CN112003847A - Front-end authority access method and equipment - Google Patents

Front-end authority access method and equipment Download PDF

Info

Publication number
CN112003847A
CN112003847A CN202010818576.4A CN202010818576A CN112003847A CN 112003847 A CN112003847 A CN 112003847A CN 202010818576 A CN202010818576 A CN 202010818576A CN 112003847 A CN112003847 A CN 112003847A
Authority
CN
China
Prior art keywords
information
character string
url link
splicing
sid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010818576.4A
Other languages
Chinese (zh)
Other versions
CN112003847B (en
Inventor
高滨
刘正伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010818576.4A priority Critical patent/CN112003847B/en
Publication of CN112003847A publication Critical patent/CN112003847A/en
Application granted granted Critical
Publication of CN112003847B publication Critical patent/CN112003847B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention provides a method and a device for accessing front-end authority, wherein the method comprises the following steps: filtering all URL links in the system; splicing the SID information and encrypting the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string; randomly and disorderly arranging the encrypted character strings to generate a unique identifier; analyzing the unique identifier, and comparing the analyzed information with a character string generated by splicing SID information stored at the back end; and in response to the analyzed information being the same as the character string, forwarding the filtered URL link to the underlying interface to acquire data and present the data to the user. By using the scheme of the invention, the longitudinal override of the interface can be effectively prevented, the development and maintenance efficiency is greatly improved, the safety of a front-end system is enhanced, the hidden danger in information safety is effectively controlled, and the multi-CPU architecture can be compatible, so that the software competitiveness of the product is improved.

Description

Front-end authority access method and equipment
Technical Field
The field relates to the field of computers, and more particularly to a method and apparatus for front-end rights access.
Background
With the vigorous development of basic software and hardware, the popularization and application of the basic software and hardware based on the ARM and MIPS architectures have come up with unprecedented opportunities. At present, more and more projects adopt basic software and hardware of ARM or MIPS architecture, and some product performances reach or approach the international advanced level.
Generally, the right control is generally controlled at a server side, a scheme commonly used for the right control is role-based access control of the RBAC, and the basic idea is that various related rights are not directly granted to specific users, but a role set is established between a user set and a right set. Each role corresponds to a set of corresponding permissions. After a user is assigned an appropriate role, the user has all the operating rights of the role. With the continuous development of the software industry, a B/S architecture system gradually tends to serve a client, the requirement on front-end interactive experience is higher and higher, and the front-end interactive experience is realized by adopting a front-end and back-end separation technology, so that the front-end has a trend that the front-end is realized by adopting a front-end and back-end separation technology, the front-end has no mature authority control scheme, the unified authority control of front-end service logic and a view is realized by using a JavaScript coding mode, a large amount of repeated codes are needed for realizing, the system is difficult to maintain, and the maintenance cost of the software system is continuously increased for a long time. Under the big background of front-end and back-end separation, the alternative scheme is to control elements in HTML by writing own JavaScript codes, and meanwhile, in the front-end codes, the elements are judged by a large number of repeated service logic codes, so that the maintainability of the repeated codes is caused, especially under the condition that the front-end application is currently heavily watched, the front-end service is more and more complex, if the authority control cannot be well solved, on one hand, the interaction and the application effect are influenced, if the front-end application is solved in a hard coding mode, the maintainability of the codes is inevitably caused, so that the workload of front-end maintenance is more and more large, and the development of products mainly taking the front end is not facilitated. Meanwhile, the information security has higher requirements on software products especially in a domestic environment, and how to effectively improve the security of Web application and prevent longitudinal or transverse unauthorized of a system is a main starting point of research.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method and a device for front-end permission access, which can effectively prevent longitudinal unauthorized access of an interface, greatly improve development and maintenance efficiency, enhance the security of a front-end system, effectively control hidden dangers in information security, and be compatible with a multi-CPU architecture, thereby improving software competitiveness of a product.
In view of the above object, an aspect of the embodiments of the present invention provides a method for front-end rights access, including the steps of:
filtering all URL links in the system;
splicing the SID information and encrypting the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string;
randomly and disorderly arranging the encrypted character strings to generate a unique identifier;
analyzing the unique identifier, and comparing the analyzed information with a character string generated by splicing SID information stored at the back end;
and in response to the analyzed information being the same as the character string, forwarding the filtered URL link to the underlying interface to acquire data and present the data to the user.
According to one embodiment of the invention, filtering all URL links in the system includes:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in a blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page.
According to an embodiment of the present invention, the splicing the SID information and the filtered URL link to be encrypted using an encryption algorithm to generate an encrypted string includes:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form an encryption character string.
According to one embodiment of the invention, the role information comprises four types, namely a super administrator, a domain administrator, a virtual data center administrator and a virtual data center user.
According to one embodiment of the invention, randomly permuting the encrypted strings to generate the unique identifier comprises:
adding a random character string with a specific length to the front head of the encrypted character string;
a random string of a threshold length is added to the end of the encrypted string.
According to an embodiment of the present invention, further comprising: and responding to the analyzed information and the character string which are different, requesting to report errors and returning an exception.
According to an embodiment of the present invention, parsing the unique identifier, and comparing the parsed information with a character string generated by splicing SID information stored at a back end, includes:
removing random character strings of the head and the tail of the unique identifier and extracting character strings after splicing SID information in the unique identifier;
and splicing the SID information in the URL link corresponding to the unique identifier stored at the back end, and then comparing the spliced SID information with the character string.
In another aspect of the embodiments of the present invention, there is also provided an apparatus for front-end rights access, including:
the interception module is configured to filter all URL links in the system;
the encryption module is configured to splice the SID information and encrypt the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string;
the configuration module is configured to randomly and disorderly arrange the encrypted character strings to generate a unique identifier;
the verification module is configured to analyze the unique identifier and compare the analyzed information with a character string generated by splicing the SID information stored at the back end;
and the display module is configured to respond that the analyzed information is the same as the character string, and forward the filtered URL link to the bottom layer interface to acquire data and present the data to the user.
According to one embodiment of the invention, the interception module is further configured to:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in a blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page.
According to one embodiment of the invention, the encryption module is further configured to:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form an encryption character string.
The invention has the following beneficial technical effects: according to the method for accessing the front-end authority, provided by the embodiment of the invention, all URL links in the system are filtered; splicing the SID information and encrypting the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string; randomly and disorderly arranging the encrypted character strings to generate a unique identifier; analyzing the unique identifier, and comparing the analyzed information with a character string generated by splicing SID information stored at the back end; the technical scheme that the analyzed information is the same as the character string, the filtered URL link is forwarded to the bottom layer interface to acquire data and present the data to the user can effectively prevent the longitudinal unauthorized of the interface, greatly improve the development and maintenance efficiency, enhance the safety of the front-end system, effectively control the hidden danger in the information safety, and be compatible with a multi-CPU architecture, thereby improving the software competitiveness of the product.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method of front-end rights access in accordance with one embodiment of the present invention;
fig. 2 is a schematic diagram of a device for front-end rights access according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
Based on the above purpose, the embodiment of the invention provides a front-end authority access method. Fig. 1 shows a schematic flow diagram of the method.
As shown in fig. 1, the method may include the steps of:
s1, filtering all URL links in the system, intercepting URL links which do not accord with the safety rule, and releasing URL links which accord with the safety rule, wherein the URL links comprise URLs, icons, pictures, css styles and the like;
s2 splicing the SID information and encrypting the information and the filtered URL link by using an encryption algorithm to generate an encrypted character string, wherein the SID is a security identification field and comprises information such as a user unique identifier (uuid), role information and virtual data center (vdc) resources;
s3 randomly and disorderly arranges the encrypted character strings to generate a unique identifier, and ensures that SID (security identification) labels attached to each link URL request of the system are different, so that the identifier has no identifiability to avoid the situation that an interceptor breaks;
s4, the unique identifier is analyzed, the analyzed information is compared with a character string generated by splicing the SID information stored at the back end, the SID information corresponding to one URL link is stored at the back end when a user accesses, and the splicing and encryption method of the SID information stored at the back end is the same as the encryption method;
s5 forwards the filtered URL link to the underlying interface to retrieve data and present it to the user in response to the parsed information being the same as the character string.
Through the technical scheme of the invention, the longitudinal override of the interface can be effectively prevented, the development and maintenance efficiency is greatly improved, the safety of a front-end system is enhanced, the hidden danger in information safety is effectively controlled, and the multi-CPU architecture can be compatible, so that the software competitiveness of a product is improved.
In a preferred embodiment of the present invention, filtering all URL links in the system comprises:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in a blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page. The black and white list is mainly used for filtering information such as URLs (including URLs, icons, pictures, css styles and the like) of the access system. For the information of the white list, the user can directly access the information without judging whether the user logs in the system or not, and for the information in the black list, if the user is detected not to log in the system or the session is invalid, the information is intercepted and returned to the initial login page.
In a preferred embodiment of the present invention, the splicing the SID information and the filtered URL link to be encrypted using an encryption algorithm to generate an encrypted string includes:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form an encryption character string. The method comprises the steps of splicing three kinds of information, namely uuid, role information (the roles in the cloud platform system are divided into four default roles of a super administrator, a domain administrator, a virtual data center administrator and a virtual data center user) and vdc (virtual data center), of a user, and then encrypting by using a non-reversible encryption algorithm to generate a character string.
In a preferred embodiment of the present invention, the role information includes four kinds of a super administrator, a domain administrator, a virtual data center administrator, and a virtual data center user.
In a preferred embodiment of the present invention, randomly permuting the encrypted string to generate the unique identifier comprises:
adding a random character string with a specific length to the front head of the encrypted character string;
a random string of a threshold length is added to the end of the encrypted string. Therefore, the SID mark attached to each link URL request of the system is different, so that the mark is not identifiable to avoid being cracked by an interceptor.
In a preferred embodiment of the present invention, the method further comprises: and responding to the analyzed information and the character string which are different, requesting to report errors and returning an exception.
In a preferred embodiment of the present invention, parsing the unique identifier, and comparing the parsed information with a character string generated by splicing SID information stored in a backend, includes:
removing random character strings of the head and the tail of the unique identifier and extracting character strings after splicing SID information in the unique identifier;
and splicing the SID information in the URL link corresponding to the unique identifier stored at the back end, and then comparing the spliced SID information with the character string.
Through the technical scheme of the invention, the longitudinal override of the interface can be effectively prevented, the development and maintenance efficiency is greatly improved, the safety of a front-end system is enhanced, the hidden danger in information safety is effectively controlled, and the multi-CPU architecture can be compatible, so that the software competitiveness of a product is improved.
It should be noted that, as will be understood by those skilled in the art, all or part of the processes in the methods of the above embodiments may be implemented by instructing relevant hardware through a computer program, and the above programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the embodiments of the methods as described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
In view of the above object, a second aspect of the embodiments of the present invention proposes a device for front-end rights access, as shown in fig. 2, the device 200 includes:
the interception module is configured to filter all URL links in the system;
the encryption module is configured to splice the SID information and encrypt the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string;
the configuration module is configured to randomly and disorderly arrange the encrypted character strings to generate a unique identifier;
the verification module is configured to analyze the unique identifier and compare the analyzed information with a character string generated by splicing the SID information stored at the back end;
and the display module is configured to respond that the analyzed information is the same as the character string, and forward the filtered URL link to the bottom layer interface to acquire data and present the data to the user.
In a preferred embodiment of the present invention, the interception module is further configured to:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in a blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page.
In a preferred embodiment of the present invention, the encryption module is further configured to:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form an encryption character string.
It should be particularly noted that the embodiment of the system described above employs the embodiment of the method described above to specifically describe the working process of each module, and those skilled in the art can easily think that the modules are applied to other embodiments of the method described above.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The embodiments described above, particularly any "preferred" embodiments, are possible examples of implementations and are presented merely to clearly understand the principles of the invention. Many variations and modifications may be made to the above-described embodiments without departing from the spirit and principles of the technology described herein. All such modifications are intended to be included within the scope of this disclosure and protected by the following claims.

Claims (10)

1. A method of front-end rights access, comprising the steps of:
filtering all URL links in the system;
splicing the SID information and encrypting the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string;
randomly and disorderly arranging the encrypted character strings to generate a unique identifier;
analyzing the unique identifier, and comparing the analyzed information with a character string generated by splicing the SID information stored at the back end;
and responding to the analyzed information is the same as the character string, and forwarding the filtered URL link to a bottom layer interface to acquire data and present the data to a user.
2. The method of claim 1, wherein filtering all URL links in the system comprises:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in the blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page.
3. The method of claim 1, wherein splicing the SID information together with the filtered URL links is encrypted using an encryption algorithm to generate an encrypted string comprising:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form the encrypted character string.
4. The method of claim 3, wherein the role information comprises four of a super administrator, a domain administrator, a virtual data center administrator, and a virtual data center user.
5. The method of claim 1, wherein randomly permuting the encrypted string to generate a unique identifier comprises:
adding a random character string with a specific length to the front head of the encrypted character string;
and adding a random character string with a threshold length at the tail part of the encrypted character string.
6. The method of claim 1, further comprising: and responding to the analyzed information and the character string which are different, requesting to report errors and returning an exception.
7. The method of claim 1, wherein parsing the unique identifier and comparing the parsed information with a string generated by splicing the SID information stored in a backend comprises:
removing the random character strings of the head and the tail of the unique identifier and extracting the character strings after splicing the SID information in the unique identifier;
and splicing the SID information in the URL link corresponding to the unique identifier stored at the back end, and then comparing the spliced SID information with the character string.
8. A device for front-end rights access, comprising:
the system comprises an interception module, a database module and a server, wherein the interception module is configured to filter all URL links in the system;
the encryption module is configured to splice the SID information and encrypt the SID information and the filtered URL link by using an encryption algorithm to generate an encrypted character string;
a configuration module configured to randomly permute the encrypted strings to generate a unique identifier;
the verification module is configured to analyze the unique identifier and compare the analyzed information with a character string generated by splicing the SID information stored at the back end;
and the display module is configured to respond that the analyzed information is the same as the character string, and forward the filtered URL link to a bottom layer interface to acquire data and present the data to a user.
9. The method of claim 1, wherein the interception module is further configured to:
setting a black and white list of URL links;
judging whether the URL link in the system is in a blacklist or not;
responding to the URL link in the system in the blacklist, and judging whether the user logs in the system or whether the session is invalid;
and responding to the condition that the user does not log in the system or the session is invalid, intercepting the URL link and returning to the initial login page.
10. The method of claim 1, wherein the encryption module is further configured to:
splicing the unique user identifier, the role information and the virtual data center in the SID information;
and encrypting the spliced SID information and the URL link by using a non-reversible encryption algorithm to form the encrypted character string.
CN202010818576.4A 2020-08-14 2020-08-14 Front-end authority access method and device Active CN112003847B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010818576.4A CN112003847B (en) 2020-08-14 2020-08-14 Front-end authority access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010818576.4A CN112003847B (en) 2020-08-14 2020-08-14 Front-end authority access method and device

Publications (2)

Publication Number Publication Date
CN112003847A true CN112003847A (en) 2020-11-27
CN112003847B CN112003847B (en) 2023-07-18

Family

ID=73474093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010818576.4A Active CN112003847B (en) 2020-08-14 2020-08-14 Front-end authority access method and device

Country Status (1)

Country Link
CN (1) CN112003847B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487392A (en) * 2020-12-08 2021-03-12 浪潮云信息技术股份公司 Method for realizing authority control of management system by front end
CN115412744A (en) * 2022-10-09 2022-11-29 中信百信银行股份有限公司 Method and device for encrypting mobile terminal video and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901223A (en) * 2009-05-25 2010-12-01 灰熊(北京)科技有限公司 Method for realizing hall and rooms for playing webpage board game
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN105187397A (en) * 2015-08-11 2015-12-23 北京思特奇信息技术股份有限公司 WEB system page integration anti-hotlinking method and system
CN106294799A (en) * 2016-08-15 2017-01-04 广州神马移动信息科技有限公司 Get method, device and server ready
WO2017076193A1 (en) * 2015-11-05 2017-05-11 北京奇虎科技有限公司 Method and apparatus for processing request from client
CN108040065A (en) * 2017-12-22 2018-05-15 平安养老保险股份有限公司 Webpage redirect after exempt from login method, device, computer equipment and storage medium
CN109462602A (en) * 2018-12-13 2019-03-12 平安普惠企业管理有限公司 Log-on message storage method, login validation method, device, equipment and medium
CN109597948A (en) * 2018-10-17 2019-04-09 深圳壹账通智能科技有限公司 Access method, system and the storage medium of URL link

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901223A (en) * 2009-05-25 2010-12-01 灰熊(北京)科技有限公司 Method for realizing hall and rooms for playing webpage board game
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN105187397A (en) * 2015-08-11 2015-12-23 北京思特奇信息技术股份有限公司 WEB system page integration anti-hotlinking method and system
WO2017076193A1 (en) * 2015-11-05 2017-05-11 北京奇虎科技有限公司 Method and apparatus for processing request from client
CN106294799A (en) * 2016-08-15 2017-01-04 广州神马移动信息科技有限公司 Get method, device and server ready
CN108040065A (en) * 2017-12-22 2018-05-15 平安养老保险股份有限公司 Webpage redirect after exempt from login method, device, computer equipment and storage medium
CN109597948A (en) * 2018-10-17 2019-04-09 深圳壹账通智能科技有限公司 Access method, system and the storage medium of URL link
CN109462602A (en) * 2018-12-13 2019-03-12 平安普惠企业管理有限公司 Log-on message storage method, login validation method, device, equipment and medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487392A (en) * 2020-12-08 2021-03-12 浪潮云信息技术股份公司 Method for realizing authority control of management system by front end
CN115412744A (en) * 2022-10-09 2022-11-29 中信百信银行股份有限公司 Method and device for encrypting mobile terminal video and readable storage medium

Also Published As

Publication number Publication date
CN112003847B (en) 2023-07-18

Similar Documents

Publication Publication Date Title
US10447730B2 (en) Detection of SQL injection attacks
US10834082B2 (en) Client/server security by executing instructions and rendering client application instructions
CN106095869B (en) Advertisement information processing method, user equipment, background server and system
US20210056204A1 (en) Efficient scanning for threat detection using in-doc markers
Li et al. A survey on server-side approaches to securing web applications
US8768964B2 (en) Security monitoring
US8826411B2 (en) Client-side extensions for use in connection with HTTP proxy policy enforcement
US20220092147A1 (en) Intermediary server for providing secure access to web-based services
US20140281535A1 (en) Apparatus and Method for Preventing Information from Being Extracted from a Webpage
KR20180120157A (en) Data set extraction based pattern matching
US11044268B2 (en) Systems and methods for identifying internet attacks
US11194914B2 (en) Method and apparatus to detect security vulnerabilities in a web application
CN109413000B (en) Anti-stealing-link method and anti-stealing-link network relation system
CN101051904A (en) Method for landing by account number cipher for protecting network application sequence
US20210397680A1 (en) Systems and methods for dynamically enforcing digital rights management via embedded browser
Elshazly et al. A survey of SQL injection attack detection and prevention
US20130074160A1 (en) Method of controlling information processing system, computer-readable recording medium storing program for controlling apparatus
CN112003847B (en) Front-end authority access method and device
Naderi-Afooshteh et al. Joza: Hybrid taint inference for defeating web application sql injection attacks
Panja et al. Handling cross site scripting attacks using cache check to reduce webpage rendering time with elimination of sanitization and filtering in light weight mobile web browser
KR101688390B1 (en) System for detecting and preventing malicious code based on website
JP2020504354A (en) Hash-based dynamic restriction of content on information resources
CN112637171A (en) Data traffic processing method, device, equipment, system and storage medium
Bai et al. TD‐WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites
Mingsheng et al. Research and Development of Dual-Core Browser-Based Compatibility and Security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant