CN112131492A - Method and equipment for locking uniform resource locator - Google Patents
Method and equipment for locking uniform resource locator Download PDFInfo
- Publication number
- CN112131492A CN112131492A CN202010997941.2A CN202010997941A CN112131492A CN 112131492 A CN112131492 A CN 112131492A CN 202010997941 A CN202010997941 A CN 202010997941A CN 112131492 A CN112131492 A CN 112131492A
- Authority
- CN
- China
- Prior art keywords
- uniform resource
- resource locator
- locking
- determining
- accessed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012423 maintenance Methods 0.000 claims abstract description 71
- 238000013515 script Methods 0.000 claims abstract description 62
- 230000015654 memory Effects 0.000 claims description 18
- 238000012545 processing Methods 0.000 claims description 8
- 238000012216 screening Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 abstract description 7
- 238000012986 modification Methods 0.000 abstract description 7
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000005291 magnetic effect Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9566—URL specific, e.g. using aliases, detecting broken or misspelled links
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The method comprises the steps of obtaining an operation and maintenance account of an operation and maintenance webpage of a user, determining a registry of the user after modification according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the registry after modification; determining a locking rule of a uniform resource locator according to a current session task, and writing the locking rule into the proxy script; and determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script. Therefore, multiple users are controlled to carry out respective webpage operation and maintenance, user authority division is not interfered with each other, dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch, and the dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a method and apparatus for locking a uniform resource locator.
Background
In the prior art, proxy connection of a web page is performed to lock a Uniform Resource Locator (URL), a configuration script needs to be bound in a local area network setting by manually configuring a browser, and then proxy connection of the web page is performed through the configuration script. The above operation needs to configure the browser in a manual configuration manner to complete the locking process of the partial URL, and the rule for locking the URL is fixed, so that the URL cannot be dynamically locked according to the current session (session) of the user.
Meanwhile, the existing locking mode can be set only for a single user, and when a large number of different users need to be locked with the URL, each user needs to repeat the same configuration operation, so that the corresponding configuration of the locked URL can be made effective for a plurality of users.
Disclosure of Invention
An object of the present application is to provide a method and an apparatus for locking a uniform resource locator, which solve the problem in the prior art that the uniform resource locator cannot be dynamically locked for multiple users in batch automatically.
According to an aspect of the present application, there is provided a method for locking a uniform resource locator, the method comprising:
acquiring an operation and maintenance account of a user operation and maintenance webpage, determining a registry modified by a user according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the modified registry;
determining a locking rule of a uniform resource locator according to a current session task, and writing the locking rule into the proxy script;
and determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script.
Further, the determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script comprises:
determining a uniform resource locator to be accessed based on a user request, judging whether the uniform resource locator to be accessed allows access according to the proxy script, and if so, accessing a webpage corresponding to the uniform resource locator to be accessed.
Further, the locking rule includes:
limiting any one or more of the following parameter combinations: domain name, internetworking protocol, port and path.
Further, the determining a locking rule of the uniform resource locator according to the current session task includes:
determining all uniform resource locators related to the task according to the current session task;
and determining a locking rule of the uniform resource locator according to all the uniform resource locators related to the tasks.
Further, the determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script further includes:
and judging whether the uniform resource locator to be accessed allows access according to the proxy script, and if not, forbidding access to the webpage corresponding to the uniform resource locator to be accessed.
Further, the determining, according to the proxy script, whether the uniform resource locator to be accessed allows access includes:
screening out the uniform resource locators allowed to be accessed according to the locking rules in the proxy script;
and judging whether the uniform resource locator to be accessed is the locator of the uniform resource allowed to be accessed, if so, allowing the uniform resource locator to be accessed to access.
According to another aspect of the present application, there is also provided an apparatus for locking a uniform resource locator, wherein the apparatus includes:
the script setting module is used for acquiring an operation and maintenance account of an operation and maintenance webpage of a user, determining a registry modified by the user according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the modified registry;
the rule setting module is used for determining a locking rule of a uniform resource locator according to the current session task and writing the locking rule into the proxy script;
and the data processing module is used for determining the access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script.
According to yet another aspect of the application, there is also provided a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement the method of any of the preceding claims.
According to yet another aspect of the present application, there is also provided an apparatus for locking a uniform resource locator, wherein the apparatus includes:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of any of the methods described above.
Compared with the prior art, the method and the device have the advantages that the operation and maintenance account of the operation and maintenance webpage of the user is obtained, the registry modified by the user is determined according to the operation and maintenance account, and the proxy script of the operation and maintenance account is set according to the modified registry; determining a locking rule of a uniform resource locator according to a current session task, and writing the locking rule into the proxy script; and determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script. Therefore, multiple users are controlled to carry out respective webpage operation and maintenance, user authority division is not interfered with each other, dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch, and the dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for locking a uniform resource locator provided in accordance with an aspect of the present application;
FIG. 2 is a flow diagram illustrating a method for locking a uniform resource locator in a preferred embodiment of the present application;
FIG. 3 illustrates an apparatus framework diagram for locking a uniform resource locator in accordance with another aspect of the subject application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
FIG. 1 illustrates a flow diagram of a method for locking a uniform resource locator, the method comprising: S11-S13, wherein in the S11, an operation and maintenance account of an operation and maintenance webpage of a user is obtained, a modified registry of the user is determined according to the operation and maintenance account, and a proxy script of the operation and maintenance account is set according to the modified registry; step S12, determining a locking rule of a uniform resource locator according to the current session task, and writing the locking rule into the proxy script; and step S13, determining the access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script. Therefore, multiple users are controlled to carry out respective webpage operation and maintenance, user authority division is not interfered with each other, dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch, and the dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch.
Specifically, in step S11, an operation and maintenance account of the operation and maintenance webpage of the user is obtained, a registry modified by the user is determined according to the operation and maintenance account, and a proxy script of the operation and maintenance account is set according to the modified registry. The method includes the steps that operation and maintenance processing is conducted on a webpage by using an operation and maintenance system for multiple users, when the users log in the operation and maintenance system, operation and maintenance accounts used when the users log in the operation and maintenance webpage are obtained, the user modifies a registry after the users log in the operation and maintenance webpage successfully, the user modified registry corresponding to the operation and maintenance accounts is determined, and proxy scripts started by the users are set according to the modified registry, so that the multiple users can have different control ranges in the process of logging in the operation and maintenance system to operate, and operation among different users cannot interfere with one another.
And step S12, determining a locking rule of the uniform resource locator according to the current session task, and writing the locking rule into the proxy script. The current session task is a session task created by a server when a user logs in an operation and maintenance webpage this time, when multiple users log in the operation and maintenance Webpage (WEB), different users use different operation and maintenance accounts to make login requests, after the users successfully log in the operation and maintenance Webpage (WEB), a corresponding session task is created, a locking rule of a Uniform Resource Locator (URL) is determined according to the corresponding session task, the locking rule is written into an agent script in real time, so that URLs meeting the locking rule are directly connected, and the URL not meeting the locking rule is subjected to evasive processing through an agent program corresponding to the agent script, so that the operation process of logging in the operation and maintenance system by multiple users has different control ranges, the operations of different users do not interfere with each other, and the operations of different users do not interfere with each other.
And step S13, determining the access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script. Here, whether the URL to be accessed can be accessed is determined based on the locking rule in the proxy script, an access request result is obtained, for example, the URL meeting the locking rule is directly connected, and the avoidance processing is completed for the URL not meeting the locking rule through the proxy program corresponding to the proxy script.
In a preferred embodiment of the present application, in step S13, a uniform resource locator to be accessed is determined based on a user request, and whether the uniform resource locator to be accessed allows access is determined according to the proxy script, if so, a web page corresponding to the uniform resource locator to be accessed is accessed. Here, whether the URL is allowed to access is determined according to a locking rule in the configured proxy script, where the URL is obtained when the user requests to access the operation and maintenance webpage, for example, when the locking rule is limited to some specified domain names for allowing access, it is determined whether the URL to be accessed is the specified domain name, and if so, the access to the webpage corresponding to the URL to be accessed is allowed.
In a preferred embodiment of the present application, the locking rule is: limiting any one or more of the following parameter combinations: domain name, internetworking protocol, port and path. Here, the locking rule is a screening rule for URLs, which is determined in real time based on a current session task of the user, that is, the locking rule is set to be effective only for a single operation and maintenance process of the user, any one or more parameter combination restrictions are performed on a domain name, an Internet Protocol (IP), a port and a path to screen URLs which are allowed to be accessed, and the avoidance process is completed for URLs which do not conform to the locking rule through an agent program corresponding to an agent script. In an actual application scenario, in the process of logging in an operation and maintenance webpage by a user each time, the locking rule is set in real time according to the current session task, so that operations of different users cannot interfere with each other.
In a preferred embodiment of the present application, in step S12, all uniform resource locators related to the task are determined according to the current session task; and determining a locking rule of the uniform resource locator according to all the uniform resource locators related to the tasks. Determining all URLs related to the task according to the current session task, for example, URLs corresponding to all webpages for user maintenance in the execution process of the current session task; and then, determining a locking rule of the URL according to all the URLs related to the task, and performing any one or more parameter combination limitations on domain names, Internet Protocol (IP), ports and paths.
In a preferred embodiment of the present application, in step S13, it is determined whether the url to be accessed is allowed to be accessed according to the proxy script, and if not, the access to the web page corresponding to the url to be accessed is prohibited. And if not, forbidding to access the webpage corresponding to the URL to be accessed, and completing evasion treatment on the URL which does not conform to the locking rule through an agent program corresponding to the proxy script so as to control multiple users to carry out respective webpage operation and maintenance, realize that user authority division is not interfered with each other, and automatically carry out dynamic locking on the uniform resource locators of multiple users in batches.
In a preferred embodiment of the present application, in step S13, screening out the permitted uniform resource locators according to the locking rules in the proxy script; and judging whether the uniform resource locator to be accessed is the locator of the uniform resource allowed to be accessed, if so, allowing the uniform resource locator to be accessed to access. And if so, allowing the URL to be accessed to access so as to control multiple users to carry out respective webpage operation and maintenance and realize that user permission segmentation does not interfere with each other.
Fig. 2 is a flowchart illustrating a method for locking a uniform resource locator in a preferred embodiment of the present application, where after a user's operation and maintenance account remotely logs in, the user's operation and maintenance account is acquired, and a proxy script of the operation and maintenance account is set according to the user's operation and maintenance account, for example, a proxy script enabled by the user is set by modifying a registry. And then, the user writes the locking rule of the locking URL into the script in real time, or automatically generates the locking rule of the locking URL according to the current session task, directly connects the URLs allowing access to the locking rule, and discards the URLs not allowing access to the locking rule through the agent program. Therefore, the locking rule of the URL can be flexibly set, the domain name, the IP, the domain name + port, the IP + port, the domain name/port + partial path and the like can be limited, the locking rule can be freely set according to the requirement corresponding to the current operation and maintenance task of a user, the locking rule is set to be effective only for single operation and maintenance, the authority of the same user for accessing the URL in different session tasks is flexibly controlled, the processing operation of different users in operation and maintenance webpages can be controlled not to be interfered with each other, multiple users are controlled to carry out respective webpage operation and maintenance, the division of the user authority is not interfered with each other, and the dynamic locking of the uniform resource locators of the multiple users is automatically carried out in batches so as to dynamically lock the uniform resource locators of the multiple.
Embodiments of the present application also provide a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method for locking a uniform resource locator as described above.
In correspondence with the method described above, the present application also provides a terminal, which includes modules or units capable of executing the method steps described in fig. 1 or fig. 2 or various embodiments, and these modules or units can be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is also provided an apparatus for locking a uniform resource locator, where the apparatus includes:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the aforementioned method.
For example, the computer readable instructions, when executed, cause the one or more processors to: acquiring an operation and maintenance account of a user operation and maintenance webpage, determining a registry modified by a user according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the modified registry; determining a locking rule of a uniform resource locator according to a current session task, and writing the locking rule into the proxy script; and determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script.
FIG. 3 provides a schematic diagram of a framework for locking a uniform resource locator, wherein the device comprises: the script setting module 100 is configured to acquire an operation and maintenance account of an operation and maintenance webpage of a user, determine a registry of the user after modification according to the operation and maintenance account, and set a proxy script of the operation and maintenance account according to the registry after modification; a rule setting module 200, configured to determine a locking rule of a uniform resource locator according to a current session task, and write the locking rule into the proxy script; and the data processing module 300 is used for determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script. Therefore, multiple users are controlled to carry out respective webpage operation and maintenance, user authority division is not interfered with each other, dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch, and the dynamic locking of the uniform resource locators is automatically carried out on the multiple users in batch.
It should be noted that the content executed by the script setting module 100, the rule setting module 200, and the data processing module 300 is the same as or corresponding to the content in the above steps S11, S12, and S13, respectively, and for the sake of brevity, the description thereof is omitted.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (9)
1. A method for locking a uniform resource locator, wherein the method comprises:
acquiring an operation and maintenance account of a user operation and maintenance webpage, determining a registry modified by a user according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the modified registry;
determining a locking rule of a uniform resource locator according to a current session task, and writing the locking rule into the proxy script;
and determining an access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script.
2. The method of claim 1, wherein the determining an access request result for a uniform resource locator to access based on a locking rule in the proxy script comprises:
determining a uniform resource locator to be accessed based on a user request, judging whether the uniform resource locator to be accessed allows access according to the proxy script, and if so, accessing a webpage corresponding to the uniform resource locator to be accessed.
3. The method of claim 1, wherein the locking rule comprises:
limiting any one or more of the following parameter combinations: domain name, internetworking protocol, port and path.
4. The method of claim 1, wherein the determining a locking rule for a uniform resource locator based on a current session task comprises:
determining all uniform resource locators related to the task according to the current session task;
and determining a locking rule of the uniform resource locator according to all the uniform resource locators related to the tasks.
5. The method of claim 1, wherein the determining an access request result for a uniform resource locator to access based on a locking rule in the proxy script further comprises:
and judging whether the uniform resource locator to be accessed allows access according to the proxy script, and if not, forbidding access to the webpage corresponding to the uniform resource locator to be accessed.
6. The method of claim 2 or 5, wherein the determining whether the uniform resource locator to be accessed is allowed to be accessed according to the proxy script comprises:
screening out the uniform resource locators allowed to be accessed according to the locking rules in the proxy script;
and judging whether the uniform resource locator to be accessed is the locator of the uniform resource allowed to be accessed, if so, allowing the uniform resource locator to be accessed to access.
7. An apparatus for locking a uniform resource locator, wherein the apparatus comprises:
the script setting module is used for acquiring an operation and maintenance account of an operation and maintenance webpage of a user, determining a registry modified by the user according to the operation and maintenance account, and setting a proxy script of the operation and maintenance account according to the modified registry;
the rule setting module is used for determining a locking rule of a uniform resource locator according to the current session task and writing the locking rule into the proxy script;
and the data processing module is used for determining the access request result of the uniform resource locator to be accessed based on the locking rule in the proxy script.
8. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 6.
9. An apparatus for locking a uniform resource locator, wherein the apparatus comprises:
one or more processors; and
memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010997941.2A CN112131492A (en) | 2020-09-21 | 2020-09-21 | Method and equipment for locking uniform resource locator |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010997941.2A CN112131492A (en) | 2020-09-21 | 2020-09-21 | Method and equipment for locking uniform resource locator |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112131492A true CN112131492A (en) | 2020-12-25 |
Family
ID=73842037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010997941.2A Pending CN112131492A (en) | 2020-09-21 | 2020-09-21 | Method and equipment for locking uniform resource locator |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112131492A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8112799B1 (en) * | 2005-08-24 | 2012-02-07 | Symantec Corporation | Method, system, and computer program product for avoiding cross-site scripting attacks |
CN105099773A (en) * | 2015-07-06 | 2015-11-25 | 深圳市华讯方舟科技有限公司 | Method for achieving Web network management system of access controller and Web network management system |
CN111193602A (en) * | 2018-11-15 | 2020-05-22 | 顺丰科技有限公司 | Automatic operation and maintenance management system and method |
-
2020
- 2020-09-21 CN CN202010997941.2A patent/CN112131492A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8112799B1 (en) * | 2005-08-24 | 2012-02-07 | Symantec Corporation | Method, system, and computer program product for avoiding cross-site scripting attacks |
CN105099773A (en) * | 2015-07-06 | 2015-11-25 | 深圳市华讯方舟科技有限公司 | Method for achieving Web network management system of access controller and Web network management system |
CN111193602A (en) * | 2018-11-15 | 2020-05-22 | 顺丰科技有限公司 | Automatic operation and maintenance management system and method |
Non-Patent Citations (2)
Title |
---|
杜文才 等: "《实用旅游电子商务》", 北京:对外经济贸易大学出版社, pages: 322 - 324 * |
郑清: ""Spring Security(3) 动态url权限控制"", 《CSDN:SPRING SECURITY(3) 动态URL权限控制_郑清的博客-CSDN博客_URLMETADATASOURCE》, 19 October 2019 (2019-10-19), pages 1 - 13 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10909212B2 (en) | Obfuscating network page structure | |
CN107948167B (en) | Single sign-on method and device | |
US9558355B2 (en) | Security scan based on dynamic taint | |
US8683596B2 (en) | Detection of DOM-based cross-site scripting vulnerabilities | |
CN107122296B (en) | Method and apparatus for data assertion for test interface | |
US20090132713A1 (en) | Single-roundtrip exchange for cross-domain data access | |
CN107092535B (en) | Method and apparatus for data storage of test interface | |
US20170187743A1 (en) | Point-wise protection of application using runtime agent and dynamic security analysis | |
US20140237293A1 (en) | Application monitoring through continuous record and replay | |
CN108769189B (en) | Cross-network-domain resource access method and device | |
CN110968760A (en) | Webpage data crawling method and device, and webpage login method and device | |
CN111818035B (en) | Permission verification method and device based on API gateway | |
US10803166B1 (en) | Automated determination of application privileges | |
CN113114794A (en) | Method and device for processing domain name based on secondary proxy | |
CN112395591A (en) | Encryption method and system | |
CN112256984B (en) | Method and device for acquiring interface background screenshot corresponding to webpage | |
CN112115436B (en) | AD domain account password modification method and device | |
TWI672019B (en) | Method and device for calling a file | |
CN112131492A (en) | Method and equipment for locking uniform resource locator | |
US20170070392A1 (en) | Client-configured server class tracing to a configurable threshold | |
CN114978970B (en) | Data testing system, method, equipment and medium based on custom mock platform | |
US20110246965A1 (en) | Correcting document generation for policy compliance | |
CN111885063B (en) | Open source system access control method, device, equipment and storage medium | |
US9298597B2 (en) | Automated testing of websites based on mode | |
CN112887410B (en) | Running method, device, equipment and storage medium of web service program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201225 |
|
RJ01 | Rejection of invention patent application after publication |