CN112261012A - Browser, server and webpage access method - Google Patents

Browser, server and webpage access method Download PDF

Info

Publication number
CN112261012A
CN112261012A CN202011061672.5A CN202011061672A CN112261012A CN 112261012 A CN112261012 A CN 112261012A CN 202011061672 A CN202011061672 A CN 202011061672A CN 112261012 A CN112261012 A CN 112261012A
Authority
CN
China
Prior art keywords
webpage
signature
mac address
browser
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011061672.5A
Other languages
Chinese (zh)
Inventor
王树大
吴世龙
张兆明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Honglian 95 Information Industries Co Ltd
Original Assignee
Beijing Honglian 95 Information Industries Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Honglian 95 Information Industries Co Ltd filed Critical Beijing Honglian 95 Information Industries Co Ltd
Priority to CN202011061672.5A priority Critical patent/CN112261012A/en
Publication of CN112261012A publication Critical patent/CN112261012A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a browser, a server and a webpage access method, wherein the method comprises the following steps: the method comprises the steps that a first MAC address is generated by an MAC address of a browser encryption terminal, the first MAC address, a UUID, a request timestamp and a first key are connected into a first character string, and the first character string is encrypted to generate a first signature; sending an HTTP message to a third-party server corresponding to the request access webpage, wherein the verification information of the HTTP message comprises a first MAC address, a UUID, request time and a first signature; and the third-party server verifies the first signature according to the HTTP message, and transmits the resource data of the webpage to the browser when the verification is passed. The method and the device avoid the webpage access request from being tampered in transmission, and the signature is highly tampered by the random UUID and the preset first secret key, so that the safety of the webpage access is effectively improved.

Description

Browser, server and webpage access method
Technical Field
The present application relates to the field of computer technologies, and in particular, to a browser, a server, and a web page access method.
Background
In a business scene such as remote office, a browser is often required to access a webpage of an online platform or a website, and corresponding work information is loaded, displayed and processed; at present, a scheme for improving the security of a browser for accessing a webpage of an online platform or a website mainly includes that a platform or a website is logged in through an authorization terminal and an account, and webpage information is prevented from being leaked.
In the process of accessing the webpage, the risk of tampering the webpage access request terminal or the account may exist, and the terminal or the account accessing the webpage cannot be guaranteed to be an authorized account, so that webpage information is output through an unauthorized terminal, the risk of information leakage occurs, and the safety of webpage access is reduced.
Disclosure of Invention
In order to prevent a webpage access request from being tampered in transmission and improve the difficulty of tampering a signature, and therefore improve the safety of webpage access, the application provides a browser, a server and a webpage access method.
In a first aspect, the present application provides a web page access method, which adopts the following technical scheme:
a method of web page access, comprising:
receiving a request for webpage access, and encrypting the MAC address of the terminal to generate a first MAC address;
connecting the first MAC address, the UUID, the request timestamp and the first secret key into a first character string according to a preset sequence, and encrypting the first character string by using a first encryption algorithm to generate a first signature;
sending an HTTP message to a third-party server corresponding to the request access webpage; wherein a message header of the HTTP message comprises verification information; the verification information comprises the first MAC address, the UUID, the request timestamp and the first signature;
receiving a verification result from the third-party server, and receiving the resource data of the webpage sent by the third-party server when the verification result is that verification is passed; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, and if the second signature is consistent with the first signature obtained by analyzing the verification information, the verification is passed;
and the third party server connects the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the verification information into a second character string according to a preset sequence, and encrypts the second character string by using the first encryption algorithm to generate the second signature.
By adopting the technical scheme, the webpage access request is prevented from being tampered in transmission, the difficulty of tampering the signature is improved, the risk of information leakage is effectively reduced, and the safety of accessing the webpage is improved.
Optionally, the verification information further includes a browser version identifier for identifying a current version of the browser;
after the sending of the HTTP message to the third-party server corresponding to the request for accessing the web page, the method further includes:
receiving a version prompt message from the third party server; the version prompt message is a message sent by the third-party server when the current version does not support the webpage requested to be accessed, and the third-party server judges whether the current version supports the webpage requested to be accessed according to the browser version identification.
By adopting the technical scheme, the current version of the browser can be guaranteed to support the acquired webpage resource data, and the stability of webpage access is improved.
Optionally, after sending the HTTP message to the third-party server corresponding to the request for accessing the web page, the method further includes:
receiving an unauthorized prompt message from the third-party server; wherein,
the unauthorized prompt message is a message sent by the third-party server when the MAC address of the terminal is not authorized to access the webpage;
and the third-party server analyzes the first MAC address obtained from the verification message, decrypts the first MAC address to obtain the MAC address of the terminal, and judges whether the MAC address obtained by decryption is authorized to access the webpage.
By adopting the technical scheme, the verification efficiency can be improved, and only an authorized terminal can access the specified webpage.
Optionally, before the receiving the request for web page access, the method further includes:
requesting authority data from a self-owned server through a preset interface address;
receiving the ciphertext of the authority data, and decrypting the ciphertext according to a preset second key to obtain the authority data; wherein,
the authority data comprises webpage access authority data and/or operation authority data; the webpage access authority data configures a plurality of webpage addresses according to the requirements of each account, and the webpage addresses are webpage addresses allowed to be accessed or webpage addresses without access authority; the operation authority data comprises at least one operation of copying, pasting, printing, saving as well as debugging, viewing source codes, forwarding and reversing, and the operation authority data comprises operation requests corresponding to the operations which are allowed to be implemented or not authorized to be implemented.
By adopting the technical scheme, the individual configuration can be carried out on each account according to the requirement, the cleanliness of the browser can be guaranteed to a certain extent, and the risk of data tampering is reduced.
Optionally, after receiving the resource data of the web page sent by the third-party server, the method further includes:
the watermark is a character string obtained by encrypting the terminal MAC address through a second encryption algorithm;
and displaying the webpage by using the received resource data, and adding the watermark into the webpage displayed by the webpage.
By adopting the technical scheme, the data displayed by the access webpage can be prevented from being output in modes of photographing, screen capturing and the like, the risk of webpage information leakage is further reduced, the source tracing can be performed through the decryption watermark, the mark watermark photo or the screen capturing can be positioned, and evidence is provided for responsibility confirmation.
In a second aspect, the present application provides a web page access method, which adopts the following technical solution:
a method of web page access, comprising:
receiving an HTTP message from a browser; wherein the HTTP message includes verification information; the verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature; the first signature is generated by connecting the first MAC address, the UUID, the request timestamp and a first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm; the first MAC address is generated for the MAC address of the browser encryption terminal;
connecting the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the checking information into a second character string according to a preset sequence, and encrypting the second character string by using the first encryption algorithm to generate a second signature;
obtaining the verification result by judging the consistency of the second signature and the first signature obtained by analyzing the verification information; if the second signature is consistent with the first signature, the verification is passed;
and sending the verification result to the browser requesting to access the webpage, and sending the resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed.
By adopting the technical scheme, the webpage access request can be ensured not to be falsified in transmission, and the difficulty of falsification of the signature is improved, so that the information leakage risk is effectively reduced, and the safety of webpage access is improved.
Optionally, the verification information further includes a browser version identifier for identifying a current version of the browser;
after the receiving the HTTP message from the browser, further comprising:
judging whether the current version of the browser supports the webpage requested to be accessed or not according to the browser version identification obtained by analysis;
and if not, sending a version prompt message to the browser.
By adopting the technical scheme, the webpage resource data provided for the browser can be supported by the current version of the browser, and the stability of webpage access is improved.
Optionally, after receiving the HTTP message from the browser, the method further includes:
decrypting the first MAC address obtained by analyzing the check information to obtain the MAC address of the terminal;
and judging whether the MAC address obtained by decryption is authorized to access the webpage or not, and if the MAC address is not authorized to access the webpage, sending an unauthorized prompt message.
By adopting the technical scheme, the verification efficiency can be improved, only an authorized terminal can access the specified webpage, and the leakage risk of the access webpage data is further reduced.
In a third aspect, the present application provides a browser, which adopts the following technical solutions:
a browser, comprising:
the MAC address encryption module is used for receiving a request for webpage access, encrypting the MAC address of the terminal where the MAC address is located and generating a first MAC address;
the first signature module is used for connecting the first MAC address, the UUID, the request timestamp and the first secret key into a first character string according to a preset sequence, and encrypting the first character string by using a first encryption algorithm to generate a first signature;
the HTTP message sending module is used for sending the HTTP message to a third-party server corresponding to the request access webpage; wherein a message header of the HTTP message comprises verification information; the verification information comprises the first MAC address, the UUID, the request timestamp and the first signature;
the data receiving module is used for receiving a verification result from the third-party server and receiving the resource data of the webpage sent by the third-party server when the verification result is that the verification is passed; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, and if the second signature is consistent with the first signature obtained by analyzing the verification information, the verification is passed;
and the third party server connects the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the verification information into a second character string according to a preset sequence, and encrypts the second character string by using the first encryption algorithm to generate the second signature.
By adopting the technical scheme, the terminal of the webpage access request cannot be tampered during transmission when the browser accesses the webpage, and the signature is generated by combining the random UUID and the preset first secret key, so that the difficulty of tampering the signature is improved, the risk of information leakage is effectively reduced, and the safety of accessing the webpage through the browser is improved.
In a fourth aspect, the present application provides a server for a web page, which adopts the following technical solutions:
a server of web pages, comprising:
the HTTP message receiving module is used for receiving HTTP messages from the browser; wherein the HTTP message includes verification information; the verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature;
the first signature is generated by connecting the first MAC address, the UUID, the request timestamp and a first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm;
the first MAC address is generated for the MAC address of the browser encryption terminal;
the second signature module is used for connecting the first secret key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the checking information into a second character string according to a preset sequence, and encrypting the second character string by using the first encryption algorithm to generate a second signature;
the verification module is used for obtaining the verification result by judging the consistency of the second signature and the first signature obtained by analyzing the verification information; if the second signature is consistent with the first signature, the verification is passed;
and the data sending module is used for sending the verification result to the browser requesting to access the webpage, and sending the resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed.
By adopting the technical scheme, the received webpage access request is ensured not to be falsified in transmission, and the verification signature is generated by combining the first secret key preset in the local, so that the difficulty of falsification of the signature is improved, and the safety of the webpage is improved.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the webpage access request is guaranteed not to be tampered in transmission through signature verification, and a signature is generated by combining a random UUID and a preset first secret key, so that the difficulty of tampering the signature is improved, the safety of accessing the webpage through the browser is improved, and the information leakage risk is effectively reduced;
2. by checking the browser version identification in the message, the current version of the browser can be ensured to support the acquired webpage resource data, and the stability of webpage access is improved;
3. by adding the watermark to the page when the webpage is displayed, the data displayed by accessing the webpage can be prevented from being output in modes of photographing, screen capturing and the like, the risk of webpage information leakage is further reduced, the decrypted watermark can obtain the MAC address of the terminal, the source can be traced by utilizing the MAC address, the position of the watermark photo or screen capturing can be located and identified, and evidence is provided for responsibility confirmation.
Drawings
Fig. 1 is a flowchart of a web page access method provided in embodiment 1 of the present application.
Fig. 2 is a flowchart of a web page access method provided in embodiment 4 of the present application.
Fig. 3 is a flowchart of pre-verification in embodiment 4 of the present application, when a User-Agent includes a secure browsing identifier and verification information includes a browser version identifier.
Fig. 4 is a block diagram of a browser according to an embodiment of the present disclosure.
Fig. 5 is a block diagram of a server of a web page according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to fig. 1-5 and the embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that the terms first, second and the like in the description and in the claims, and in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1.
The embodiment of the application discloses a webpage access method. Referring to fig. 1, a web page access method applied to a browser includes the following steps:
step S100, receiving a request for webpage access, and encrypting the MAC address of the terminal where the webpage is located to generate a first MAC address. In the present embodiment, step S100 includes:
after a user selects or inputs a webpage which the user wants to access, a request for accessing the webpage of the user is received;
triggering and acquiring the MAC address of the terminal (a terminal used by a user or a terminal running a browser);
encrypting the MAC address to generate a first MAC address; in the present embodiment, symmetric encryption algorithms such as DES, RC2, RC4, RC5, and the like are used for MAC address encryption.
Before receiving a request for accessing a web page, when a browser is started, the embodiment further includes:
requesting authority data from a self server (a server corresponding to a browser) through a preset interface address (API interface);
receiving the ciphertext of the authority data, decrypting the ciphertext according to a preset second key to obtain the authority data, and ensuring that the authority data is not tampered in transmission; wherein,
the authority data comprises webpage access authority data and/or operation authority data; the webpage access permission data is configured with a plurality of webpage addresses according to the requirements of each account, the configured webpage addresses can be webpage addresses allowed to be accessed or webpage addresses (such as blacklists) which are not allowed to be accessed, not only can personalized configuration be carried out on each account according to the requirements, but also the cleanliness of a browser can be ensured to a certain extent, and the risk of data tampering is reduced; the operation authority data comprises at least one operation of copying, pasting, printing, saving, debugging, viewing source codes, forwarding, reversing and the like, the operation included in the operation authority data can be implemented through the browser, and can also be implemented without authority, the output path of the accessed webpage data is controlled, the accessed webpage data is prevented from being leaked, and the data security of the accessed webpage is improved.
Step S200, connecting a first MAC address, a UUID (Universal Unique Identifier), a request timestamp and a first key into a first character string according to a preset sequence, and encrypting the first character string by using a first encryption algorithm to generate a first signature; in this embodiment, step S200 includes:
acquiring a random UUID, a request timestamp of a webpage access request and a first secret key preset in the local (browser running terminal); in this embodiment, the UUID is a non-repetitive random number value that is only used once and calculated by an algorithm, and the UUID is 16 bits, 32 bits, 64 bits or 128 bits, and in order to balance efficiency and non-repetitive use requirements, the UUID of this embodiment is preferably 32 bits.
Connecting the first MAC address, the UUID, the request timestamp and the first key into a first character string according to a preset sequence; in this embodiment, the preset sequence may be the first MAC address, the UUID, the request timestamp, and the first key, that is, the first character string is the first MAC address + UUID + request timestamp + first key; the first character string can also be a first MAC address, a request timestamp, a UUID and a first key, namely the first character string is the first MAC address, the request timestamp, the UUID and the first key; other sequences are also possible.
Encrypting the first character string by using a first encryption algorithm to generate a first signature; in this embodiment, the first encryption algorithm is the MD5 algorithm.
Step S300, sending an HTTP message to a third-party server corresponding to the request access webpage; in this embodiment, a header of the HTTP message includes a User-Agent (User Agent) and a new verification information; the verification information is used for verifying that the current access request is a legal access request authorized, and comprises a first MAC address, a UUID, a request timestamp and a first signature, and is used for verifying that the current access request is a legal access request authorized.
In this embodiment, a User-Agent of the HTTP protocol is further extended, and a secure browsing identifier (SafeBrowser) is newly added to the User-Agent, where the secure browsing identifier includes information such as a browser type and version, an operating system and version, and a browser kernel.
Step S400, receiving a verification result from the third-party server, and receiving resource data of a webpage sent by the third-party server when the verification result is that the verification is passed; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, if the second signature is consistent with the first signature analyzed by the third-party server from the verification information, the verification result is that the verification is passed, and at the moment, the third-party server sends corresponding resource data according to the webpage access request; if the second signature is not consistent with the first signature, the verification result is verification failure, which indicates that the terminal or the account number accessed this time is not authorized, or the HTTP message is tampered during transmission, at this time, the webpage access is illegal, and the third-party server rejects the access request this time, that is, the resource data of the webpage cannot be acquired from the third-party server.
In this embodiment, the generating of the second signature by the third-party server includes:
the first MAC address, the UUID and the request timestamp are obtained by analyzing the checking information;
acquiring a first secret key preset in a local (third-party server);
and connecting the obtained first MAC address, the UUID, the request timestamp and the first secret key into a second character string according to a preset sequence, and encrypting the second character string by using a first encryption algorithm to generate the second signature. In the present embodiment, the preset order and the first encryption algorithm are the same as in step S200.
When a security browsing identifier is newly added in the User-Agent, after sending an HTTP message to a third-party server corresponding to a request to access a webpage (step S300), the embodiment receives an access denial prompt message or a verification result from the third-party server; wherein:
the access refusing prompt message is obtained by the third-party server judging whether the browser sending the HTTP message has access authority according to the safe browsing identification, if so, the consistency of the second signature and the first signature is continuously judged, and a verification result is sent; if the access authority does not exist, sending an access refusing prompt message; and if the User-Agent does not have the safe browsing identifier to directly refuse the access, sending an access refusing prompt message.
And the verification result is obtained by judging the consistency of the second signature and the first signature when the browser sending the HTTP message has the access right.
In order to prevent the data for accessing the web page display from being acquired by taking a picture, capturing a screen, and the like, the embodiment further includes, after step S400:
acquiring a watermark from a self-owned server through a preset interface address; the watermark is a character string obtained by encrypting the terminal MAC address through a second encryption algorithm;
displaying a webpage by using the received resource data, and adding a watermark into the displayed webpage; therefore, the source tracing can be carried out through the decrypted watermark, and the corresponding terminal is positioned, so that the origin of the watermark photo or the screen shot is positioned and identified, and evidence is provided for responsibility confirmation.
According to the embodiment, the webpage access request is guaranteed not to be tampered in transmission through signature verification, and the signature is generated by combining the random UUID and the preset first secret key, so that the difficulty of tampering the signature is improved, the safety of accessing the webpage through the browser is improved, and the information leakage risk is effectively reduced.
Example 2.
In order to ensure that the current version of the browser can support the acquired webpage resource data and improve the stability of webpage access, compared with embodiment 1, in the embodiment of the application, the verification information further comprises a browser version identifier for identifying the current version of the browser, so that the acquisition of the browser version identifier is more convenient and the efficiency is improved; after the HTTP message is sent to a third-party server corresponding to the webpage requested to be accessed, a version prompt message or a verification result from the third-party server is received; wherein:
the version prompt message is a message sent by the third-party server when the current version does not support the webpage requested to be accessed, and the third-party server judges whether the current version supports the webpage requested to be accessed or not according to the browser version identification.
In the embodiment, a third-party server stores a first table, and each entry of the first table records each browser version and webpage resource data corresponding to each browser version; the third-party server judges whether the current version supports the webpage requested to be accessed according to the browser version identification, and the method comprises the following steps:
if the item corresponding to the browser version identification can be found in the first table, the third-party server is indicated to have webpage resource data which can be supported by the current browser version, the consistency of the second signature and the first signature is continuously judged, and the verification effect is obtained and sent; and if the item corresponding to the browser version identification cannot be found in the first table, indicating that the third-party server does not have webpage resource data which can be supported by the current version of the browser, sending a version prompt message, and prompting to update the version or replace the browser.
When the User-Agent includes the secure browsing identifier, the embodiment receives an access denial prompt message, a version prompt message or a verification result from a third-party server after sending an HTTP message to the third-party server corresponding to the request for accessing the webpage; wherein:
the access refusing prompt message is obtained by judging whether the browser sending the HTTP message has access right or not by the third-party server according to the safe browsing identifier.
If the access authority exists, whether the current version supports the webpage requested to be accessed or not is continuously judged according to the browser version identification, if the webpage resource data which can be supported by the current version of the browser exists, the consistency of the second signature and the first signature is continuously judged, and the obtained verification result is sent; and if the webpage resource data which can be supported by the current version of the browser does not exist, sending a version prompt message without judging the consistency of the second signature and the first signature.
And if the access authority does not exist or the User-Agent does not have a safe browsing identifier, sending an access refusing prompt message without continuing to judge whether the current version supports the webpage requested to be accessed according to the browser version identifier.
Example 3.
Although the signature verification is high in safety, the signature verification process is complex, in order to improve the verification efficiency and ensure that only an authorized terminal can access a specified webpage, in the embodiment of the application, after the HTTP message is sent to a third-party server corresponding to the webpage requested to be accessed, an unauthorized prompt message or a verification result from the third-party server can be received; wherein:
the unauthorized prompt message is a message sent by the third-party server when the MAC address of the terminal is not authorized to access the corresponding webpage;
the third-party server analyzes the obtained first MAC address from the check message and decrypts the analyzed first MAC address to obtain the MAC address of the terminal; judging whether the MAC address obtained by decryption is authorized to access the webpage, if the MAC address is authorized to access the webpage requested to be accessed, continuously judging the consistency of the second signature and the first signature to obtain a verification result; if the MAC address is not authorized to access the webpage requested to be accessed, an unauthorized prompt message is sent, and the webpage requested to be accessed cannot be accessed.
In the embodiment, the tampering risk of the check message is reduced according to the encrypted MAC address, and the MAC address obtained by decryption is used for judging whether the terminal requesting to access the webpage is an authorized terminal, if the first MAC address is tampered or the corresponding terminal is not authorized, the judgment result is that the terminal is not authorized, and signature check is not required to be continuously carried out, so that the webpage is ensured to be authorized and the data leakage risk of the webpage is reduced; and only when the first MAC address is not tampered, signature verification is carried out, so that the signature verification process is assisted to be optimized, and the working efficiency is effectively improved.
In the embodiment, a second table is stored in the third-party server, and the second table records the MAC addresses capable of accessing the webpage; at this time, the third-party server determining whether the decrypted MAC address is authorized to access the web page includes:
if the MAC address which is the same as the MAC address obtained by decryption can be found in the second table, the terminal requesting to access the webpage is an authorized terminal, the consistency of the second signature and the first signature is continuously judged, and a verification effect is obtained and sent; if the MAC address which is the same as the MAC address obtained by decryption cannot be found in the second table, the terminal requesting to access the webpage is an unauthorized terminal, and an unauthorized prompt message is sent.
When the User-Agent includes the secure browsing identifier, the embodiment receives a version prompt message, an unauthorized prompt message or a verification result from a third-party server after sending an HTTP message to the third-party server corresponding to the request for accessing the webpage; wherein:
the version prompt message is a message sent by the third-party server when the current version does not support the webpage requested to be accessed; and the third-party server judges whether the current version supports the webpage requested to be accessed according to the browser version identification.
If the third-party server has webpage resource data which can be supported by the current version of the browser, whether a terminal requesting to access the webpage is authorized to access the corresponding webpage or not is continuously judged according to the first MAC address, if the terminal is authorized, the consistency of the second signature and the first signature is continuously judged, and the obtained verification result is sent; and if the terminal is not authorized, sending an unauthorized prompt message without judging the consistency of the second signature and the first signature.
And if the third-party server does not have webpage resource data which can be supported by the current version of the browser, sending a version prompt message.
Example 4.
The embodiment of the application also discloses a webpage access method, referring to fig. 2, the webpage access method is applied to a server of the webpage, and comprises the following steps:
a100, receiving an HTTP message from a browser; in this embodiment, the message header of the HTTP message includes a User-Agent and a new verification information; wherein:
and newly adding a safe browsing identifier by the User-Agent, wherein the safe browsing identifier comprises information such as the type and version of the browser, the operating system and version, the kernel of the browser and the like.
The verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature; the first signature is generated by connecting the first MAC address, the UUID, the request timestamp and the first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm; the first MAC address is generated for the MAC address of the browser encryption terminal.
Step A200, connecting a preset first key, a first MAC address, a UUID and a request timestamp which are obtained by analyzing verification information into a second character string according to a preset sequence, and encrypting the second character string by using a first encryption algorithm to generate a second signature; in this embodiment, step a200 includes:
the first MAC address, the UUID and the request timestamp are obtained by analyzing the checking information;
acquiring a preset first key from a local (a server requesting to access a webpage);
and connecting the analyzed first MAC address, UUID, request timestamp and first key into a second character string according to a preset sequence, and encrypting the second character string by using a first encryption algorithm to generate a second signature.
Step A300, obtaining the verification result by judging the consistency of the second signature and the first signature obtained by analyzing the verification information; if the second signature is consistent with the first signature, judging that the verification result is verification pass, otherwise, judging that the verification result is verification failure, and indicating that the accessed terminal or account is not authorized or the HTTP message is tampered in transmission, wherein at the moment, the webpage access is illegal, and the third-party server refuses the access request.
Step A400, sending a verification result to a browser requesting to access a webpage, and sending resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed; and when the verification result is that the verification is failed, the webpage access is illegal, and the third-party server refuses the access request, namely the resource data of the webpage requested to be accessed are not sent to the browser.
When a secure browsing identifier is newly added to the User-Agent, after receiving an HTTP message from the browser (step a 100), the present embodiment further includes:
judging whether the browser sending the HTTP message has access authority according to the safe browsing identifier, and if so, continuing to execute the step A200; if the access authority does not exist, sending an access refusing prompt message to the browser, and not executing the steps A100 to A400; and if the User-Agent does not have the secure browsing identifier to directly deny the access, sending an access denial prompt message without executing the steps A100 to A400.
According to the embodiment, signature verification is carried out according to the received HTTP message, the first key preset in the local and the first encryption algorithm, the webpage access request is guaranteed not to be tampered in transmission, and the signature is generated by combining the random UUID and the first key preset, so that the difficulty of tampering the signature is improved, the safety of webpage access is improved, and the information leakage risk is effectively reduced.
In order to ensure that the web page resource data provided to the browser can be supported by the current version of the browser and improve the stability of web page access, in this embodiment, the verification information further includes a browser version identifier for identifying the current version of the browser; after receiving the HTTP message from the browser (step a 100), the method further includes:
judging whether the current version of the browser supports the webpage requested to be accessed or not according to the browser version identification obtained by analyzing the inspection information;
if the webpage requested to be accessed is supported, executing the step A200, continuously judging the consistency of the second signature and the first signature, and sending the obtained verification effect to the browser;
and if the web page is not supported, sending a version prompt message to the browser, prompting that the version of the browser cannot support the web page requested to be accessed, and recommending an updated version or replacing the browser.
In order to improve the verification efficiency, and ensure that only an authorized terminal can access the specified web page, and further reduce the risk of leakage of data of the accessed web page, in this embodiment, after receiving the HTTP message from the browser, the method further includes:
decrypting the first MAC address obtained by analyzing the check information to obtain the MAC address of the terminal;
judging whether the MAC address obtained by decryption is authorized to access the webpage or not;
if the MAC address is authorized to access the webpage, executing the step A200, continuously judging the consistency of the second signature and the first signature, and sending the obtained verification effect to the browser;
if the MAC address is not authorized to access the webpage, sending an unauthorized prompt message, and not continuing to execute the steps A200 to A400.
When the User-Agent comprises the safe browsing identifier and the verification information comprises the browser version identifier, the webpage information protection of different levels is realized, and the safety of the webpage information is fully protected. After receiving the HTTP message from the browser, the present embodiment further includes a pre-check, and referring to fig. 3, the pre-check includes the following steps:
a101, analyzing a safe browsing identifier from a User-Agent of the HTTP message, judging whether a browser sending the HTTP message has an access right according to the safe browsing identifier, and if so, continuing to execute the step A102; otherwise, executing step A107;
a102, analyzing the check information to obtain a first MAC address, a UUID, a request timestamp, a first signature and a browser version identifier;
step A103, judging whether the current version of the browser supports the webpage requested to be accessed according to the browser version identification; if the webpage requested to be accessed is supported, executing the step A104; otherwise, executing step A106;
step A104, decrypting the first MAC address obtained by analysis to obtain the MAC address of the terminal, judging whether the MAC address obtained by decryption is authorized to access the webpage, and executing step A200 if the MAC address is authorized to access the webpage; otherwise, executing step A105;
step A105, sending an unauthorized prompt message to the browser, then ending the signature verification program, and not executing the steps A200 to A400;
step A106, sending a version prompt message to the browser, then ending the signature verification program, and not executing the steps A200 to A400;
step A107, sending a prompt message of refusing to access to the browser, then ending the signature verification program, and not executing the steps A200 to A400.
The embodiment of the present application further discloses a browser, with reference to fig. 4, including:
the MAC address encryption module 110 receives a request for accessing a web page, encrypts a MAC address of a terminal where the MAC address is located, and generates a first MAC address;
the first signature module 120 is configured to connect the first MAC address, the UUID, the request timestamp, and the first key into a first string according to a preset sequence, and encrypt the first string by using a first encryption algorithm to generate a first signature;
a data transceiving module 130 for receiving and transmitting data, including an HTTP message transmitting module 131 and a data receiving module 132; wherein:
the HTTP message sending module 131 is configured to send an HTTP message to a third-party server corresponding to the request for accessing the web page; the message header of the HTTP message comprises check information; the verification information comprises a first MAC address, a UUID, a request timestamp and a first signature;
the data receiving module 132 is configured to receive a verification result from the third-party server, and receive resource data of a webpage sent by the third-party server when the verification result is that verification passes; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, if the second signature is consistent with the first signature obtained by analyzing the verification information, the verification is passed, otherwise, the verification is failed;
and the third party server connects the preset first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the verification information into a second character string according to a preset sequence, and encrypts the second character string by using a first encryption algorithm to generate a second signature.
The browser provided by the embodiment of the application guarantees that the webpage access request is not tampered in transmission through signature verification, and the signature is generated by combining the random UUID and the preset first secret key, so that the difficulty of tampering the signature is improved, the safety of accessing the webpage through the browser is improved, and the information leakage risk is effectively reduced.
The embodiment of the present application further discloses a server of a web page, referring to fig. 5, including:
an HTTP message receiving module 210, configured to receive an HTTP message from a browser; wherein the HTTP message includes verification information; the verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature;
the first signature is generated by connecting a first MAC address, the UUID, a request timestamp and a first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm;
the first MAC address is generated for the MAC address of the browser encryption terminal;
the second signature module 220 is configured to connect the first key, the first MAC address, the UUID, and the request timestamp, which are obtained by parsing the check information, into a second string according to a preset sequence, and encrypt the second string by using a first encryption algorithm to generate a second signature;
the verification module 230 is configured to obtain a verification result by determining consistency between the second signature and the first signature obtained from the verification information analysis; if the second signature is consistent with the first signature, the verification is passed, otherwise, the verification is failed;
and the data sending module 240 is configured to send the verification result to the browser requesting to access the webpage, and send the resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed.
According to the server provided by the embodiment of the application, signature verification is carried out according to the received HTTP message, the first key preset in the local and the first encryption algorithm, the webpage access request is guaranteed not to be tampered in transmission, and the signature is generated by combining the first key preset in the local, so that the difficulty of tampering the signature is improved, the safety of the webpage is improved, and the information leakage risk is effectively reduced.
In addition, a computer-readable storage medium is disclosed in the embodiments of the present application, which stores computer-executable instructions for execution by a processor or a controller, the computer-executable instructions being configured to perform a web page access method (applied to a browser) as provided in embodiments 1 to 3, or configured to perform a web page access method (applied to a server of a web page) as provided in claim 4.
The foregoing is a preferred embodiment of the present application and is not intended to limit the scope of the application in any way, and any features disclosed in this specification (including the abstract and drawings) may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.

Claims (10)

1. A method for accessing a web page, comprising:
receiving a request for webpage access, and encrypting the MAC address of the terminal to generate a first MAC address;
connecting the first MAC address, the UUID, the request timestamp and the first secret key into a first character string according to a preset sequence, and encrypting the first character string by using a first encryption algorithm to generate a first signature;
sending an HTTP message to a third-party server corresponding to the request access webpage; wherein a message header of the HTTP message comprises verification information; the verification information comprises the first MAC address, the UUID, the request timestamp and the first signature;
receiving a verification result from the third-party server, and receiving the resource data of the webpage sent by the third-party server when the verification result is that verification is passed; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, and if the second signature is consistent with the first signature obtained by analyzing the verification information, the verification is passed;
and the third party server connects the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the verification information into a second character string according to a preset sequence, and encrypts the second character string by using the first encryption algorithm to generate the second signature.
2. The method of claim 1, wherein the verification information further includes a browser version identifier that identifies a current version of the browser;
after the sending of the HTTP message to the third-party server corresponding to the request for accessing the web page, the method further includes:
receiving a version prompt message from the third party server; the version prompt message is a message sent by the third-party server when the current version does not support the webpage requested to be accessed, and the third-party server judges whether the current version supports the webpage requested to be accessed according to the browser version identification.
3. The method for accessing web pages according to claim 1, further comprising, after the sending the HTTP message to the third-party server corresponding to the request for accessing web pages:
receiving an unauthorized prompt message from the third-party server; wherein,
the unauthorized prompt message is a message sent by the third-party server when the MAC address of the terminal is not authorized to access the webpage;
and the third-party server analyzes the first MAC address obtained from the verification message, decrypts the first MAC address to obtain the MAC address of the terminal, and judges whether the MAC address obtained by decryption is authorized to access the webpage.
4. The method for accessing a web page according to claim 1, further comprising, before the receiving a request for web page access:
requesting authority data from a self-owned server through a preset interface address;
receiving the ciphertext of the authority data, and decrypting the ciphertext according to a preset second key to obtain the authority data; wherein,
the authority data comprises webpage access authority data and/or operation authority data; the webpage access authority data configures a plurality of webpage addresses according to the requirements of each account, and the webpage addresses are webpage addresses allowed to be accessed or webpage addresses without access authority; the operation authority data comprises at least one operation of copying, pasting, printing, saving as well as debugging, viewing source codes, forwarding and reversing, and the operation authority data comprises operation requests corresponding to the operations which are allowed to be implemented or not authorized to be implemented.
5. The method for accessing web pages according to claim 1, further comprising, after the receiving the resource data of the web pages sent by the third-party server:
the watermark is a character string obtained by encrypting the terminal MAC address through a second encryption algorithm;
and displaying the webpage by using the received resource data, and adding the watermark into the webpage displayed by the webpage.
6. A method for accessing a web page, comprising:
receiving an HTTP message from a browser; wherein the HTTP message includes verification information; the verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature; the first signature is generated by connecting the first MAC address, the UUID, the request timestamp and a first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm; the first MAC address is generated for the MAC address of the browser encryption terminal;
connecting the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the checking information into a second character string according to a preset sequence, and encrypting the second character string by using the first encryption algorithm to generate a second signature;
obtaining the verification result by judging the consistency of the second signature and the first signature obtained by analyzing the verification information; if the second signature is consistent with the first signature, the verification is passed;
and sending the verification result to the browser requesting to access the webpage, and sending the resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed.
7. The method of claim 6, wherein the verification information further includes a browser version identifier that identifies a current version of the browser;
after the receiving the HTTP message from the browser, further comprising:
judging whether the current version of the browser supports the webpage requested to be accessed or not according to the browser version identification obtained by analysis;
and if not, sending a version prompt message to the browser.
8. The method for accessing web pages according to claim 6, further comprising, after said receiving the HTTP message from the browser:
decrypting the first MAC address obtained by analyzing the check information to obtain the MAC address of the terminal;
and judging whether the MAC address obtained by decryption is authorized to access the webpage or not, and if the MAC address is not authorized to access the webpage, sending an unauthorized prompt message.
9. A browser, comprising:
the MAC address encryption module is used for receiving a request for webpage access, encrypting the MAC address of the terminal where the MAC address is located and generating a first MAC address;
the first signature module is used for connecting the first MAC address, the UUID, the request timestamp and the first secret key into a first character string according to a preset sequence, and encrypting the first character string by using a first encryption algorithm to generate a first signature;
the HTTP message sending module is used for sending the HTTP message to a third-party server corresponding to the request access webpage; wherein a message header of the HTTP message comprises verification information; the verification information comprises the first MAC address, the UUID, the request timestamp and the first signature;
the data receiving module is used for receiving a verification result from the third-party server and receiving the resource data of the webpage sent by the third-party server when the verification result is that the verification is passed; wherein:
the verification result is obtained by judging the consistency of a second signature generated by the third-party server and the first signature, and if the second signature is consistent with the first signature obtained by analyzing the verification information, the verification is passed;
and the third party server connects the first key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the verification information into a second character string according to a preset sequence, and encrypts the second character string by using the first encryption algorithm to generate the second signature.
10. A server for a web page, comprising:
the HTTP message receiving module is used for receiving HTTP messages from the browser; wherein the HTTP message includes verification information; the verification information comprises a first MAC address, a UUID, a request timestamp of a webpage access request and a first signature;
the first signature is generated by connecting the first MAC address, the UUID, the request timestamp and a first key into a first character string according to a preset sequence by the browser and encrypting the first character string by using a first encryption algorithm;
the first MAC address is generated for the MAC address of the browser encryption terminal;
the second signature module is used for connecting the first secret key, the first MAC address, the UUID and the request timestamp which are obtained by analyzing the checking information into a second character string according to a preset sequence, and encrypting the second character string by using the first encryption algorithm to generate a second signature;
the verification module is used for obtaining the verification result by judging the consistency of the second signature and the first signature obtained by analyzing the verification information; if the second signature is consistent with the first signature, the verification is passed;
and the data sending module is used for sending the verification result to the browser requesting to access the webpage, and sending the resource data of the webpage requesting to access to the browser when the verification result is that the verification is passed.
CN202011061672.5A 2020-09-30 2020-09-30 Browser, server and webpage access method Pending CN112261012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011061672.5A CN112261012A (en) 2020-09-30 2020-09-30 Browser, server and webpage access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011061672.5A CN112261012A (en) 2020-09-30 2020-09-30 Browser, server and webpage access method

Publications (1)

Publication Number Publication Date
CN112261012A true CN112261012A (en) 2021-01-22

Family

ID=74234862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011061672.5A Pending CN112261012A (en) 2020-09-30 2020-09-30 Browser, server and webpage access method

Country Status (1)

Country Link
CN (1) CN112261012A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887983A (en) * 2021-01-27 2021-06-01 上海银基信息安全技术股份有限公司 Equipment identity authentication method, device, equipment and medium
CN113660096A (en) * 2021-08-11 2021-11-16 挂号网(杭州)科技有限公司 Request signature method and device, electronic equipment and storage medium
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium
CN114666790A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Network distribution method, intelligent device and terminal
CN115001743A (en) * 2022-04-27 2022-09-02 阿里巴巴(中国)有限公司 Access method, device and system
CN115102744A (en) * 2022-06-16 2022-09-23 京东科技信息技术有限公司 Data access method and device
CN116418503A (en) * 2023-04-27 2023-07-11 广东保伦电子股份有限公司 Audio copyright protection method, system and medium
CN116776016A (en) * 2023-06-06 2023-09-19 广东保伦电子股份有限公司 Implementation method and terminal for accessing browser page without registering specific personnel
CN117544322A (en) * 2024-01-10 2024-02-09 北京雪诺科技有限公司 Browser identification method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090300364A1 (en) * 2008-05-29 2009-12-03 James Paul Schneider Username based authentication security
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN108183907A (en) * 2017-12-29 2018-06-19 浪潮通用软件有限公司 A kind of authentication method, server and Verification System
CN108322416A (en) * 2017-01-16 2018-07-24 腾讯科技(深圳)有限公司 A kind of safety certification implementation method, apparatus and system
CN109714370A (en) * 2019-03-07 2019-05-03 四川长虹电器股份有限公司 A kind of implementation method based on http protocol end Yunan County full communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090300364A1 (en) * 2008-05-29 2009-12-03 James Paul Schneider Username based authentication security
CN105763331A (en) * 2014-12-19 2016-07-13 北大方正集团有限公司 Data encryption method, device, data decryption method and device
CN108322416A (en) * 2017-01-16 2018-07-24 腾讯科技(深圳)有限公司 A kind of safety certification implementation method, apparatus and system
CN108183907A (en) * 2017-12-29 2018-06-19 浪潮通用软件有限公司 A kind of authentication method, server and Verification System
CN109714370A (en) * 2019-03-07 2019-05-03 四川长虹电器股份有限公司 A kind of implementation method based on http protocol end Yunan County full communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
初雪: "《计算机信息安全技术与工程实施》", 31 March 2019, 中国原子能出版社 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887983B (en) * 2021-01-27 2023-11-24 上海银基信息安全技术股份有限公司 Equipment identity authentication method, device, equipment and medium
CN112887983A (en) * 2021-01-27 2021-06-01 上海银基信息安全技术股份有限公司 Equipment identity authentication method, device, equipment and medium
CN113660096A (en) * 2021-08-11 2021-11-16 挂号网(杭州)科技有限公司 Request signature method and device, electronic equipment and storage medium
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium
CN114666790A (en) * 2022-04-08 2022-06-24 深圳市欧瑞博科技股份有限公司 Network distribution method, intelligent device and terminal
CN115001743A (en) * 2022-04-27 2022-09-02 阿里巴巴(中国)有限公司 Access method, device and system
CN115001743B (en) * 2022-04-27 2024-03-08 阿里巴巴(中国)有限公司 Access method, device and system
CN115102744A (en) * 2022-06-16 2022-09-23 京东科技信息技术有限公司 Data access method and device
CN116418503A (en) * 2023-04-27 2023-07-11 广东保伦电子股份有限公司 Audio copyright protection method, system and medium
CN116776016B (en) * 2023-06-06 2024-02-27 广东保伦电子股份有限公司 Implementation method and terminal for accessing browser page without registering specific personnel
CN116776016A (en) * 2023-06-06 2023-09-19 广东保伦电子股份有限公司 Implementation method and terminal for accessing browser page without registering specific personnel
CN117544322A (en) * 2024-01-10 2024-02-09 北京雪诺科技有限公司 Browser identification method, device, equipment and storage medium
CN117544322B (en) * 2024-01-10 2024-03-22 北京雪诺科技有限公司 Browser identification method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112261012A (en) Browser, server and webpage access method
CN109522726B (en) Authentication method for applet, server and computer readable storage medium
CN105376216B (en) A kind of remote access method, proxy server and client
KR100621420B1 (en) Network connection system
CN102077213B (en) Techniques for ensuring authentication and integrity of communications
CN109413076B (en) Domain name resolution method and device
JP4879347B2 (en) Relay processing device, relay processing method and program
CN105827574B (en) A kind of file access system, method and device
CN107483495B (en) Big data cluster host management method, management system and server
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN109598104B (en) Software authorization protection system and method based on timestamp and secret authentication file
CN114244522B (en) Information protection method, device, electronic equipment and computer readable storage medium
CN112231674A (en) Skip verification method and system for URL (Uniform resource locator) address and electronic equipment
CN110807210B (en) Information processing method, platform, system and computer storage medium
KR100956452B1 (en) A method for protecting from phishing attack
JP2009199147A (en) Communication control method and communication control program
KR20130085537A (en) System and method for accessing to encoded files
CN106972928B (en) Bastion machine private key management method, device and system
CN111382420A (en) Data transaction method, device, system, electronic equipment and readable storage medium
CN116318899B (en) Data encryption and decryption processing method, system, equipment and medium
CN114884736B (en) Safety protection method and device for explosion attack prevention
KR20190083160A (en) Module for controlling encryption communication protocol
CN110972141B (en) Information verification method and device, electronic equipment and readable storage medium
JP4202980B2 (en) Module starter, method and system
CN115695023A (en) Access system of remote terminal service container

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210122

RJ01 Rejection of invention patent application after publication