CN113901451A - Link detection method and device, electronic equipment and storage medium - Google Patents

Link detection method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113901451A
CN113901451A CN202111164526.XA CN202111164526A CN113901451A CN 113901451 A CN113901451 A CN 113901451A CN 202111164526 A CN202111164526 A CN 202111164526A CN 113901451 A CN113901451 A CN 113901451A
Authority
CN
China
Prior art keywords
link
detected
time
target application
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111164526.XA
Other languages
Chinese (zh)
Inventor
焦民政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202111164526.XA priority Critical patent/CN113901451A/en
Publication of CN113901451A publication Critical patent/CN113901451A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Abstract

The disclosure provides a link detection method, a link detection device, an electronic device and a storage medium, and relates to the technical field of communication. The specific implementation scheme is as follows: sending a link to be detected and a simulated click instruction to a target application running on the terminal equipment; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application; under the condition that an access request aiming at the link to be detected and sent by the terminal equipment is monitored, determining the time of returning the source of the link to be detected based on the time information of the access request; and under the condition that the time of returning to the source meets the preset condition, determining that the link to be detected is limited to be accessed by the target application. The technology according to the present disclosure can determine whether the link to be detected is restricted from access by the target application in any application scenario.

Description

Link detection method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to the field of data processing technologies.
Background
Currently, web page links are sent in application programs, and there are cases where access to the web page links is restricted. By collecting an access log of link domain name reflow, the access traffic (i.e., the amount of reflow) of the link can be determined. If the ring ratio of the return flow quantity in the unit time is suddenly reduced, the possibility that the domain name is limited to access exists.
Disclosure of Invention
The disclosure provides a link detection method, a link detection device, an electronic device and a storage medium.
According to an aspect of the present disclosure, there is provided a link detection method including:
sending a link to be detected and a simulated click instruction to a target application running on the terminal equipment; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
under the condition that an access request aiming at the link to be detected and sent by the terminal equipment is monitored, determining the time of returning the source of the link to be detected based on the time information of the access request;
and under the condition that the time of returning to the source meets the preset condition, determining that the link to be detected is limited to be accessed by the target application.
According to another aspect of the present disclosure, there is provided a link detection apparatus including:
the simulation access module is used for sending the link to be detected and a simulation click instruction to a target application running on the terminal equipment; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
the determining module is used for determining the time of returning the link to be detected based on the time information of the access request under the condition of monitoring the access request which is sent by the terminal equipment and aims at the link to be detected;
and the detection module is used for determining that the link to be detected is limited to be accessed by the target application under the condition that the time of returning to the source meets the preset condition.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any one of the domain name detection methods of the disclosed embodiments.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing a computer to perform any one of the link detection methods in the embodiments of the present disclosure.
According to another aspect of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements any one of the link detection methods in the embodiments of the present disclosure.
One embodiment in the above application has the following advantages or benefits: after the to-be-detected link is simulated and clicked in the target application of the terminal device, the time information of the access request aiming at the to-be-detected link is monitored, and the time of returning the to-be-detected link is determined, so that the reflux condition of the to-be-detected link is determined based on the time of returning the to-be-detected link, and whether the to-be-detected link is limited to access by the target application is determined. Because the traffic is not required to be relied on to determine whether the connection to be detected is limited to be accessed by the target application, whether the connection to be detected is limited to be accessed by the target application can be determined in any application scene.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a flow diagram of a link detection method according to an embodiment of the present disclosure;
FIG. 2 is a flow diagram of a link detection method according to an embodiment of the present disclosure;
FIG. 3 is a detailed flow diagram of a link detection method according to an embodiment of the present disclosure;
FIG. 4 is a block diagram of a link detection apparatus according to an embodiment of the present disclosure;
FIG. 5 is a block diagram of a link detection apparatus according to an embodiment of the present disclosure;
fig. 6 is a block diagram of an electronic device for implementing a link detection method of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a flow chart of a link detection method according to an embodiment of the present application. As shown in fig. 1, the method may include:
s101, sending a link to be detected and a click simulation instruction to a target application running on a terminal device; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
s102, under the condition that an access request aiming at the link to be detected and sent by the terminal equipment is monitored, the time of returning the link to be detected is determined based on the time information of the access request;
s103, determining that the link to be detected is limited to be accessed by the target application under the condition that the time of returning to the source meets the preset condition.
Illustratively, the terminal device may be a smartphone, a tablet, a handheld device with wireless communication capabilities, a computing device, or the like. The System running on the terminal device may be an iOS System (Input Output System), an Android System, a saiban platform, or a microsoft platform. The target Application may be any Application program (App) on the terminal device, or may be a specific Application program to be detected, that is, an Application program to be detected whether to restrict access to the link. The target application can comprise an instant messaging App, an information sharing App and the like. It will be appreciated that the version of the target application matches the type of system running on the terminal device. In the embodiment of the present disclosure, an example in which the terminal device is an android device is described.
In step S101, the simulated click command may be, for example, an adb (Android Debug Bridge) command, and for example, a click, a double click, or a swipe operation on the terminal device may be implemented by sending the adb command.
In the embodiment of the application, the simulated click of the link to be detected can be realized through the interaction between the electronic equipment for executing the method and the terminal equipment. Specifically, the electronic device sends a simulated click instruction to the terminal device, and the instruction instructs the terminal device to access the link to be detected so as to simulate the user clicking the link on the target application.
In some exemplary embodiments of the present application, a node.js environment may be deployed at an electronic device, and page rendering may be performed based on a preset form, so as to render a link to be detected to a target application of a terminal device, where the preset form may be an html 5 standard form, and the like, which is not limited herein. And then, initiating an adb command corresponding to the click operation to the terminal device through an intelligent application program (for example, an automatic application program), so as to realize the simulated click of the link to be detected.
In practical application, after the terminal device performs simulated click on the link to be detected in the target application, the terminal device sends an access request to the server, and if the terminal device normally accesses the server, the electronic device can update the time of returning the source of the link to be detected according to the time information of the access request. And if the terminal equipment does not access the server, the time of returning the source of the connection to be detected cannot be updated. In this case, the time information of the access request is empty or remains unchanged, i.e., the previously updated back-to-source time is reserved.
In step S103, for example, the preset condition may be that the time of the source returning exceeds the preset time node, or that the time interval between the time of the source returning of the link to be detected and the time of the sending of the link to be detected is greater than the second duration, or that the time interval between the time of the source returning and the current time is greater than the first duration, and the like.
For example, the electronic device sends a link and a click simulation instruction at a first preset time node, and if the time from the source back exceeds a second preset time node, it is determined that the terminal device does not normally access the link to be detected, and it is determined that the access of the link to be detected is limited.
And if the time interval between the source returning time determined after the link and the simulated click command are sent and the issuing time of the link to be detected exceeds a second time length, the terminal equipment is considered to have no normal access to the link to be detected, and the fact that the access of the link to be detected is limited is determined.
For another example, the electronic device continuously sends the link to be detected and the simulated click command for multiple times, the source returning time is updated every time an access request for the link to be detected is monitored, if the time interval between the source returning time and the current time is longer than the first duration, that is, the source returning time has not been updated for a longer time, it can be considered that the terminal device does not normally access the link to be detected, and it is determined that the access of the link to be detected is limited.
According to the technical scheme, after the link to be detected is clicked in a simulation mode in the target application of the terminal device, the time information of the access request aiming at the link to be detected is monitored, the time of returning the source of the link to be detected is determined, so that the backflow condition of the link to be detected is determined based on the time of returning the source, whether the link to be detected is limited to be accessed by the target application or not is determined, the condition that the link is limited to be accessed only in a high-flow scene is effectively avoided, and all application scenes can be covered.
In one embodiment, S101, sending a link to be detected and a click simulation instruction to a target application running on a terminal device, includes:
and periodically sending the link to be detected and the simulated click instruction to a target application running on the terminal equipment based on the preset period length.
The preset period length may be set according to the actual application requirement, and is not limited herein.
Illustratively, within each cycle, multiple links may be sent, e.g., one link per second. After each cycle is over, whether each link is restricted from being accessed by the target application may be determined based on the latest time to source of each link. For example, the preset period has a length of 60 seconds, and for any link in the plurality of links, the electronic device may send the link and the simulated click command every 60 seconds. After 60 links are sent in each cycle, a limited link can be determined from the 60 links based on the back-to-source time corresponding to each link, so as to prompt the service party corresponding to the connection.
Further, under the condition that the time of returning to the source meets the preset condition, determining that the link to be detected is limited to be accessed by the target application, wherein the method comprises the following steps:
under the condition that the time interval between the time of returning to the source and the current time is longer than a first time length, determining that the link to be detected is limited to be accessed by the target application; wherein the first duration is greater than or equal to a preset period length.
For example, if the preset period length is 60 seconds, the first time length may be set to 60 seconds, and the first time length may be further extended according to actual needs, which is not limited herein. And if the time difference is greater than 60 seconds, it indicates that the access request is not monitored continuously in one period, and the link to be detected is limited to be accessed by the target application. If the time difference is not greater than 60 seconds, it is indicated that an access request is monitored in the latest period, and the link to be detected is not limited to be accessed by the target application, so that the limited link can be accurately determined, and the condition of misjudgment is further avoided. By using the method, whether the link to be detected is limited to be accessed by the target application or not can be monitored continuously, and when the limited access occurs, the abnormity of the link to be detected is found in time.
Following the foregoing example, the electronic device may monitor multiple links during a cycle. If all the links to be detected can reach the server (corresponding access requests are monitored) after the ith period, the time of returning to the source of each link to be detected is updated, and it can be determined that the access of each link to be detected is not limited. If there is a link that does not update the time to return to the source in the ith period, the time to return to the source of the link exceeds the first duration after the ith period is finished, and thus, the link whose access is limited can be determined in each link according to the interval between the time to return to the source of each link and the current time.
In one embodiment, determining that the link to be detected is restricted from being accessed by the target application when the time to return to the source meets a preset condition includes:
and under the condition that the time from the source back is null, determining that the link to be detected is limited to be accessed by the target application.
For example, in the case that the access request is not monitored, the time information of the access request cannot be received, and the back-source time may be a null value, so as to directly determine that the link to be detected is restricted from being accessed by the target application.
For example, the above manners may be combined, that is, it may be determined that the link to be detected is restricted from being accessed by the target application when any one of two conditions, that is, the time interval between the source returning time and the current time is greater than the first time length and the source returning time is a null value, is satisfied.
For example, in the first round of detection, if the access request is not monitored, and the corresponding link to be detected is set to the null value, it may be determined that the link to be detected is restricted from being accessed by the target application. For another example, during the first N rounds of detection (the first N cycles), the access request is monitored and the back source time is continuously updated. The source returning time of the link to be detected updated in the Nth round of detection is t1If no access request is monitored during the (N +1) th round of detection, the time for returning to the source is kept as t1If the time for returning to the source is longer than the cycle length when the detection of the (N +1) th round is finished, determining that the link to be detected is limited to be accessed by the target application.
In one embodiment, as shown in fig. 2, the method further comprises:
s201, under the condition that monitoring of the access request is completed, increasing the link number stored in the first database to obtain a target link number;
s202, extracting a link corresponding to the target link number from the second database as a new link to be detected based on the target link number, and updating the link number stored in the first database to the target link number; the database comprises a plurality of links and link numbers corresponding to the links one by one.
Illustratively, the first database may be a Redis ordered set and the second database may be a Mysql database. And storing all the links to be detected in a Mysql database, and numbering all the links to be detected. If the Mysql database is directly adopted, when the request of the link to be detected is excessive, the Mysql database needs to perform data interaction and also needs to be stored, and the problem of overlarge pressure of the Mysql database is caused. And storing the number (such as i) in the Mysql database into the Redis ordered set, and after the detection of the current link to be detected is finished (namely the time for returning to the source is determined), the Redis ordered set acquires the link to be detected corresponding to the next number (i +1) in the Mysql database without requesting the server, so that the pressure of the server is reduced. When all the links to be detected in the Mysql database are detected completely, the Redis ordered set starts to detect from the first link to be detected stored in the Mysql database, so that the annular polling detection of the Mysql database is realized by adopting the Redis ordered set, and the limited links to be detected can be found in time.
For example, the current link to be detected is the tenth link in the Mysql database, the unique number of the link to be detected is stored in the Redis ordered set, after the detection of the current link to be detected is completed, the next link in the Mysql database needs to be requested to be used as a new link to be detected, at this time, the link which is determined to have completed the detection in the Redis ordered set is the tenth link in the Mysql database, and the link number of the new link to be detected is determined to be the eleventh link based on the tenth link. Based on the select where >10 and the limit ═ 1, find the eleventh link to be detected in the Mysql database.
Illustratively, the Key in the Redis ordered set is a link, and score corresponds to the timestamp of the latest reflow (i.e., the time of source return). Thus, after determining the time to source for each link to be detected, the time to source is recorded in the Redis ordered set. After one round (preset period length) of detection is finished, calculation is carried out according to the source returning time and the current time in the Redis ordered set, and therefore the links limited by the target application are accurately determined.
Further, the expiration time of the cache can be set, the data recorded in the Redis ordered set is written into the Mysql database, and then all information of the link to be detected can be called from the Mysql database in time during the next detection.
In one embodiment, the method further comprises:
under the condition that the link to be detected is limited to be accessed by the target application, acquiring a domain name corresponding to the link to be detected from header information in an access request;
and alarming based on the domain name corresponding to the link to be detected.
Exemplarily, the domain name corresponding to the link to be detected (corresponding to the server of the link to be detected) can be identified by requesting header information by the host, which indicates that the server is restricted from accessing, so that the server can be replaced in time, and loss is reduced. Further, corresponding information is generated according to the domain name corresponding to the link to be detected, and alarm prompt is continuously performed, so that the alarm prompt is prevented from being omitted.
For example, click on a.baidu.com, b.baidu.com, c.baidu.com on the WeChat, and only receive the access requests of a.baidu.com and b.baidu.com, it means that c.baidu.com is restricted, and the restricted server is determined according to the host request header information.
For ease of understanding, the following is illustrative:
as shown in fig. 3, a request is sent to the server to acquire links to be detected, all the links to be detected are stored in the Mysql database, and all the links to be detected are sorted. And storing the current link to be detected and the link number of the current link to be detected in the Mysql database in the Redis ordered set, and further establishing the association relation between the Redis ordered set and the Mysql. Therefore, when the detection of the current link to be detected is completed, the link corresponding to the next link number of the link number can be searched in the Mysql database according to the link number stored in the Redis ordered set, and the link is determined as the new current link to be detected.
And sending the current link to be detected to the android device, rendering the current link to be detected in an H5 page opened by WeChat, and initiating an adb command to the android device through a smart app-automator framework so as to realize the simulated click of the current link to be detected. After the android device carries out simulated clicking on the current link to be detected in the target application, the android device sends an access request aiming at the current link to be detected, so that the time of returning to the source is determined, the domain name corresponding to the current link to be detected is identified according to host request header information, the time of returning to the source is recorded into a Redis ordered set, the time difference between the time of returning to the source in the Redis ordered set and the current time is calculated, and whether the link to be detected is accessed by WeChat restriction is determined according to the time difference. And generating alarm information based on the access-limited link to be detected and the corresponding server to give an alarm.
Fig. 4 is a block diagram of a link detection apparatus according to an embodiment of the present application. As shown in fig. 4, the apparatus may include:
the simulation access module 401 is configured to send a link to be detected and a simulation click instruction to a target application running on the terminal device; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
a determining module 402, configured to determine, based on time information of an access request, a time to source of a link to be detected when the access request for the link to be detected sent by a terminal device is monitored;
the detecting module 403 is configured to determine that the link to be detected is restricted from being accessed by the target application when the time from the source back meets the preset condition.
In an embodiment, the simulation access module 401 is further configured to periodically send the link to be detected and the simulated click instruction to the target application running on the terminal device based on a preset period length;
the detecting module 403 is further configured to determine that the link to be detected is restricted from being accessed by the target application when a time interval between the time of returning to the source and the current time is greater than a first duration; wherein the first duration is greater than or equal to a preset period length.
In an embodiment, the detecting module 403 is further configured to determine that the link to be detected is restricted from being accessed by the target application in a case that the time from the source back is null.
In one embodiment, as shown in fig. 5, the apparatus further comprises: a number determining module 501, configured to increment a link number stored in the first database to obtain a target link number when monitoring of the access request is completed;
a calling module 502, configured to extract, based on the target link number, a link corresponding to the target link number from the second database, serve as a new link to be detected, and update the link number stored in the first database to the target link number; the database comprises a plurality of links and link numbers corresponding to the links one by one.
In one embodiment, as shown in fig. 5, the apparatus further comprises:
a processing module 506, configured to obtain, in the header information in the access request, a domain name corresponding to the link to be detected when the link to be detected is restricted from being accessed by the target application;
and an alarm module 507, configured to alarm based on the domain name corresponding to the link to be detected.
According to the technical scheme of the link detection device, after the link to be detected is clicked in a simulation mode in the target application of the terminal equipment, the time information of the access request aiming at the link to be detected is monitored, the time of returning the source of the link to be detected is determined, therefore, the backflow situation of the link to be detected is determined based on the time of returning the source, and whether the access of the link to be detected is limited by the target application is determined. Because the traffic is not required to be relied on to determine whether the connection to be detected is limited to be accessed by the target application, whether the connection to be detected is limited to be accessed by the target application can be determined in any application scene.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and an electronic device program product according to embodiments of the present disclosure.
FIG. 6 illustrates a schematic block diagram of an example electronic device 600 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital electronic devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframe electronic devices, and other suitable electronic devices. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 6, the device 600 includes a computing unit 601, which can perform various appropriate actions and processes according to an electronic device program stored in a Read Only Memory (ROM)602 or an electronic device program loaded from a storage unit 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data required for the operation of the device 600 can also be stored. The calculation unit 601, the ROM602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
A number of components in the device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, a mouse, or the like; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 608, such as a magnetic disk, optical disk, or the like; and a communication unit 609 such as a network card, modem, wireless communication transceiver, etc. The communication unit 609 allows the device 600 to exchange information/data with other devices via an electronic device network, such as the internet, and/or various telecommunication networks.
The computing unit 601 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 601 performs the respective methods and processes described above, such as the link detection method. For example, in some embodiments, the link detection method may be implemented as an electronic device software program tangibly embodied in a machine-readable medium, such as storage unit 608. In some embodiments, some or all of the electronic device programs may be loaded and/or installed onto device 600 via ROM602 and/or communications unit 609. When the electronic device program is loaded into RAM 603 and executed by the computing unit 601, one or more steps of the link detection method described above may be performed. Alternatively, in other embodiments, the computing unit 601 may be configured to perform the link detection method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), electronic device hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more electronic device programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device. .
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose electronic device, special purpose electronic device, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable electronic device diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a consumer electronic device having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The electronic device system may include a client and a server. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of electronic device programs running on the respective electronic devices and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (13)

1. A method of link detection, comprising:
sending a link to be detected and a simulated click instruction to a target application running on the terminal equipment; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
under the condition that an access request aiming at the link to be detected and sent by the terminal equipment is monitored, determining the time of returning the link to be detected based on the time information of the access request;
and determining that the link to be detected is limited to be accessed by the target application under the condition that the time for returning to the source meets the preset condition.
2. The method according to claim 1, wherein the sending the link to be detected and the simulated click instruction to the target application running on the terminal device comprises:
based on a preset period length, periodically sending the link to be detected and a simulated click instruction to the target application running on the terminal equipment;
determining that the link to be detected is restricted from being accessed by the target application under the condition that the time for returning to the source meets a preset condition, wherein the determining comprises the following steps:
determining that the link to be detected is limited to be accessed by the target application under the condition that the time interval between the time of returning to the source and the current time is greater than a first duration; wherein the first duration is greater than or equal to the preset period length.
3. The method according to claim 1 or 2, wherein the determining that the link to be detected is restricted from being accessed by the target application in the case that the time to return to the source meets a preset condition comprises:
and under the condition that the time of returning to the source is null, determining that the link to be detected is limited to be accessed by the target application.
4. The method of any of claims 1-3, further comprising:
under the condition that monitoring of the access request is completed, increasing the link number stored in the first database to obtain a target link number;
based on the target link number, extracting a link corresponding to the target link number from a second database as a new link to be detected, and updating the link number stored in the first database to the target link number; the database comprises a plurality of links and link numbers corresponding to the links one by one.
5. The method of any of claims 1-4, further comprising:
under the condition that the link to be detected is limited to be accessed by the target application, acquiring a domain name corresponding to the link to be detected from header information in the access request;
and alarming based on the domain name corresponding to the link to be detected.
6. A link detection apparatus comprising:
the simulation access module is used for sending the link to be detected and a simulation click instruction to a target application running on the terminal equipment; the simulated click instruction is used for indicating the terminal equipment to access the link to be detected in the target application;
the determining module is used for determining the time of returning the link to be detected based on the time information of the access request under the condition of monitoring the access request which is sent by the terminal equipment and aims at the link to be detected;
and the detection module is used for determining that the link to be detected is limited to be accessed by the target application under the condition that the time for returning to the source meets the preset condition.
7. The device according to claim 6, wherein the simulation access module is further configured to periodically send the link to be detected and a simulation click instruction to the target application running on the terminal device based on a preset period length;
the detection module is further configured to determine that the link to be detected is restricted from access by the target application when a time interval between the time of returning to the source and the current time is greater than a first duration; wherein the first duration is greater than or equal to the preset period length.
8. The apparatus according to claim 6 or 7, wherein the detecting module is further configured to determine that the link to be detected is restricted from being accessed by the target application if the back source time is null.
9. The apparatus of any of claims 6-8, wherein the apparatus further comprises:
a number determining module, configured to increment a link number stored in the first database to obtain a target link number when monitoring of the access request is completed;
the calling module is used for extracting a link corresponding to the target link number from a second database based on the target link number to serve as a new link to be detected, and updating the link number stored in the first database into the target link number; the database comprises a plurality of links and link numbers corresponding to the links one by one.
10. The apparatus of any of claims 6-9, further comprising:
the processing module is used for acquiring a domain name corresponding to the link to be detected from header information in the access request under the condition that the link to be detected is limited to be accessed by the target application;
and the alarm module is used for alarming based on the domain name corresponding to the link to be detected.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-5.
13. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-5.
CN202111164526.XA 2021-09-30 2021-09-30 Link detection method and device, electronic equipment and storage medium Pending CN113901451A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111164526.XA CN113901451A (en) 2021-09-30 2021-09-30 Link detection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111164526.XA CN113901451A (en) 2021-09-30 2021-09-30 Link detection method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113901451A true CN113901451A (en) 2022-01-07

Family

ID=79189873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111164526.XA Pending CN113901451A (en) 2021-09-30 2021-09-30 Link detection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113901451A (en)

Similar Documents

Publication Publication Date Title
CN109471783B (en) Method and device for predicting task operation parameters
CN113766487A (en) Cloud mobile phone information acquisition method, device, equipment and medium
CN115242731A (en) Message processing method, device, equipment and storage medium
CN114417780B (en) State synchronization method and device, electronic equipment and storage medium
CN113468021B (en) Method, device, equipment and storage medium for monitoring performance data
CN114816393A (en) Information generation method, device, equipment and storage medium
CN113901451A (en) Link detection method and device, electronic equipment and storage medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN114546799A (en) Point burying log checking method and device, electronic equipment, storage medium and product
CN113849758A (en) Webpage index generation method and device, electronic equipment and storage medium
CN114138358A (en) Application program starting optimization method, device, equipment and storage medium
CN117130873B (en) Task monitoring method and device
CN114399333A (en) Method, device, equipment and storage medium for detecting medium information releasing effect
CN114328154A (en) Attribution method, device, equipment and storage medium of page loading performance
CN114218059A (en) Page stability evaluation method and device, electronic equipment and readable storage medium
CN116974940A (en) Interface testing method, device, equipment and storage medium
CN116436883A (en) Method, device, electronic equipment and readable storage medium for link transmission
CN114490421A (en) Method, device, equipment and storage medium for detecting native rendering performance of application
CN114238149A (en) Batch testing method of accounting system, electronic device and storage medium
CN115983222A (en) EasyExcel-based file data reading method, device, equipment and medium
CN114549122A (en) Model training method, commodity recommendation device, equipment and storage medium
CN115563182A (en) Data processing method, device, electronic equipment and medium
CN115061886A (en) Performance data processing method, device, equipment and storage medium
CN114417219A (en) Information configuration method and device and electronic equipment
CN113360258A (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination