CN113726770A - Data interception method and device, computer equipment and storage medium - Google Patents

Data interception method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113726770A
CN113726770A CN202111003059.2A CN202111003059A CN113726770A CN 113726770 A CN113726770 A CN 113726770A CN 202111003059 A CN202111003059 A CN 202111003059A CN 113726770 A CN113726770 A CN 113726770A
Authority
CN
China
Prior art keywords
data
network request
client
network
feedback data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111003059.2A
Other languages
Chinese (zh)
Other versions
CN113726770B (en
Inventor
张訸龙
崔子龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An International Financial Leasing Co Ltd
Original Assignee
Ping An International Financial Leasing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An International Financial Leasing Co Ltd filed Critical Ping An International Financial Leasing Co Ltd
Priority to CN202111003059.2A priority Critical patent/CN113726770B/en
Publication of CN113726770A publication Critical patent/CN113726770A/en
Application granted granted Critical
Publication of CN113726770B publication Critical patent/CN113726770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a data interception method, a data interception device, computer equipment and a storage medium, wherein the method comprises the following steps: intercepting network request data of a client, wherein the network request data comprises network request parameters and time identification; sending the network request parameter to a server, and intercepting feedback data of the server responding to the network request parameter; identifying the feedback data and adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and returning the identification result to the client; and caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding recognition result based on the time identification. According to the invention, system level software is not required to be installed, network request data and feedback data can be captured and intercepted through a network request agent program, the problem is inquired through analysis of the intercepted content, so that the normal operation of a client is ensured, the data interception efficiency is improved, and the data is convenient to test and develop in the later stage.

Description

Data interception method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of data interception technologies, and in particular, to a data interception method and apparatus, a computer device, and a storage medium.
Background
When the website is developed and debugged, the network request data initiated by the website needs to be captured and intercepted, and development testers can inquire the problems (code errors, network anomalies and the like) by analyzing the intercepted data.
In the prior art, the aim of capturing and intercepting is usually achieved by installing Fiddler or Charles software, proxying all network requests initiated by a website to a local service started by the Fiddler or Charles software through the steps of setting a browser proxy, configuring a proxy port, importing a certificate required by a network request (https) and the like, and forwarding network request data through the local service. However, since the Fiddler or Charles software is a system-level software, the installation is time-consuming and the memory occupation is large, and especially for users (development testers) with low use frequency or low computer hardware configuration, the above scheme is cumbersome. Meanwhile, certificates need to be imported for part of network requests (https), so that development and debugging efficiency is influenced. Therefore, a lightweight and efficient data interception method is needed.
Disclosure of Invention
The invention aims to provide a data interception method, a data interception device, computer equipment and a storage medium, which are used for solving the problems in the prior art.
In order to achieve the above object, the present invention provides a data interception method, including:
intercepting network request data of a client, wherein the network request data comprises network request parameters and time identification;
sending the network request parameter to a server, and intercepting feedback data of the server responding to the network request parameter;
identifying the feedback data and adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and returning the identification result to the client;
and caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding recognition result based on the time identification.
Preferably, before intercepting the network request data of the client, the method further comprises:
defining a communication channel for the client, wherein the communication channel is used for characterizing the communication relationship between the client and the network request agent program;
registering the communication channel in the network request broker.
Preferably, the intercepting network request data of the client includes:
according to the network request event generated by the client, identifying the network request event through the network request agent program and intercepting network request data in the network request event;
and inquiring the network request parameters in the network request data through the communication channel.
Preferably, the identifying, by the network request agent program, the network request event and intercepting the network request data in the network request event includes:
the network request agent program identifies that the corresponding preset filtering condition is matched according to the network request event; and the number of the first and second electrodes,
intercepting network request data in the network request event based on the filter condition.
Preferably, the returning the recognition result to the client includes:
and delaying and returning the identification result to the client based on preset delay configuration.
Preferably, the recognizing the feedback data and adding the time identifier to a recognition result, where the feedback data includes a first network update parameter, and returning the recognition result to the client includes:
identifying corresponding preset configuration data according to the feedback data through a network request agent program, wherein the configuration data comprises a second network updating parameter;
if the identification result is empty, adding the time identifier in the feedback data and returning the feedback data to the client;
and if the identification result is that the corresponding configuration data is identified, adding the time identifier in the configuration data and returning the configuration data to the client.
Preferably, after the requesting agent identifies the feedback data through the network, adds the time identifier to the identification result, and sends the identification result to the client, the method further includes:
the client generates updating data based on the first network updating parameter or the second network updating parameter, and updates and displays an application program interface of the client based on the updating data;
and caching the corresponding relation between the network request data and the corresponding feedback data and/or configuration data and update data by the network request agent program based on the time identification.
In order to achieve the above object, the present invention further provides a data interception apparatus, including:
the system comprises an interception module, a time identification module and a processing module, wherein the interception module is used for intercepting network request data of a client, and the network request data comprises network request parameters and time identifications;
the sending module is used for sending the network request parameter to a server and intercepting feedback data of the server responding to the network request parameter;
the identification module is used for identifying the feedback data and adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and the identification result is returned to the client;
and the caching module is used for caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding identification result based on the time identification.
To achieve the above object, the present invention also provides a computer device comprising:
a memory storing at least one computer program; and
a processor executing the computer program stored in the memory to implement the data interception method of any of the above.
To achieve the above object, the present invention also provides a computer-readable storage medium including a storage data area storing data created according to use of blockchain nodes and a storage program area storing a computer program which is executed by a processor to implement the data interception method of any one of the above.
The beneficial effects of the above technical scheme are that:
according to the test method, the test device, the computer equipment and the storage medium, system level software (such as Fiddler or Charles software) does not need to be installed, when a client establishes a network request, network request data can be captured and intercepted through a network request agent program, the network request data is sent to a server based on network request parameters and feedback data responded by the server is intercepted, the request and/or the feedback data can be analyzed through the intercepted content, and the problem is inquired so as to ensure that the client normally operates. Meanwhile, the network request agent program is simple to install and can be embedded in the client, memory consumption is low, the network request needing to be imported with the certificate can be captured and intercepted in an agent rewriting mode without certificate import, data interception efficiency is effectively improved, and later-stage test and development of data are facilitated.
Drawings
FIG. 1 is a schematic flow chart illustrating a data interception method according to an embodiment of the present invention;
FIG. 2 is a functional block diagram of a second data intercepting apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer device of a data interception method according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only for the purpose of illustrating the present invention and are not to be construed as limiting the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
As shown in fig. 1, which is a schematic flow chart of a data interception method in this embodiment, it can be seen that the method includes steps S100 to S400, which are specifically as follows:
s100: intercepting network request data of a client, wherein the network request data comprises network request parameters and time identification.
In an exemplary embodiment, the network request data is used for representing that a user generates request data used for sending a request to a network to obtain a feedback information result on an application program interface (such as a website webpage in a browser) in a client. Wherein the network request comprises: a HyperText Transfer Protocol (HTTP) request, a HyperText Transfer Protocol over Secure Socket Layer (HTTPs) request, a Transmission Control Protocol (TCP) request, a User Datagram Protocol (UDP) request, a fast Internet Connection Protocol (Quick UDP) request, and the like. Optionally, the network request may also be implemented as a request of another network protocol, which is not limited in this embodiment. The client comprises mobile terminals such as mobile phones, tablet computers, portable laptop computers and portable wearable devices. Optionally, the client may also be implemented as a terminal device such as a desktop computer and a monitoring system, which is not limited in this embodiment.
Specifically, the network request data is data generated when a user triggers an operation on a client, or data generated by the client according to a preset timer, or data generated by the client according to automatically displayed content, which is not limited in this embodiment. The description will be given by taking as an example a message generated when the network request data is triggered to operate on the client by the user, for example: when a user browses an application program interface on a client, receiving refreshing operation on the application program interface, and generating network request data according to the refreshing operation, wherein the network request data is used for requesting to acquire refreshed display content; the description will be given by taking as an example a message generated by the network request data according to a set timer, for example: a timer is set in the client, data are acquired from the server every preset time length to be updated and displayed, and when the time length reaches the preset time length, network request data are generated and used for requesting to acquire refreshed data; the description will be given taking as an example a message in which the network request data is generated from the automatically displayed content, for example: the method comprises the steps that a video A is played currently in a client, the next played video of the video A is a video B, and after the video A is played, network request data are generated and used for requesting to acquire video data corresponding to the video B.
When the network request data is intercepted, extracting the network request parameters in the network request data, and calling corresponding Application Programming Interfaces (APIs) according to different network request protocols to establish the network request data. The network request parameter comprises at least one of parameters such as a request header, a request address and a request method.
Before intercepting the network request data of the client, the client for generating the network request data and a network request agent program construct a communication bridge so that the client can carry out proxy of the network request through the network request agent program. Wherein the network request agent program is a program written in native code. In this embodiment, the network request agent program is a program written by operating system native code, for example: iOS operating system, Android (Android) system, World Wide Web (Web) pages, or other operating system native code. Optionally, the network request agent program is a program written by Objective-c language, Java language or JavaScript language. Specifically, the step of constructing the communication bridge includes:
step 1, defining a communication channel for the client, wherein the communication channel is used for representing the communication relationship between the client and the network request agent program.
In an exemplary embodiment, a communication method is defined in the code logic of the client for communicating between the client and the network request broker. For example: the MethodChannel method is defined in the code logic of the client, and the method may also be named as any other character string, which is not limited in this embodiment.
And 2, registering the communication channel in the network request agent program.
In an exemplary embodiment, after a communication channel is defined for a client, the communication channel also needs to be registered in a network request agent. For example: taking the above MethodChannel method as an example, after the MethodChannel method is defined on the client, the MethodChannel method is registered in the network request broker.
According to the network request event generated by the client, the network request event is identified through the network request agent program, network request data in the network request event is intercepted, and network request parameters in the network request data are inquired through the communication channel.
Preferably, the network request agent program matches a corresponding preset filtering condition according to the network request event, and intercepts the network request data in the network request event based on the filtering condition.
In an exemplary embodiment, corresponding filtering conditions are preset for different network request events, when a client generates a network request event, the corresponding preset filtering conditions are identified and matched through a network request agent program, part of the network request events which do not meet the conditions are filtered based on the filtering conditions, the network request events which meet the conditions are intercepted, and network request data in the network request events are extracted. For example: the hypertext transfer protocol request comprises a network request event generated when a user triggers operation on a client, a network request event generated by the client according to a preset timer and a network request event generated by the client according to automatically displayed contents, at least one of the three network request events is selected as a filtering condition, and the rest network request events are filtered and not intercepted. For example: the network request event generated when the user triggers the operation on the client is selected as a filtering condition, the network request data intercepted by the network request agent belongs to the data of the network request event generated when the user triggers the operation on the client, and when the network request event is the network request event generated by the client according to a preset timer, the network request event generated by the client according to the automatically displayed content and other network request events, the network request event is filtered out and not intercepted according to the filtering condition.
Another example is: the transmission control protocol request and the hypertext transmission protocol request similarly comprise three network request events, but the network request event generated by the client according to the automatically displayed content is selected as a filtering condition, the network request data intercepted by the network request agent belongs to the data of the network request event generated by the client according to the automatically displayed content, and when the network request event is the network request event generated when the user triggers operation on the client, the network request event generated by the client according to a preset timer and other network request events, the network request event is filtered out and not intercepted according to the filtering condition. It is to be understood that the filtering conditions corresponding to different network request events may be different or the same, and are not limited specifically.
S200: and sending the network request parameter to a server, and intercepting feedback data of the server responding to the network request parameter.
In an exemplary embodiment, the network request parameters are sent to a server through the network request agent program according to parameter information such as a request header, a request address, a request method and the like in the network request parameters. Wherein the request address is used to determine a recipient (i.e., server) of the network request; the request method is used for indicating a processing method required to be performed by a network request, for example: a GET acquisition method, a POST release method, a PUT push method, a DELETE deletion method, a CONNECT connection method, a TRACE path tracking method, an OPTIONS selection method and the like in the HTTP request or the HTTPS request; the request header is mainly used for configuring some special fields, such as: a field indicating a request method may be included in a request header of the HTTP request.
The server receives the network request parameter and responds to generate feedback data based on the network request parameter. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, Content Delivery Network (CDN), big data, and an artificial intelligence platform.
S300: and identifying the feedback data, adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and returning the identification result to the client.
In an exemplary embodiment, the network request broker identifies and matches corresponding preset configuration data according to the feedback data, where the configuration data includes a second network update parameter. The feedback data and the configuration data are the same in nature, both the feedback data and the configuration data are data of the server responding to the network request parameters, only the feedback data are data of real response, and the configuration data are data of simulated response, namely, the first network updating parameters and the second network updating parameters comprise response rows, response heads and response bodies. Taking HTTP as an example, the response line is used to represent the status code of the response, the status code of HTTP is composed of three decimal numbers, the first decimal number defines the type of the status code, the response header is used to represent which request methods (such as GET, POST, etc.) are supported by the server, and the response body is used to represent the fields of the methods in the response header.
The user can set corresponding configuration data in a network request agent program according to different network request data in advance according to business requirements to serve as simulated feedback data, when the network request agent program intercepts real feedback data generated by the server, the real feedback data are stored, the configuration data serve as the simulated feedback data and are sent to the client, and influences of the client based on the simulated feedback data are tested. For example: the method comprises the steps that for a hypertext transfer protocol request, a filtering condition is a network request event generated when a user triggers operation on a client and a network request event generated by the client according to a preset timer, configuration data are correspondingly set for the network request event generated when the user triggers operation on the client to serve as simulation feedback data of the corresponding network request data, and the configuration data are not set for the network request event generated by the client according to the preset timer.
And identifying the feedback data through the network request agent program, and if the configuration data is not identified, returning the feedback data to the client if the identification result is null. For example: and for a network request event generated by the client according to a preset timer, returning feedback data to the client if an identification result is empty in the identification process because configuration data is not preset as simulation feedback data of corresponding network request data, generating update data by the client based on the first network update parameter, and updating and displaying an application program interface of the client based on the update data.
And if the identification result is that the corresponding configuration data is matched, returning the configuration data to the client. For example: for a network request event generated when a user triggers an operation on a client, because configuration data is preset to serve as simulation feedback data corresponding to the network request data, the corresponding configuration data can be matched in the identification process, the configuration data serves as the simulation feedback data and is returned to the client, and the client generates update data based on the second network update parameters and updates and displays an application program interface of the client based on the update data. For example: the network request data is data generated when a user executes click jump operation on an http:// www.baidu.com link of an H5 interface of the client, the client generates updating data of a target page corresponding to the click link http:// www.baidu.com according to real feedback data, and the H5 interface of the client is updated to the target page corresponding to the http:// www.baidu.com according to the updating data; because the preset configuration data is http:// www.sohu.com, the client generates the updating data for jumping to the target page corresponding to the click link http:// www.sohu.com according to the configuration data (analog feedback data), and updates the H5 interface of the client to the target page corresponding to http:// www.sohu.com according to the updating data.
In this embodiment, system level software (e.g., Fiddler or Charles software) does not need to be installed, when a network request is established at a client, network request data can be captured and intercepted through a network request agent program, the network request data is sent to a server based on network request parameters and feedback data responded by the server is intercepted, the request and/or the feedback data can be analyzed through the intercepted content, and the problem location is queried to ensure that the client operates normally. Meanwhile, the network request agent program is simple to install and can be embedded in the client, memory consumption is low, the network request needing to be imported with the certificate can be captured and intercepted in an agent rewriting mode without certificate import, data interception efficiency is effectively improved, and later-stage test and development of data are facilitated.
The interception function in the network request agent program is an asynchronous function, so that the generation time of the network request data is recorded as the time identifier of the corresponding network request data while the request data used for sending a request to the network to obtain a feedback information result is generated on the client, and the time identifier is used as the parameter value of the asynchronous function. Meanwhile, since the time stamp is used as the parameter value of the asynchronous function, the time stamp may be added to the feedback data when the server generates the feedback data and is intercepted by the network request agent. If configuration data is preset, the time identifier can be added to the configuration data in the same way.
Preferably, the identification result (feedback data or configuration data) is delayed and returned to the client based on a preset delay configuration.
In an exemplary embodiment, a user may set a delay configuration in a network request broker program in advance according to a service requirement, and when the network request broker program intercepts feedback data generated by the server or matches the feedback data or the configuration data, the feedback data or the configuration data is transmitted to a client in a delayed manner according to the delay configuration, so as to test an influence of update data generated by the client in a delayed state. For example: the network request data is data generated when a user executes click jump operation on an http:// www.baidu.com link of an H5 interface of a client, and the feedback data is returned to the client through time delay configuration, so that the client cannot generate update data or generate blank update data, namely, the H5 interface of the client displays 'connection failure' or automatically jumps to a blank page.
S400: and caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding recognition result based on the time identification.
In an exemplary embodiment, since the network request broker is asynchronously loaded, the generation time of the request data is recorded by generating, on the client, a time stamp of the request data for sending a request to the network to obtain a result of the feedback information, as the time stamp of the corresponding network request data, and the time stamp is used as a parameter value of the asynchronous function. And caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding recognition result based on the time identification. The identification result is whether the network request data comprises configuration data and updating data, if the configuration data is set according to the network request data in advance, the corresponding relation between the network request data and the corresponding feedback data, configuration data and updating data is cached
Preferably, the corresponding relationship between the network request data and the corresponding feedback data and/or the corresponding configuration data and the update data is generated into a relationship corresponding table in an Excel format for caching, so that a later-stage user can conveniently perform problem troubleshooting according to the corresponding relationship in the relationship corresponding table, and the development and test efficiency is improved.
Example two
Fig. 2 is a functional block diagram of a data interception apparatus according to a second embodiment.
The data interception apparatus 3 includes an interception module 31, a sending module 32, an identification module 33, and a buffer module 34. The module referred to herein is a series of computer program segments stored in a memory that can be executed by a processor and that can perform a fixed function. In the present embodiment, the functions of the modules will be described in detail in the following embodiments.
The intercepting module 31 is configured to intercept network request data of a client, where the network request data includes a network request parameter and a time identifier.
In an exemplary embodiment, according to the network request event generated by the client, the network request agent program identifies the network request event and intercepts the network request data in the network request event, and the network request parameter is sent to the network request agent program through the communication channel.
The sending module 32 is configured to send the network request parameter to a server, and intercept feedback data of the server responding to the network request parameter.
In an exemplary embodiment, according to parameter information such as a request header, a request address, a request method and the like in the network request parameter, the network request parameter is sent to a server through the network request agent program, the server receives the network request parameter, and the server responds to the network request parameter to generate feedback data.
The identification module 33 is configured to identify the feedback data and add the time identifier to an identification result, where the feedback data includes a first network update parameter, and return the identification result to the client.
In an exemplary embodiment, the network request broker identifies and matches corresponding preset configuration data according to the feedback data, where the configuration data includes a second network update parameter; if the identification result is empty, adding the time identifier in the feedback data and returning the feedback data to the client; and if the identification result is that the corresponding configuration data is matched, adding the time identifier in the configuration data and returning the configuration data to the client.
The caching module 34 is configured to cache a correspondence between the network request data and the corresponding feedback data and the identification result based on the time identifier.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a computer device of the three data interception methods according to this embodiment.
In the exemplary embodiment, computer device 4 includes, but is not limited to, a memory 41, a processor 42, and a computer program, such as a data interception program, stored in memory 41 and executable on the processor. Those skilled in the art will appreciate that the depicted diagram is merely an example of a computing device and is not meant to be limiting and that the depicted diagram may include more or fewer components than those shown, or some components may be combined, or different components, e.g., the computing device may also include input output devices, network access devices, buses, etc.
The memory 41 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 41 may be an internal storage module of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the memory 41 may be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device. Of course, the memory 41 may also include both internal and external memory modules of the computer device. In this embodiment, the memory 41 is generally used for storing an operating system and various types of application software installed in the computer device. Further, the memory 41 may also be used to temporarily store various types of data that have been output or are to be output.
The Processor 42 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. The processor 42 is an operation core and a control center of the computer device, and is connected to each part of the whole computer device by various interfaces and lines, and executes an operating system of the computer device and various installed application programs, program codes, and the like.
The processor 42 executes the operating system of the computer device as well as various applications installed. The processor 42 executes the application program to implement the steps in the above-mentioned data interception method embodiments, such as steps S100, S200, S300, and S400 shown in fig. 1.
Example four
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer readable storage medium of the present embodiment is used for storing a computer program for implementing the data interception method, and when being executed by the processor 42, implements the data interception method of the first embodiment, the second embodiment, or the third embodiment.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method for intercepting data, comprising:
intercepting network request data of a client, wherein the network request data comprises network request parameters and time identification;
sending the network request parameter to a server, and intercepting feedback data of the server responding to the network request parameter;
identifying the feedback data and adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and returning the identification result to the client;
and caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding recognition result based on the time identification.
2. The data interception method according to claim 1, further comprising, before said intercepting a network request data of a client:
defining a communication channel for the client, wherein the communication channel is used for representing the communication relationship between the client and a network request agent program;
registering the communication channel in the network request broker.
3. The data interception method according to claim 2, wherein said intercepting a network request data of a client comprises:
according to the network request event generated by the client, identifying the network request event through the network request agent program and intercepting network request data in the network request event;
and inquiring the network request parameters in the network request data through the communication channel.
4. The data interception method according to claim 3, wherein said identifying said network request event and intercepting the network request data in said network request event by said network request agent program comprises:
the network request agent program matches a corresponding preset filtering condition according to the network request event; and the number of the first and second electrodes,
intercepting network request data in the network request event based on the filter condition.
5. The data interception method according to claim 1, wherein said returning the identification result to the client comprises:
and delaying and returning the identification result to the client based on preset delay configuration.
6. The data interception method according to claim 1, wherein said recognizing the feedback data and adding the time identifier to the recognition result, the feedback data including a first network update parameter, and returning the recognition result to the client comprises:
identifying corresponding preset configuration data according to the feedback data through a network request agent program, wherein the configuration data comprises a second network updating parameter;
if the identification result is empty, adding the time identifier in the feedback data and returning the feedback data to the client;
and if the identification result is that the corresponding configuration data is identified, adding the time identifier in the configuration data and returning the configuration data to the client.
7. The data interception method according to claim 6, wherein after said requesting agent program through said network recognizes said feedback data, adds said time identifier to the recognition result, and sends said recognition result to the client, further comprising:
the client generates updating data based on the first network updating parameter or the second network updating parameter, and updates and displays an application program interface of the client based on the updating data;
and caching the corresponding relation between the network request data and the corresponding feedback data and/or configuration data and update data by the network request agent program based on the time identification.
8. A data interception apparatus, comprising:
the system comprises an interception module, a time identification module and a processing module, wherein the interception module is used for intercepting network request data of a client, and the network request data comprises network request parameters and time identifications;
the sending module is used for sending the network request parameter to a server and intercepting feedback data of the server responding to the network request parameter;
the identification module is used for identifying the feedback data and adding the time identifier in an identification result, wherein the feedback data comprises a first network updating parameter, and the identification result is returned to the client;
and the caching module is used for caching the corresponding relation between the network request data and the corresponding feedback data and the corresponding identification result based on the time identification.
9. A computer device, comprising:
a memory storing at least one computer program; and
a processor executing a computer program stored in the memory to implement the data interception method of any one of claims 1 to 7.
10. A computer-readable storage medium comprising a stored data area storing data created according to use of a blockchain node and a stored program area storing a computer program, wherein the computer program is executed by a processor to implement the data interception method according to any one of claims 1 to 7.
CN202111003059.2A 2021-08-30 2021-08-30 Data interception method, device, computer equipment and storage medium Active CN113726770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111003059.2A CN113726770B (en) 2021-08-30 2021-08-30 Data interception method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111003059.2A CN113726770B (en) 2021-08-30 2021-08-30 Data interception method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113726770A true CN113726770A (en) 2021-11-30
CN113726770B CN113726770B (en) 2023-06-30

Family

ID=78679022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111003059.2A Active CN113726770B (en) 2021-08-30 2021-08-30 Data interception method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113726770B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915565A (en) * 2022-05-06 2022-08-16 上海哔哩哔哩科技有限公司 Method and system for debugging network
CN115987844A (en) * 2022-12-28 2023-04-18 航天信息股份有限公司 Process monitoring method, system, electronic device and medium in exploratory test
CN116055569A (en) * 2023-03-31 2023-05-02 浙江华东工程数字技术有限公司 Method, system, computer device and storage medium for custom switching time zone

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027853A1 (en) * 2003-07-28 2005-02-03 Martin Terry M. System and method for collecting data regarding network service operation
US20100138485A1 (en) * 2008-12-03 2010-06-03 William Weiyeh Chow System and method for providing virtual web access
US8898681B1 (en) * 2013-02-22 2014-11-25 Ca, Inc. Mainframe virtualization
US9836388B1 (en) * 2013-09-26 2017-12-05 Amazon Technologies, Inc. Software testing environment that includes a duplicating proxy service
CN107704369A (en) * 2017-08-31 2018-02-16 云宏信息科技股份有限公司 A kind of recording method of Operation Log, electronic equipment, storage medium, system
CN108268375A (en) * 2018-01-12 2018-07-10 深圳壹账通智能科技有限公司 Applied program testing method, device, computer equipment and storage medium
CN108848000A (en) * 2018-05-07 2018-11-20 深圳壹账通智能科技有限公司 Network request test method, device, computer equipment and storage medium
CN109582556A (en) * 2017-09-29 2019-04-05 阿里巴巴集团控股有限公司 Test method, the device and system of a kind of application program in running of mobile terminal situation
CN110825985A (en) * 2018-08-06 2020-02-21 阿里巴巴集团控股有限公司 Data acquisition system, method and device, control equipment and proxy equipment
US20200106860A1 (en) * 2018-10-01 2020-04-02 Oracle International Corporation Offline client replay and sync

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027853A1 (en) * 2003-07-28 2005-02-03 Martin Terry M. System and method for collecting data regarding network service operation
US20100138485A1 (en) * 2008-12-03 2010-06-03 William Weiyeh Chow System and method for providing virtual web access
US8898681B1 (en) * 2013-02-22 2014-11-25 Ca, Inc. Mainframe virtualization
US9836388B1 (en) * 2013-09-26 2017-12-05 Amazon Technologies, Inc. Software testing environment that includes a duplicating proxy service
CN107704369A (en) * 2017-08-31 2018-02-16 云宏信息科技股份有限公司 A kind of recording method of Operation Log, electronic equipment, storage medium, system
CN109582556A (en) * 2017-09-29 2019-04-05 阿里巴巴集团控股有限公司 Test method, the device and system of a kind of application program in running of mobile terminal situation
CN108268375A (en) * 2018-01-12 2018-07-10 深圳壹账通智能科技有限公司 Applied program testing method, device, computer equipment and storage medium
CN108848000A (en) * 2018-05-07 2018-11-20 深圳壹账通智能科技有限公司 Network request test method, device, computer equipment and storage medium
CN110825985A (en) * 2018-08-06 2020-02-21 阿里巴巴集团控股有限公司 Data acquisition system, method and device, control equipment and proxy equipment
US20200106860A1 (en) * 2018-10-01 2020-04-02 Oracle International Corporation Offline client replay and sync

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915565A (en) * 2022-05-06 2022-08-16 上海哔哩哔哩科技有限公司 Method and system for debugging network
CN114915565B (en) * 2022-05-06 2023-09-19 上海哔哩哔哩科技有限公司 Network debugging method and system
CN115987844A (en) * 2022-12-28 2023-04-18 航天信息股份有限公司 Process monitoring method, system, electronic device and medium in exploratory test
CN116055569A (en) * 2023-03-31 2023-05-02 浙江华东工程数字技术有限公司 Method, system, computer device and storage medium for custom switching time zone

Also Published As

Publication number Publication date
CN113726770B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
CN113726770B (en) Data interception method, device, computer equipment and storage medium
US8725794B2 (en) Enhanced website tracking system and method
CN110688598B (en) Service parameter acquisition method and device, computer equipment and storage medium
CN111310427A (en) Service data configuration processing method and device, computer equipment and storage medium
CN113987074A (en) Distributed service full-link monitoring method and device, electronic equipment and storage medium
US20120072488A1 (en) Conditional Logic for Delivering Computer-Executable Program Instructions and Content
US10877825B2 (en) System for offline object based storage and mocking of rest responses
CN109787974B (en) Message data stream generation method and device, computer equipment and storage medium
CN109829121B (en) Method and device for reporting click behavior data
CN110598135A (en) Network request processing method and device, computer readable medium and electronic equipment
CN111431767B (en) Multi-browser resource synchronization method and device, computer equipment and storage medium
CN112615759A (en) Full link voltage measurement assembly, full link voltage measurement method and device
CN112241298A (en) Page display method and device, storage medium and electronic device
CN113343312A (en) Page tamper-proofing method and system based on front-end point burying technology
CN113190287A (en) External device docking method and device, computer device and readable storage medium
CN113434175A (en) Data processing method, device, storage medium and equipment
CN111680247B (en) Local calling method, device and equipment of webpage character strings and storage medium
WO2021189766A1 (en) Data visualization method and related device
CN113315829B (en) Client offline H5 page loading method and device, computer equipment and medium
CN114020296A (en) Configuration information updating method, device, equipment and readable storage medium
CN113704648A (en) Page data processing method, device, equipment and storage medium
CN109981738B (en) Cloud server suitable for application of narrow-band Internet of things
CN114296880A (en) Service request processing method, device, equipment and medium based on large-scale cluster
CN113704120A (en) Data transmission method, device, equipment and storage medium
CN114428723A (en) Test system, system test method, related device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant