CN113395337B - Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium - Google Patents

Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium Download PDF

Info

Publication number
CN113395337B
CN113395337B CN202110614414.3A CN202110614414A CN113395337B CN 113395337 B CN113395337 B CN 113395337B CN 202110614414 A CN202110614414 A CN 202110614414A CN 113395337 B CN113395337 B CN 113395337B
Authority
CN
China
Prior art keywords
network request
network
browser
response data
resource type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110614414.3A
Other languages
Chinese (zh)
Other versions
CN113395337A (en
Inventor
赵剑萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110614414.3A priority Critical patent/CN113395337B/en
Publication of CN113395337A publication Critical patent/CN113395337A/en
Priority to PCT/CN2022/089299 priority patent/WO2022252882A1/en
Application granted granted Critical
Publication of CN113395337B publication Critical patent/CN113395337B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Abstract

The embodiment of the application discloses a method and a device for preventing a browser webpage from being hijacked, electronic equipment and a computer-readable storage medium, which are used for effectively preventing network hijacking, greatly improving the safety of the browser for accessing the webpage and improving user experience. The method in the embodiment of the application comprises the following steps: receiving first response data of a server to a first network request, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser.

Description

Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium
Technical Field
The present application relates to the internet field, and in particular, to a method and an apparatus for preventing hijacking of a browser webpage, an electronic device, and a computer-readable storage medium.
Background
Network hijacking sometimes occurs during a user's access to a web page using a browser. Network hijacking can change the content of web pages and cause problems such as consuming large amounts of data traffic. In the related art, for network hijacking, hijacking prevention in data transmission is performed by deploying hypertext Transfer Protocol over Secure Socket Layer (https) on the server side. However, when the browser accesses the webpage to obtain the data, no specific processing mode exists in the aspect of anti-hijacking of the data.
Disclosure of Invention
The embodiment of the application provides a method and a device for preventing browser webpage hijacking, electronic equipment and a computer readable storage medium, which can effectively prevent network hijacking, greatly improve the safety of the browser for accessing the webpage and improve user experience.
In a first aspect, the present application provides a method for preventing a browser webpage from being hijacked, where the method is applied to an electronic device, and the method may include:
receiving first response data of a server to a first network request, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data;
and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser.
The present application provides a device for preventing a browser web page from being hijacked, which may include:
the receiving and sending module is used for receiving first response data of a server to a first network request, and the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data;
and the processing module is used for pausing the network state machine of the browser and disconnecting the network link of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data.
Third aspect the present application provides an electronic device, which may include:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method according to the first aspect of the application.
Fourth aspect the present application provides a computer readable storage medium comprising instructions which, when executed on a processor, cause the processor to perform the method of the first aspect of the present application.
The present application also provides a computer program product for causing a computer to perform the method of the first aspect of the present application when the computer program product runs on the computer.
The present application further provides an application publishing platform for publishing a computer program product, wherein the computer program product, when run on a computer, causes the computer to perform the method of the first aspect of the present application.
In the embodiment of the application, first response data of a server to a first network request is received, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser. If the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, the accessed webpage data is considered to be hijacked, so that the electronic equipment can pause the network state machine of the browser and disconnect the network link of the browser, and the safety of data access is ensured. Therefore, the network hijacking can be effectively prevented, the safety of the browser for accessing the webpage is greatly improved, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and obviously, the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained according to the drawings.
FIG. 1 is a schematic diagram illustrating an embodiment of a method for preventing hijacking of a browser webpage in an embodiment of the present application;
FIG. 2 is a schematic diagram of another embodiment of a method for preventing hijacking of a browser webpage in an embodiment of the present application;
FIG. 3 is a schematic diagram of another embodiment of a method for preventing hijacking of a browser webpage in an embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of a method for preventing hijacking of a browser webpage in an embodiment of the present application;
FIG. 5 is a schematic diagram of an embodiment of a device for preventing a browser webpage from being hijacked according to the embodiment of the present application;
FIG. 6A is a diagram of an embodiment of an electronic device in an embodiment of the application;
fig. 6B is a schematic diagram of another embodiment of the electronic device in the embodiment of the application.
Detailed Description
The embodiment of the application provides a method and a device for preventing a browser webpage from being hijacked, electronic equipment and a computer-readable storage medium, which are used for effectively preventing network hijacked, greatly improving the safety of the browser for accessing the webpage and improving user experience.
In order to make those skilled in the art better understand the technical solutions of the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. The embodiments in the present application shall fall within the protection scope of the present application.
In the process of accessing a web page by a user using a browser, network hijacking sometimes occurs. Network hijacking can change the content of a web page and cause problems such as users consuming large amounts of data traffic when accessing the web page. For example, when a user accesses a certain novel webpage, the residence time of the user on the novel webpage may be long, and if the novel webpage content is hijacked, the user always downloads a certain game in the background while watching the novel webpage or adds some unnecessary webpage elements on the webpage due to hijacking, which may cause a large amount of traffic loss, cause economic loss in a scene unknown to the user, and damage the user's benefits. In the prior art, a solution to network hijacking is to deploy an https security protocol on the server side to perform hijacking prevention in data transmission, but no specific implementation mode exists for hijacking prevention on the aspect after a browser accesses web page data.
In addition, the prior art completely depends on a network protocol, and hijacking is prevented through data encryption in the data transmission process, although the way can prevent tampering to a certain extent, the way can also be tampered in a way of deceiving a relay server, so that hijacking cannot be well avoided. Moreover, many users do not add an http secure protocol when inputting web page addresses, so that browsers can actively add an http non-secure protocol, and the risk of web page hijacking is increased. In addition, if the web page data is tampered, for example, the web page element is a link of a picture, but the link is hijacked, the returned first response data is data of an application apk, so that the user can return an application data after accessing the web page data, for example, a picture of 4MB is originally accessed, and as a result, an application apk of 400MB size is returned, so that the user can unconsciously spend a large amount of unnecessary traffic. For similar scenes, at present, no good solution exists on the browser side.
In this embodiment, the electronic device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in self driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation safety (transportation safety), a wireless terminal device in city (smart city), a wireless terminal device in smart home (smart home), or the like.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
In the embodiment of the application, a method for preventing the webpage of the browser from being hijacked is provided, so that the flow of a user is prevented from being maliciously consumed to a great extent, the benefit of the user is damaged, and the experience of the user is greatly improved.
As shown in fig. 1, a schematic view of an embodiment of a method for preventing a browser webpage from being hijacked in an embodiment of the present application, where the embodiment of the method is applied to an electronic device, and the embodiment of the method may include:
101. first response data of a server to a first network request is received, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data.
In one embodiment, before receiving first response data of the server to the first network request, the electronic device needs to create and send the first network request to the server, where the first network request is used for the electronic device to request to access the web page data through the browser.
102. And if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser.
In one embodiment, the requesting, by the first network, a corresponding resource type may include: pictures, audio, video, css (Cascading Style Sheets), js (javascript), binary data, and the like.
In one embodiment, the resource type corresponding to the first response data may include: pictures, audio, video, css, js, binary data, etc.
It can be understood that, if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, for example: the resource type corresponding to the first network request is a picture, and the resource type corresponding to the first response data is binary data; or if the resource type corresponding to the first network request is js (javascript), and the resource type corresponding to the first response data is css (Cascading Style Sheets), the network state machine of the browser is paused, and the network link of the browser is disconnected.
In the embodiment of the application, first response data of a server to a first network request is received, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser. If the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, the accessed webpage data is considered to be hijacked, so that the electronic equipment can pause the network state machine of the browser and disconnect the network link of the browser, and the safety of data access is ensured. Therefore, the network hijacking can be effectively prevented, the safety of the browser for accessing the webpage is greatly improved, and the user experience is improved.
As shown in fig. 2, a schematic view of an embodiment of a method for preventing hijacking of a browser webpage in an embodiment of the present application, where the embodiment of the method is applied to an electronic device, and the embodiment of the method may include:
201. a link address for accessing a web page is obtained.
Optionally, the obtaining, by the electronic device, a link address for accessing the web page may include: the electronic equipment responds to the operation of inputting the link address by the user, acquires the link address for accessing the webpage and judges whether the link address uses the security protocol.
Optionally, the obtaining, by the electronic device, a link address for accessing the web page may include: the electronic equipment responds to the operation of inputting the link address by the user and acquires the link address for accessing the webpage; judging whether the link address is a valid input address or not, and if so, judging whether the link address uses a safety protocol or not; if the address is not a valid input address, an error is reported.
Illustratively, when the electronic device detects that a user starts a browser and inputs a link address to prepare for opening a webpage, the electronic device responds to the operation of inputting the link address by the user to judge whether the link address is a valid input address, and if the link address is the valid input address, the electronic device judges whether a security protocol used by the link address is used; if not, an error is reported.
202. And creating a first network request according to the link address.
203. The electronic device sends a first network request to the server.
Optionally, the electronic device stores the resource type corresponding to the first network request.
Optionally, the creating, by the electronic device, a first network request according to the link address, and sending the first network request to the server may include:
(1) if the link address uses a security protocol, a first network request is created and sent to the server, and the first network request comprises the link address using the security protocol.
Illustratively, if the link address uses a security protocol, the electronic device creates a first network request, wherein the first network request includes the link address using https security protocol, and sends the first network request to the server; the resource type requested by the first network may also be saved for use by subsequent servers when returning the first response data, and then begin to wait for the server to send the first response data.
(2) If the link address uses the non-secure protocol, the link address using the non-secure protocol is converted into the link address using the secure protocol, and a first network request is created and sent to the server, wherein the first network request comprises the link address converted into the secure protocol.
Illustratively, if the link address uses the non-secure protocol, the link address using the http non-secure protocol is converted into the link address using the https secure protocol by a correction method, and then the first network request is created and sent to the server, wherein the first network request comprises the link address converted into the https secure protocol. The resource type requested by the first network may also be saved for use by subsequent servers when returning the first response data, and then begin to wait for the server to send the first response data.
204. First response data of a server to a first network request is received, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data.
It will be appreciated that the first network request is a network request of the primary resource and, thus, the first response data also corresponds to response data of the primary resource; the first network request is a network request of a sub-resource, and the first response data corresponds to response data of the sub-resource.
205. And if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser.
Optionally, if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser may include:
(1) if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending a network state machine of the browser, disconnecting a network link of the browser, and stopping receiving the webpage data sent by the server; or the like, or, alternatively,
(2) if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, sending a link address used by the first network request to the server, wherein the link address used by the first network request is used for data statistics and background optimization of the server, suspending a network state machine of the browser and disconnecting the network link of the browser; or the like, or, alternatively,
(3) if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, sending the first response data serving as hijacked data to the server, wherein the first response data is used for data statistics and background optimization of the server, suspending a network state machine of the browser and disconnecting a network link of the browser; or the like, or, alternatively,
(4) and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, the first response data is used as hijacked data, and the link address used by the first network request is sent to the server, wherein the first response data and the link address used by the first network request are used for data statistics and background optimization of the server, a network state machine of the browser is suspended, and the network link of the browser is disconnected.
Optionally, if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser may include:
(1) if the first response data are response data of the sub-resources, the electronic equipment determines a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, the electronic equipment suspends the network state machine of the browser and disconnects the network link of the browser.
(2) If the first response data are response data of the sub-resources, the electronic equipment determines a resource type corresponding to the first response data; if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, the electronic equipment suspends the network state machine of the browser and disconnects the network link of the browser; the server stops sending the webpage data to the electronic equipment.
(3) If the first response data is response data of the main resource, the electronic equipment determines a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, the electronic equipment suspends the network state machine of the browser, disconnects the network link of the browser and displays an error page.
(4) If the first response data is response data of the main resource, the electronic equipment determines a resource type corresponding to the first response data; if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, the electronic equipment suspends the network state machine of the browser, disconnects the network link of the browser and displays an error page; the server stops sending the webpage data to the electronic equipment.
Illustratively, if the electronic device successfully receives the first response data, the resource type (for example, a type such as a picture, css, js, binary data, etc.) corresponding to the first response data is obtained. Optionally, the resource type of the first response data may be obtained by parsing the header of the first response data. And if the resource type corresponding to the first response data is successfully acquired, comparing the resource type with the resource type corresponding to the first network request. If the resource types are not consistent, determining that the webpage data accessed by the first network request are hijacked, reporting the hijacked webpage data and the link address used by the first network request to a server for subsequent data statistics and background optimization, then suspending a network state machine of the browser, disconnecting the network link of the browser, and stopping the server from sending the webpage data to the electronic equipment, thereby avoiding unnecessary traffic waste.
If the resource type corresponding to the first response data is not successfully acquired, that is, the header of the first response data is not successfully analyzed, and the resource type of the first response data is not acquired, reading the first N bytes in the first response data, and acquiring the resource type of the first response data by a resource type conversion method, where N is an integer greater than 0. The electronic device may pre-store a mapping relationship table between different bytes and resource types.
If the resource type conversion is successful, namely the resource type converted by the first response data is successfully acquired, whether the converted resource type is consistent with the resource type corresponding to the network request or not is judged, the subsequent steps are similar to the description above, and the description is omitted here; if the resource type conversion is unsuccessful, defaulting that the first response data is normal server response data, namely the resource type corresponding to the first response data is consistent with the resource type corresponding to the first network request, and analyzing, displaying and typesetting the webpage content of the first response data; then waiting for the server to return other network requests corresponding response data.
It will be appreciated that the electronic device may automatically convert from a link address using a non-secure protocol to a link address using a secure protocol upon obtaining the link address for accessing the web page. The electronic equipment records the resource type of each network request, then sends the network request, waits for the server to send response data, compares the resource type corresponding to the returned response data with the resource type corresponding to the network request, if the resource type corresponding to the returned response data is not matched with the resource type corresponding to the network request, the webpage data are considered to be hijacked, then the network request can be disconnected, and the return of the webpage data is terminated, so that the problem of wrong data return caused by the hijacked webpage data in the whole webpage is solved; according to the scheme, safe transmission is carried out in data transmission, hijacking of webpage data can be monitored and terminated, safety of the browser is greatly improved, unnecessary economic loss caused by the fact that excessive hijacking damages benefits of users is avoided, and user experience is improved.
206. And if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyzing the first response data to display the network content.
Optionally, the web content is composed web content.
In some embodiments, if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, the first response data is parsed to display the network content.
Optionally, the web content is composed web content.
For example, if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, the electronic device parses the first response data to obtain the network content, and finally displays the network content on the electronic device through a Graphics Processing Unit (GPU).
In the embodiment of the application, the electronic equipment acquires a link address for accessing a webpage; creating a first network request according to the link address; the electronic equipment sends a first network request to a server; receiving first response data of a server to a first network request, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data; if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser; and if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyzing the first response data to display the network content.
After sending a first network request and returning first response data, judging whether the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data returned by the server, if not, suspending the network state machine of the browser and disconnecting the network link of the browser; therefore, the resource hijacking for accessing the webpage data can be monitored and terminated, the phenomenon that the webpage data are hijacked to cause flow consumption is avoided in time, the stability and the safety of the browser are greatly improved, and further the user experience is improved. Furthermore, after the scheme is used, a user can access the webpage data by adopting the https security protocol to a great extent, the access protocol is effectively prevented from being tampered when the webpage data is accessed midway, and the security of the webpage data is improved. And if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyzing the first response data to display the network content, and not influencing the normal access of the user to the webpage data.
As shown in fig. 3, a schematic view of an embodiment of a method for preventing a browser webpage from being hijacked in an embodiment of the present application, where the embodiment of the method is applied to an electronic device, and the embodiment of the method may include:
301. a link address for accessing a web page is obtained.
302. And creating a first network request according to the link address.
303. The electronic device sends a first network request to the server.
It should be noted that, in the embodiment of the present application, the steps 301-303 can refer to the description of the steps 201-203 in the embodiment shown in fig. 2, and are not described herein again.
304. And if the first response data is not received, judging whether the first network request comprises a link address using a security protocol.
Optionally, if the first response data is not received, determining whether the first network request includes a link address using a security protocol may include: and if the first response data sent by the server is not received within the preset duration, judging whether the first network request comprises a link address using the security protocol.
305. If yes, pausing the network state machine of the browser, disconnecting the network link of the browser, converting the link address using the secure protocol into the link address using the non-secure protocol, and creating a second network request, wherein the second network request comprises the link address converted into the non-secure protocol, and the second network request is used for accessing webpage data.
Optionally, if the first network request includes a link address using a secure protocol, suspending the network state machine of the browser, disconnecting the network link of the browser, converting the link address using the secure protocol into a link address using a non-secure protocol, creating a second network request, recovering the network state machine of the browser, and rebuilding the network link of the browser, where the second network request includes the link address converted into the non-secure protocol, and the second network request is used to access the web page data again.
306. The electronic device sends the second network request to a server.
Optionally, the electronic device stores the resource type corresponding to the second network request.
For example, after sending the first network request, the electronic device waits for the server to send the first response data, if the server does not receive the first response data sent by the server, determines whether the first network request uses a link address of a security protocol, if the first network request uses a link address of an https security protocol, suspends a network state machine of the browser, disconnects a network link of the browser, converts the https security protocol into an http non-security protocol, then resumes the network state machine of the browser, reconstructs the network link of the browser, recreates the second network request, and sends the second network request to the server, where the second network request uses the link address of the http non-security protocol. And meanwhile, the resource type requested by the second network is stored, and the server is waited to send second response data. It should be noted that, the processing flow after sending the second network request is similar to the flow of returning the first response data in the embodiments described in fig. 1 and fig. 2, and reference may be made to the description above, and details are not repeated here.
After the electronic device sends the first network request to the server, if the first response data sent by the server is not received, the electronic device may determine whether the link address of the security protocol or the link address of the non-security protocol is used by the first network request sent at the beginning, if the link address of the security protocol is used, the terminal device may not support the access of the web page data of the protocol, in order to preferentially ensure the requirement of the user for accessing the web page data, the security of accessing the web page data may be temporarily not considered, the link address using the security protocol may be converted into the link address using the non-security protocol, and a second network request including the link address converted into the non-security protocol is created again and sent to the server. Therefore, the user can be ensured to normally access the webpage data, and the user experience is improved.
307. And if the first network request does not comprise the link address using the security protocol, the electronic equipment performs corresponding processing.
If the first network request does not include the link address using the security protocol, the electronic device performs corresponding processing, which may include:
if the first network request does not comprise a link address using the security protocol and is a network request of a main resource, reporting a network error code to the server;
if the first network request does not include a link address using the security protocol and the network request is a network request of a child resource, ignoring the network request.
For example, after the electronic device sends the first network request, the electronic device waits for the server to send the first response data, and if the electronic device does not receive the first response data sent by the server, the electronic device may further determine whether the link address of the secure protocol or the link address of the non-secure protocol is used by the first network request sent at the beginning, and if the link address of the http non-secure protocol is used and the first network request is a network request of a primary resource, report a network error code to the server for subsequent background statistics and data optimization. Optionally, the electronic device displays an error page to prompt the user that the web page access has failed. If the first network request is a sub-resource network request, the network request is ignored.
In the embodiment of the application, the electronic equipment acquires a link address for accessing a webpage; creating a first network request according to the link address; the electronic equipment sends a first network request to a server; if the first response data is not received, judging whether the first network request comprises a link address using a security protocol; if yes, pausing a network state machine of the browser, disconnecting a network link of the browser, converting a link address using a secure protocol into a link address using a non-secure protocol, and creating a second network request, wherein the second network request comprises the link address converted into the non-secure protocol, and the second network request is used for accessing webpage data; and if the first network request does not comprise the link address using the security protocol, the electronic equipment performs corresponding processing. After the scheme is used, a user can access the webpage data by adopting the https security protocol to a great extent, the access protocol is effectively prevented from being tampered when the webpage data are accessed midway, and the security of the webpage data is improved.
Further, after the first network request including the link address using the secure protocol is sent to the server and the first response data sent by the server is not received, the link address using the secure protocol may be converted into the link address using the non-secure protocol, and the second network request including the link address using the non-secure protocol may be created again. Therefore, the user can normally access the webpage data, the use of the user is not influenced, and the user experience is improved.
It should be noted that the embodiments shown in fig. 1-3 can be combined with each other, and the combined embodiments are also within the scope of the present application. Fig. 4 is a schematic diagram illustrating another embodiment of a method for preventing a browser webpage from being hijacked according to the embodiment of the present application. Fig. 4 is a schematic overall frame diagram of the embodiment shown in fig. 1 to 3. The steps shown in fig. 4 are not necessarily essential steps, and steps that are not shown are also within the scope of the present application.
As shown in fig. 5, a schematic diagram of an embodiment of an apparatus for preventing hijacking of a browser webpage in an embodiment of the present application may include:
a transceiver module 501, configured to receive first response data of a server to a first network request, where the first network request is sent by the electronic device through a browser and is used to request to access web page data;
a processing module 502, configured to suspend the network state machine of the browser and disconnect the network link of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data.
Optionally, the processing module 502 is further configured to obtain a link address for accessing a web page;
a processing module 502, further configured to create a first network request if the link address uses a security protocol, where the first network request includes the link address using the security protocol;
or the like, or, alternatively,
a processing module 502, further configured to, if the link address uses a non-secure protocol, convert the link address using the non-secure protocol into a link address using a secure protocol, and create a first network request, where the second network request includes the link address converted into the secure protocol;
the transceiver module 501 is further configured to send the first network request to the server.
Optionally, the processing module 502 is further configured to determine whether the first network request includes a link address using a security protocol if the first response data is not received; if yes, pausing a network state machine of the browser, disconnecting a network link of the browser, converting a link address using a secure protocol into a link address using a non-secure protocol, and creating a second network request, wherein the second network request comprises the link address converted into the non-secure protocol, and the second network request is used for requesting to access webpage data;
the transceiver module 501 is further configured to send the second network request to the server.
Optionally, the transceiver module 501 is further configured to report a network error code to the server if the first network request does not include a link address using a security protocol and the first network request is a network request of a main resource;
the processing module 502 is further configured to ignore the first network request if the first network request does not include a link address using a security protocol and the first network request is a network request of a child resource.
Optionally, the processing module 502 is specifically configured to determine, if the first response data is response data of a sub-resource, a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network link of the browser.
Optionally, the processing module 502 is specifically configured to determine, if the first response data is response data of a main resource, a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser, disconnecting the network link of the browser and displaying an error page.
Optionally, the display module 503 is configured to, if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyze the first response data to display the network content.
As shown in fig. 6A, which is a schematic diagram of another embodiment of the electronic device in the embodiment of the present application, a device for preventing hijacking of a browser webpage as shown in fig. 5 may be included.
As shown in fig. 6B, which is a schematic view of another embodiment of the electronic device in the embodiment of the present application, the method may include:
fig. 6B is a block diagram illustrating a partial structure of a mobile phone related to an electronic device provided in an embodiment of the present application. Referring to fig. 6B, the handset includes: radio Frequency (RF) circuit 610, memory 620, input unit 630, display unit 640, sensor 650, audio circuit 660, wireless fidelity (Wi-Fi) module 670, processor 680, and power supply 690. Those skilled in the art will appreciate that the handset configuration shown in fig. 6B is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 6B:
the RF circuit 610 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 680; in addition, data for designing uplink is transmitted to the base station. In general, RF circuit 610 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, may collect touch operations of a user (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The Display unit 640 may include a Display panel 641, and optionally, the Display panel 641 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 6B, the touch panel 631 and the display panel 641 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 641 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, the description is omitted here.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and a cell phone. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signals into electrical signals, which are received by the audio circuit 660 and converted into audio data, which are processed by the audio data output processor 680 and then transmitted via the RF circuit 610 to, for example, another cellular phone, or output to the memory 620 for further processing.
Wi-Fi belongs to short-distance wireless transmission technology, and a mobile phone can help a user to receive and send emails, browse webpages, access streaming media and the like through a Wi-Fi module 670, and provides wireless broadband internet access for the user. Although fig. 6B shows the Wi-Fi module 670, it is understood that it does not belong to the essential constitution of the handset and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 680 is a control center of the mobile phone, and connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby performing overall monitoring of the mobile phone. Optionally, processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The handset also includes a power supply 690 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 680 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which will not be described herein.
In an embodiment of the application, the RF circuit 610 is configured to receive first response data of a server to a first network request, the first network request being sent by the electronic device through a browser and being used for requesting access to web page data;
the processor 680 is configured to suspend the network state machine of the browser and disconnect the network link of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data.
Optionally, the processor 680 is further configured to obtain a link address for accessing a web page;
a processor 680, further configured to create a first network request if the link address uses a security protocol, where the first network request includes the link address using the security protocol;
or the like, or, alternatively,
a processor 680, further configured to, if the link address uses a non-secure protocol, convert the link address using the non-secure protocol into a link address using a secure protocol, and create a first network request, where the second network request includes the link address converted to use the secure protocol;
RF circuitry 610 is further configured to send the first network request to the server.
Optionally, the processor 680 is further configured to determine whether the first network request includes a link address using a security protocol if the first response data is not received; if yes, pausing a network state machine of the browser, disconnecting a network link of the browser, converting a link address using a secure protocol into a link address using a non-secure protocol, and creating a second network request, wherein the second network request comprises the link address converted into the non-secure protocol, and the second network request is used for requesting to access webpage data;
RF circuitry 610 is further configured to send the second network request to the server.
Optionally, the RF circuit 610 is further configured to report a network error code to the server if the first network request does not include a link address using a security protocol and the first network request is a network request of a main resource;
the processor 680 is further configured to ignore the first network request if the first network request does not include a link address using a security protocol and the first network request is a network request of a child resource.
Optionally, the processor 680 is specifically configured to determine, if the first response data is response data of a sub-resource, a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspending a network state machine of the browser and disconnecting the network link of the browser.
Optionally, the processor 680 is specifically configured to determine, if the first response data is response data of a main resource, a resource type corresponding to the first response data; and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser, disconnecting the network link of the browser and displaying an error page.
Optionally, the display unit 640 is configured to, if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyze the first response data to display the network content.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for preventing hijacking of a browser webpage is applied to electronic equipment, and comprises the following steps:
receiving first response data of a server to a first network request, wherein the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data;
and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network connection of the browser.
2. The method of claim 1, wherein prior to receiving the first response data of the server to the first network request, the method further comprises:
acquiring a link address for accessing a webpage;
if the link address uses a security protocol, creating and sending a first network request to the server, wherein the first network request comprises the link address using the security protocol;
if the link address uses the non-secure protocol, the link address using the non-secure protocol is converted into the link address using the secure protocol, and a first network request is created and sent to the server, wherein the first network request comprises the link address converted into the secure protocol.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
if the first response data is not received, judging whether the first network request comprises a link address using a security protocol;
if yes, suspending a network state machine of the browser, disconnecting the network connection of the browser, converting a link address using a secure protocol into a link address using a non-secure protocol, and creating and sending a second network request to the server, wherein the second network request comprises the link address converted to use the non-secure protocol, and the second network request is used for requesting to access webpage data.
4. The method of claim 3, further comprising:
if the first network request does not comprise a link address using a security protocol and is a network request of a main resource, reporting a network error code to the server;
if the first network request does not include a link address using a security protocol and the first network request is a network request for a child resource, ignoring the first network request.
5. The method according to claim 1 or 2, wherein if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network connection of the browser comprises:
if the first response data is response data of a sub-resource, determining a resource type corresponding to the first response data;
and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network connection of the browser.
6. The method according to claim 1 or 2, wherein if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser and disconnecting the network connection of the browser comprises:
if the first response data is response data of the main resource, determining a resource type corresponding to the first response data;
and if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data, suspending the network state machine of the browser, disconnecting the network connection of the browser and displaying an error page.
7. The method according to claim 1 or 2, characterized in that the method further comprises:
and if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, analyzing the first response data to display the network content.
8. An apparatus for preventing hijacking of a browser webpage, comprising:
the system comprises a receiving and sending module, a processing module and a processing module, wherein the receiving and sending module is used for receiving first response data of a server to a first network request, and the first network request is sent by the electronic equipment through a browser and is used for requesting to access webpage data;
and the processing module is used for pausing the network state machine of the browser and disconnecting the network connection of the browser if the resource type corresponding to the first network request is not consistent with the resource type corresponding to the first response data.
9. An electronic device, comprising:
a memory storing executable program code;
a transceiver and a processor coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of any of claims 1-7.
10. A computer-readable storage medium comprising instructions that, when executed on a processor, cause the processor to perform the method of any one of claims 1-7.
CN202110614414.3A 2021-06-02 2021-06-02 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium Active CN113395337B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110614414.3A CN113395337B (en) 2021-06-02 2021-06-02 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium
PCT/CN2022/089299 WO2022252882A1 (en) 2021-06-02 2022-04-26 Anti-hijacking method and apparatus for browser webpage, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110614414.3A CN113395337B (en) 2021-06-02 2021-06-02 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113395337A CN113395337A (en) 2021-09-14
CN113395337B true CN113395337B (en) 2022-09-27

Family

ID=77619978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110614414.3A Active CN113395337B (en) 2021-06-02 2021-06-02 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN113395337B (en)
WO (1) WO2022252882A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395337B (en) * 2021-06-02 2022-09-27 Oppo广东移动通信有限公司 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium
CN114222301B (en) * 2021-12-13 2024-04-12 奇安盘古(上海)信息技术有限公司 Fraud site processing method, fraud site processing device and storage medium
CN116912669B (en) * 2023-09-11 2023-11-28 中国物品编码中心 Webpage hijacking monitoring method, system, electronic equipment and storage medium
CN116980236B (en) * 2023-09-25 2024-01-09 腾讯科技(深圳)有限公司 Network security detection method, device, equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010044820A1 (en) * 2000-04-06 2001-11-22 Scott Adam Marc Method and system for website content integrity assurance
EP1610518A1 (en) * 2004-06-21 2005-12-28 Ehsan Aboual Chamat Authentication system and security device
JP2007128119A (en) * 2004-12-17 2007-05-24 Pcsafe Inc Method and system for carrying out filter processing of url, web page, and content
CN103618766B (en) * 2013-11-14 2018-01-26 北京奇虎科技有限公司 A kind of method and web game interactive server for carrying out web game interaction
CN104079673B (en) * 2014-07-30 2018-12-07 北京奇虎科技有限公司 A kind of methods, devices and systems for preventing DNS from kidnapping in application downloading
CN105245518B (en) * 2015-09-30 2018-07-24 小米科技有限责任公司 The detection method and device that network address is kidnapped
CN106911693B (en) * 2017-02-27 2020-11-10 百度在线网络技术(北京)有限公司 Method and device for detecting hijacking of webpage content and terminal equipment
CN109861947B (en) * 2017-11-30 2022-03-22 腾讯科技(武汉)有限公司 Network hijacking processing method and device and electronic equipment
CN108768870B (en) * 2018-05-04 2019-09-10 Oppo广东移动通信有限公司 Flow control methods, device and mobile terminal
CN108920589B (en) * 2018-06-26 2021-08-10 百度在线网络技术(北京)有限公司 Browsing hijacking identification method, device, server and storage medium
CN113395337B (en) * 2021-06-02 2022-09-27 Oppo广东移动通信有限公司 Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113395337A (en) 2021-09-14
WO2022252882A1 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
CN113395337B (en) Method and device for preventing browser webpage from being hijacked, electronic equipment and storage medium
CN107040609B (en) Network request processing method and device
US10853437B2 (en) Method and apparatus for invoking application programming interface
CN108924037B (en) Display method of rich media communication RCS message and mobile terminal
EP3531290A1 (en) Data backup method, apparatus, electronic device, storage medium, and system
US10095666B2 (en) Method and terminal for adding quick link
CN108039963B (en) Container configuration method and device and storage medium
CN108170723B (en) Webpage resource acquisition method, terminal equipment, server and system
CN110719319B (en) Resource sharing method, device, terminal equipment and storage medium
CN110780940A (en) Application program loading method, electronic device and storage medium
WO2018049894A1 (en) Data transmission method and device
CN111049980A (en) Application sharing method, electronic equipment and computer readable storage medium
US10713414B2 (en) Web page display method, terminal, and storage medium
CN115589361A (en) Management equipment firmware updating method and device, electronic equipment and storage medium
CN108270764B (en) Application login method, server and mobile terminal
CN111061404A (en) Control method and first electronic device
CN112691363A (en) Cross-terminal switching method and related device for cloud games
CN111131607A (en) Information sharing method, electronic equipment and computer readable storage medium
CN111443847B (en) Push message processing method and electronic equipment
CN111159738B (en) Authority configuration method, application login method and device
CN111177612B (en) Page login authentication method and related device
CN112395106A (en) Process management method, mobile terminal, and computer-readable storage medium
CN110187934B (en) Application control method, terminal and computer readable storage medium
CN111356096B (en) Information sending method and electronic equipment
CN106304087B (en) Anti-wifi hijacking method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220414

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 518000 1701, office building T2, Qianhai China Resources Financial Center, 55 guiwan 4th Road, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen City, Guangdong Province

Applicant before: SHENZHEN ZHONGKE MINGWANG COMMUNICATION SOFTWARE CO.,LTD.

GR01 Patent grant
GR01 Patent grant