshold value; the threshold value can be set as required, specifically, whether the color of the pixel point before the pixel value is changed and the color corresponding to the pixel value after the pixel value is changed can be determined according to the fact that whether the color of the pixel point before the pixel value is changed and the color corresponding to the pixel value after the pixel value is changed are used as reference. For example, if the graph to be drawn is 100 × 100, 10000 pixels are corresponding to the graph, and then 3 pixels can be selected from the 10000 pixels as target pixels, a (R:255, G:182, B:193), B (R:139, G:0, B:139), and C (R:0, G:0, B: 255); the pixel values of the three target pixel points can be changed to obtain A ' (R:255, G192, B203), B ' (R:128, G:0, B:128), and C ' (R:0, G:0, B: 205).
And then the third-party website obtains different display card information of different modes, and correspondingly obtains different hardware fingerprints corresponding to the different modes, so that the users corresponding to the different modes cannot be identified to be the same user, and the user cannot be tracked.
In the embodiment of the invention, after the current running mode of the browser is determined, the mode can be protected from hardware fingerprint dimensionality, wherein one mode can be used for drawing a graph according to drawing parameters corresponding to the mode in the process of rendering a page, and the drawing parameters corresponding to different modes are different; the other mode can be that in the process of rendering the page, pixel points corresponding to the graph to be drawn are determined; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values; and then the display card information of the mode is different from the display card information of other modes, so that the hardware fingerprints corresponding to different modes of the same user are different, the user is prevented from being tracked by a third-party website, and the information safety is guaranteed.
Referring to fig. 4, a flowchart illustrating steps of an embodiment of the information protection method for a software monitoring dimension according to the present invention is shown, which may specifically include the following steps:
step 402, determining the current operation mode of the browser.
In the embodiment of the invention, after the current running mode of the browser is determined, the mode can be protected from a software monitoring dimension, wherein storage software such as a third-party plug-in FLASH (FLASH memory, a nonvolatile memory) can be marked and tracked by a user; thus, embodiments of the present invention may monitor the stored software (see steps 402-408) to protect the patterns from the software monitoring dimension and prevent the tracking of the stored software.
And step 404, presetting a hook function to monitor the set storage software.
And step 406, when the hook function monitors that the page calls the set storage software to store the data, changing the data according to the data identifier corresponding to the mode.
And step 408, storing the changed data into the setting storage software.
In the embodiment of the invention, a hook function can be preset, and the hook function is adopted to monitor the set storage software (such as FLASH), for example, the hook function is adopted to monitor the read-write interface of the set storage software. When the hook function monitors that the page calls the set storage software to store data, the hook function can change the data to be stored, wherein the data to be stored can be changed according to the data identifier corresponding to the mode; for example, a data identifier is added before/after the data, if the data to be stored is xxxxxx, if the data identifier corresponding to the working mode is work, the data to be stored may be changed to xxxxxx _ work, and if the data identifier corresponding to the home mode is family, the data to be stored may be changed to xxxxxx _ family; for another example, the data to be stored is www.1234533.com, if the data identifier corresponding to the work mode is work, the data to be stored may be changed to www.1234533.com _ work, and if the data identifier corresponding to the home mode is family, the data to be stored may be changed to www.1234533.com _ family. The browser is pre-configured with data identifiers corresponding to each mode, and different modes can be configured with different data identifiers. And then storing the changed data in the setting storage software, wherein when a third-party website reads data from the setting storage software, the data read in different modes are different, so that the third-party website cannot judge that the third-party website is the same user in different modes.
In the embodiment of the invention, after the current running mode of the browser is determined, the mode can be protected from the software monitoring dimension, and a hook function can be preset to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; storing the changed data to the setting storage software; and further, the third-party website is prevented from tracking the user by setting the information stored in the storage software, so that the information safety is guaranteed.
In another embodiment of the present invention, the protection of the mode from the network access dimension is described as follows:
referring to fig. 5, a flowchart illustrating steps of an embodiment of a method for protecting information of a network access dimension according to the present invention is shown, which may specifically include the following steps:
step 502, determining the current running mode of the browser.
Step 504, when the web page access instruction is obtained, accessing the server of the web page corresponding to the web page access instruction through the server corresponding to the mode, wherein the server includes a virtual private network server and a proxy server, and different modes correspond to different servers.
Step 506, obtaining page data corresponding to the webpage access instruction from the server of the page corresponding to the webpage access instruction.
The third-party website can also track the user through the IP address of the user, so that even if the user adopts different modes, the third-party website can also identify that the users corresponding to the different modes are the same user and track the user due to the fact that the IP addresses corresponding to the different modes are the same. Therefore, in the embodiment of the present invention, the browser may configure different servers for different modes in advance, where different IP proxy servers may be configured for different modes, and different VPN (Virtual Private Network) servers may be configured for different modes according to information input by the user when the user needs to access the local area Network. After the current operation mode of the browser is determined, if a webpage access instruction is acquired in the mode, a corresponding webpage access request can be sent to a server corresponding to the mode; the server corresponding to the mode can acquire corresponding page data from the server of the page corresponding to the webpage access request according to the webpage access request; and then returning the page data to the browser. When the browser runs a plurality of modes simultaneously, the proxy server or the VPN server corresponding to each mode can be different, so that the modes of different network environments can run simultaneously, and the working efficiency of a user is greatly improved. Because the IP address corresponding to the proxy server and the IP address corresponding to the VPN are different from the real IP address of the user, the third-party website cannot change the IP address of the user, the users corresponding to different modes are identified to be the same user, the tracking of the third-party website is prevented, and the information safety is guaranteed.
In the embodiment of the invention, after the current running mode of the browser is determined, the mode can be protected from a network access dimension, wherein when a webpage access instruction is obtained, a server corresponding to the mode accesses a server of a page corresponding to the webpage access instruction, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction; because the IP addresses corresponding to different virtual private network servers and proxy servers are different from the real IP address of the user, the third-party website cannot change the IP address of the user, the users corresponding to different modes are identified to be the same user, the tracking of the third-party website is prevented, and the information safety is guaranteed.
In addition, when the browser runs a plurality of modes simultaneously, the proxy server or the VPN server corresponding to each mode can be different, so that the modes of different network environments can run simultaneously, and the working efficiency of a user is greatly improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 6, a block diagram of an embodiment of an information protection apparatus according to the present invention is shown, and specifically, the structure may include the following modules:
a mode determining module 602, configured to determine a mode in which a browser is currently running, where the browser includes multiple modes;
a pattern protection module 604 for protecting the pattern from a plurality of dimensions, the dimensions including: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Referring to fig. 7, a block diagram of an alternative embodiment of an information protection apparatus of the present invention is shown.
In an alternative embodiment of the present invention, the mode protection module 604 includes:
a data protection sub-module 6042, configured to store the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
In an optional embodiment of the present invention, the apparatus further comprises:
and a shared protection module 606, configured to store the data shared in the mode in a shared data directory.
In an alternative embodiment of the present invention, the mode protection module 604 includes:
a first hardware protection sub-module 6044, configured to draw a graph according to the drawing parameter corresponding to the mode in a process of rendering a page; wherein, the drawing parameters corresponding to different modes are different.
In an alternative embodiment of the present invention, the mode protection module 604 includes:
the second hardware protection submodule 6046 is configured to determine a pixel point corresponding to a to-be-drawn graph in a page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
In an alternative embodiment of the present invention, the mode protection module 604 includes:
a software protection sub-module 6048, configured to preset a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
In an alternative embodiment of the present invention, the mode protection module 604 includes:
a network protection sub-module 60410, configured to, when a web page access instruction is obtained, access a server of a page corresponding to the web page access instruction through a server corresponding to the mode, where the server includes a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
In summary, in the embodiment of the present invention, the browser may include multiple modes, and after the current operation mode of the browser is determined, the browser may be protected by the mode in multiple dimensions, such as a data storage dimension, a hardware fingerprint dimension, a software monitoring dimension, and a network access dimension, so as to ensure information security.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 8 is a block diagram illustrating a structure of an electronic device 800 for information protection according to an example embodiment. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, electronic device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing elements 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power components 806 provide power to the various components of the electronic device 800. Power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 814 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 814 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the electronic device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform a method of information protection, the method comprising: determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes; protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Optionally, the protecting the schema from the data storage dimension includes: storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Optionally, the method further comprises: and storing the data shared in the mode into a shared data directory.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: drawing a graph according to the drawing parameters corresponding to the mode in the page rendering process; wherein, the drawing parameters corresponding to different modes are different.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: determining pixel points corresponding to a graph to be drawn in a page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
Optionally, the protecting the pattern from the software monitoring dimension includes: presetting a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
Optionally, the protecting the pattern from the network access dimension includes: when a webpage access instruction is obtained, accessing a server of a page corresponding to the webpage access instruction through a server corresponding to the mode, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
Fig. 9 is a schematic structural diagram of an electronic device 900 for information protection according to another exemplary embodiment of the present invention. The electronic device 900 may be a server, which may vary widely depending on configuration or performance, and may include one or more Central Processing Units (CPUs) 922 (e.g., one or more processors) and memory 932, one or more storage media 930 (e.g., one or more mass storage devices) storing applications 942 or data 944. Memory 932 and storage media 930 can be, among other things, transient storage or persistent storage. The program stored on the storage medium 930 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 922 may be arranged to communicate with the storage medium 930 to execute a series of instruction operations in the storage medium 930 on the server.
The server may also include one or more power supplies 926, one or more wired or wireless network interfaces 950, one or more input-output interfaces 958, one or more keyboards 956, and/or one or more operating systems 941, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
An electronic device comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs including instructions for: determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes; protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
Optionally, the protecting the schema from the data storage dimension includes: storing the data acquired in the mode to a data directory corresponding to the mode; wherein, the data directories corresponding to different modes are different.
Optionally, further comprising instructions for: and storing the data shared in the mode into a shared data directory.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: drawing a graph according to the drawing parameters corresponding to the mode in the page rendering process; wherein, the drawing parameters corresponding to different modes are different.
Optionally, the protecting the pattern from the hardware fingerprint dimension includes: determining pixel points corresponding to a graph to be drawn in a page rendering process; selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point; and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
Optionally, the protecting the pattern from the software monitoring dimension includes: presetting a hook function to monitor the set storage software; when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode; and storing the changed data into the setting storage software.
Optionally, the protecting the pattern from the network access dimension includes: when a webpage access instruction is obtained, accessing a server of a page corresponding to the webpage access instruction through a server corresponding to the mode, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers; and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The information protection method, the information protection device and the electronic device provided by the invention are described in detail, and specific examples are applied in the text to explain the principle and the implementation of the invention, and the description of the examples is only used to help understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. An information protection method, comprising:
determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes;
protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
2. The method of claim 1, wherein the protecting the schema from the data storage dimension comprises:
storing the data acquired in the mode to a data directory corresponding to the mode;
wherein, the data directories corresponding to different modes are different.
3. The method of claim 2, further comprising:
and storing the data shared in the mode into a shared data directory.
4. The method of claim 1, wherein the protecting the pattern from hardware fingerprint dimensions comprises:
drawing a graph according to the drawing parameters corresponding to the mode in the page rendering process;
wherein, the drawing parameters corresponding to different modes are different.
5. The method of claim 1, wherein the protecting the pattern from hardware fingerprint dimensions comprises:
determining pixel points corresponding to a graph to be drawn in a page rendering process;
selecting a plurality of target pixel points from the pixel points corresponding to the image to be drawn, and determining the pixel value corresponding to each target pixel point;
and changing the pixel value of each target pixel point according to a preset rule, and drawing the graph to be drawn according to other pixel points and corresponding pixel values, and the target pixel points and the corresponding changed pixel values.
6. The method of claim 1, wherein the protecting the pattern from a software monitoring dimension comprises:
presetting a hook function to monitor the set storage software;
when the hook function monitors that a page calls the set storage software to store data, the data is changed according to the data identification corresponding to the mode;
and storing the changed data into the setting storage software.
7. The method of claim 1, wherein the protecting the schema from the network access dimension comprises:
when a webpage access instruction is obtained, accessing a server of a page corresponding to the webpage access instruction through a server corresponding to the mode, wherein the server comprises a virtual private network server and a proxy server, and different modes correspond to different servers;
and acquiring page data corresponding to the webpage access instruction from a server of a page corresponding to the webpage access instruction.
8. An information protection apparatus, comprising:
the mode determining module is used for determining the current running mode of the browser, wherein the browser comprises a plurality of modes;
a pattern protection module to protect the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
9. A readable storage medium, characterized in that instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the information protection method according to any of method claims 1-7.
10. An electronic device comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs including instructions for:
determining a mode in which a browser is currently running, wherein the browser comprises a plurality of modes;
protecting the pattern from a plurality of dimensions, the dimensions comprising: data storage dimensions, hardware fingerprint dimensions, software monitoring dimensions, and network access dimensions.
CN201910309468.1A 2019-04-17 2019-04-17 Information protection method and device and electronic equipment Active CN111832060B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910309468.1A CN111832060B (en) 2019-04-17 2019-04-17 Information protection method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910309468.1A CN111832060B (en) 2019-04-17 2019-04-17 Information protection method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111832060A true CN111832060A (en) 2020-10-27
CN111832060B CN111832060B (en) 2024-07-12

Family

ID=72914409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910309468.1A Active CN111832060B (en) 2019-04-17 2019-04-17 Information protection method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111832060B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6286001B1 (en) * 1999-02-24 2001-09-04 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network
CN104111829A (en) * 2014-06-25 2014-10-22 小米科技有限责任公司 Data storage method and device
CN104657674A (en) * 2015-01-16 2015-05-27 北京邮电大学 Isolation protection system and isolation protection method of private data in mobile phone
CN107085676A (en) * 2017-05-11 2017-08-22 北京理工大学 The Software Intellectual Property Rights guard method of the various dimensions of software and hardware combining
CN107239491A (en) * 2017-04-25 2017-10-10 广州阿里巴巴文学信息技术有限公司 For realizing method, equipment, browser and electronic equipment that user behavior is followed the trail of
CN107247548A (en) * 2017-05-31 2017-10-13 腾讯科技(深圳)有限公司 Method for displaying image, image processing method and device
CN107257325A (en) * 2017-05-09 2017-10-17 北京潘达互娱科技有限公司 User profile guard method and device
CN109359252A (en) * 2018-10-30 2019-02-19 北京小米移动软件有限公司 Browser selection method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6286001B1 (en) * 1999-02-24 2001-09-04 Doodlebug Online, Inc. System and method for authorizing access to data on content servers in a distributed network
CN104111829A (en) * 2014-06-25 2014-10-22 小米科技有限责任公司 Data storage method and device
CN104657674A (en) * 2015-01-16 2015-05-27 北京邮电大学 Isolation protection system and isolation protection method of private data in mobile phone
CN107239491A (en) * 2017-04-25 2017-10-10 广州阿里巴巴文学信息技术有限公司 For realizing method, equipment, browser and electronic equipment that user behavior is followed the trail of
CN107257325A (en) * 2017-05-09 2017-10-17 北京潘达互娱科技有限公司 User profile guard method and device
CN107085676A (en) * 2017-05-11 2017-08-22 北京理工大学 The Software Intellectual Property Rights guard method of the various dimensions of software and hardware combining
CN107247548A (en) * 2017-05-31 2017-10-13 腾讯科技(深圳)有限公司 Method for displaying image, image processing method and device
CN109359252A (en) * 2018-10-30 2019-02-19 北京小米移动软件有限公司 Browser selection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ELOHO GOODLUCK OKENO: "A MULTI-DIMENSIONAL INTERNET SECURITY", 《JOURNAL OF PHYSICAL SCIENCE AND INNOVATION》, vol. 10, no. 1, 31 December 2018 (2018-12-31), pages 18 - 38 *
李周辉 等: "浏览器识别研究", 《信息网络安全》, no. 03, 10 March 2016 (2016-03-10), pages 39 - 44 *

Also Published As

Publication number Publication date
CN111832060B (en) 2024-07-12

Similar Documents

Publication Publication Date Title
CN108932253B (en) Multimedia search result display method and device
CN105912693B (en) Network request processing method, network data acquisition method, network request processing device and network data acquisition device, and server
US20170171321A1 (en) Methods and devices for managing accounts
CN103914520B (en) Data query method, terminal device and server
CN107562349B (en) Method and device for executing processing
CN109525652B (en) Information sharing method, device, equipment and storage medium
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN105245518A (en) Website hijacking detection method and device
CN105100074A (en) Data operation processing method, device and terminal equipment
EP3176719A1 (en) Methods and devices for acquiring certification document
CN112463418A (en) Cross-device information sharing method, device, medium and electronic device
CN110413169B (en) Information display method, device and medium
CN104050236B (en) Web site contents update reminding method, server and client side
CN108737588B (en) Domain name resolution method and device
CN105117115B (en) A kind of method and apparatus for showing electronic document
CN106960026B (en) Search method, search engine and electronic equipment
CN110928425A (en) Information monitoring method and device
CN111368329B (en) Message display method and device, electronic equipment and storage medium
CN107070816B (en) Application identification method and device and mobile terminal
CN111859208A (en) Display method, display device and storage medium
CN106302002B (en) Test method and device
CN111832060B (en) Information protection method and device and electronic equipment
US20170316039A1 (en) Information acquisition method, device and system
CN109150689B (en) Comment processing method and device and comment processing device
CN106383915A (en) Label processing method and device, and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant