CN117439769A - Page access method, page access device, computer equipment and storage medium - Google Patents

Page access method, page access device, computer equipment and storage medium Download PDF

Info

Publication number
CN117439769A
CN117439769A CN202311197824.8A CN202311197824A CN117439769A CN 117439769 A CN117439769 A CN 117439769A CN 202311197824 A CN202311197824 A CN 202311197824A CN 117439769 A CN117439769 A CN 117439769A
Authority
CN
China
Prior art keywords
page
malicious
target
access request
sample library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311197824.8A
Other languages
Chinese (zh)
Inventor
雷雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311197824.8A priority Critical patent/CN117439769A/en
Publication of CN117439769A publication Critical patent/CN117439769A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to a page access method, a page access device, computer equipment and a storage medium, which can be used in the technical field of network security. The method comprises the following steps: receiving a page access request sent by a target terminal; determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal. The method can provide the protection effect for the terminal.

Description

Page access method, page access device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a page access method, apparatus, computer device, and storage medium.
Background
With the development of application technology, the types of application programs in the terminal are more and more, different pages can be accessed through application programs with different service types, but as malicious pages and malicious characters in the pages are more and more, the problems of user information leakage, resource loss, poor user experience and the like can occur in the process of accessing a target page when each application program runs.
In the traditional technology, malicious pages and malicious characters in the pages are protected through the protection components of the application programs, but the protection effects of the protection components of the application programs of different types are uneven, so that the protection effect on a terminal is poor.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a page access method, apparatus, computer device, and storage medium capable of protecting a terminal from the effects of protection.
In a first aspect, the present application provides a page access method. The method comprises the following steps:
receiving a page access request sent by a target terminal;
determining whether the page requested by the page access request is a malicious page, if so, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
In one embodiment, the processing the page access request to obtain a processing result includes:
sending the page access request to a server, and receiving a target page returned by the server;
determining whether the target page contains malicious characters, if so, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back information of access failure to the target terminal; and if not, returning the target page to the target terminal.
In one embodiment, the processing the malicious character to obtain the processed target page includes:
deleting the malicious characters from the target page to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
In one embodiment, the determining whether the target page contains malicious characters includes:
determining whether the target page contains malicious characters in a first sample library, if so, determining that the target page contains the malicious characters; if not, determining that the target page does not contain malicious characters.
In one embodiment, the determining whether the page requested by the page access request is a malicious page includes:
determining whether the second sample library contains address information corresponding to the page, if so, determining that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
In one embodiment, the method further comprises:
and after a preset time period, sending a query request to a blockchain node, and synchronously updating the first sample library and/or the second sample library to a local database under the condition that the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
In one embodiment, the method further comprises:
receiving a feedback request input by a user on the target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters;
and sending the feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
In a second aspect, the present application further provides a page access device. The device comprises:
the receiving module is used for receiving the page access request sent by the target terminal;
the determining module is used for determining whether the page requested by the page access request is a malicious page or not, and if yes, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor which when executing the computer program performs the steps of:
Receiving a page access request sent by a target terminal;
determining whether the page requested by the page access request is a malicious page, if so, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
receiving a page access request sent by a target terminal;
determining whether the page requested by the page access request is a malicious page, if so, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of:
receiving a page access request sent by a target terminal;
Determining whether the page requested by the page access request is a malicious page, if so, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
The page access method, the page access device, the computer equipment and the storage medium receive a page access request sent by a target terminal; determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal. When the page requested by the page access request is a malicious interface, stopping to continuously access the page, effectively protecting the target terminal, and protecting the malicious page and malicious characters in the page by using a protection component of each application program in the prior art.
Drawings
FIG. 1 is an application environment diagram of a page access method in one embodiment;
FIG. 2 is a flow diagram of a method of page access in one embodiment;
FIG. 3 is a flow chart of a page access method in another embodiment;
FIG. 4 is a flow chart of a page access method in another embodiment;
FIG. 5 is a flow chart of a page access method in another embodiment;
FIG. 6 is a flow chart of a page access method in another embodiment;
FIG. 7 is a flow chart of a page access method in another embodiment;
FIG. 8 is a block diagram of a page access device in one embodiment;
FIG. 9 is a block diagram of a page access apparatus in another embodiment;
FIG. 10 is a block diagram of a page access apparatus in another embodiment;
FIG. 11 is a block diagram of a page access apparatus in another embodiment;
fig. 12 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It should be noted that the page access method, the device, the computer equipment and the storage medium of the present invention can be used in the technical field of network security.
The page access method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the guard terminal 102 communicates with the target terminal 103 via a network. The blockchain node 101 is configured to store a first sample library and a second sample library; the server 104 is used for storing and managing page data; the guard terminal 102 receives the page access request sent by the target terminal 103. The protection terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The target terminal 103 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart car devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a page access method is provided, and the method is applied to the protection terminal in fig. 1 for illustration, and includes the following steps:
S201, receiving a page access request sent by a target terminal.
The page access request comprises information of a page to be accessed by the target terminal and information of a server corresponding to the page.
In this embodiment, the protection terminal communicates with the target terminal through wireless communication, so that the protection terminal may receive the page access request sent by the target terminal. By way of example, the manner in which wireless communication may include wireless network communication technology (Wi-Fi), general packet radio service (general packet radio service, GPRS), bluetooth, etc.
S202, determining whether a page requested by a page access request is a malicious page, and if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
Optionally, a feature information base may be stored in the protection terminal in advance, where the feature information base includes malicious feature information of a plurality of malicious pages, after the protection terminal receives a page access request sent by the target terminal, feature extraction may be performed on the page access request to obtain feature information of a page requested by the page access request, where when the feature information of the page includes malicious feature information, it is determined that the page requested by the page access request is a malicious page, and when the feature information of the page does not include malicious feature information, it is determined that the page requested by the page access request is not a malicious page.
In this embodiment, when the page requested by the page access request is a malicious page, the protection terminal sends information of access failure to the target terminal, and the target terminal can display the information to the user through the display interface; when the page requested by the page access request is not a malicious page, the protection terminal processes the page access request to obtain a processing result, and optionally, the protection terminal can acquire a corresponding page according to the page access request and send the page to the target terminal.
In the page access method, a page access request sent by a target terminal is received; determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal. When the page requested by the page access request is a malicious interface, stopping to continuously access the page, effectively protecting the target terminal, and protecting the malicious page and malicious characters in the page by using a protection component of each application program in the prior art.
In one embodiment, an implementation manner of S202 is provided, as shown in fig. 3, where the "processing a page access request to obtain a processing result" includes:
s301, sending a page access request to a server and receiving a target page returned by the server.
In this embodiment, after receiving a page access request sent by a target terminal, the protection terminal sends the page access request to a corresponding server according to information of the server corresponding to the page, and the server responds to the page access request and sends the page corresponding to the page access request to the protection terminal.
Optionally, a server address library may be preset in the protection terminal, and the protection terminal may perform security verification on the server according to the preset server address library, and when the server address library includes the address of the server, determine that the server is an unsafe server, and delete the page acquired from the server.
S302, determining whether the target page contains malicious characters, if so, executing step S303, and if not, executing step S304.
S303, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back information of access failure to the target terminal.
S304, returning the target page to the target terminal.
As an optional implementation manner, after the protection terminal obtains the target page corresponding to the page access request, the protection terminal may perform feature extraction on the target page to obtain a keyword in the target page, further judge whether the keyword includes malicious characters, if the keyword does not include the malicious characters, return the target page to the target terminal, if the keyword includes the malicious characters and the number of the malicious characters is smaller than a preset number, process the target page, return the processed target page to the target terminal, and if the keyword includes the malicious characters and the number of the malicious characters is greater than or equal to the preset number, feed back the access failure information to the target terminal.
Optionally, in the case that the target page contains malicious characters, the malicious characters may be deleted from the target page, so as to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page. For example, a character library may be stored in advance in the protection terminal, where the word library includes correspondence between a plurality of malicious characters and normal characters, so that the malicious characters in the target page are replaced with the corresponding normal characters according to the correspondence and the malicious characters in the target page.
In this embodiment, the protection terminal determines the target page returned by the server, so as to determine whether the target page contains malicious characters, and avoid sending the target page containing the malicious characters to the target terminal, thereby avoiding affecting the security of the target terminal.
In one embodiment, an implementation manner of the above S302 is provided, as shown in fig. 4, where the above "determining whether the target page contains a malicious character" includes:
s401, determining whether the target page contains malicious characters in the first sample library, if so, executing the step S402, and if not, executing the step S403.
S402, determining that the target page contains malicious characters.
S403, determining that the target page does not contain malicious characters.
The first sample library comprises various malicious characters, and the first sample library is obtained from sample library nodes of a block chain.
In this embodiment, by traversing the content in the target page, all the characters in the target page are obtained, it is determined whether all the characters in the target page include malicious characters in the first sample library, if all the characters include malicious characters in the first sample library, the target page includes malicious characters, and if all the characters include malicious characters in the first sample library, the target page does not include malicious characters.
Optionally, the blockchain may include a sample library node and a plurality of product provider nodes, where the sample library node is configured to store a first sample library, each product provider node may send an addition request to the other plurality of product provider nodes and the sample library node, the addition request may include an added malicious character, each product provider node may respond to the addition request, and the response result may be consent or non-consent, and when the response result is that the number of consents is greater than or equal to a preset number, the sample library node updates the first sample library according to the addition request, and when the response result is that the number of consents is less than the preset number, the addition request fails.
In this embodiment, whether the target page contains malicious characters is determined according to the first sample library, so that the determination result is more accurate, and the problem that the malicious characters in the target page are omitted, so that the target page with the malicious characters is sent to the target terminal and the protection effect on the target terminal is affected is avoided.
In one embodiment, an implementation manner of the foregoing S202 is provided, as shown in fig. 5, where the foregoing "determining whether the page requested by the page access request is a malicious page" includes:
S501, determining whether address information corresponding to the page is contained in the second sample library, if so, executing step S502, and if not, executing step S503.
S502, determining that the page requested by the page access request is a malicious page.
S503, determining that the page requested by the page access request is not a malicious page.
The second sample library comprises address information corresponding to a plurality of pages, and the second sample library is obtained from sample library nodes of the block chain.
In this embodiment, the page access request is parsed to obtain address information corresponding to the page requested by the page access request, if the second sample library includes the address information, it is determined that the page requested by the page access request is a malicious page, and if the second sample library does not include the address information, it is determined that the page requested by the page access request is not a malicious page.
Optionally, the blockchain may include a sample library node and a plurality of product provider nodes, where the sample library node is configured to store a second sample library, each product provider node may send an addition request to the other product provider nodes and the sample library node, where the addition request may include address information corresponding to an added page, each product provider node may respond to the addition request, and the response result may be consent or disagreement, and when the response result is that the number of consent is greater than or equal to a preset number, the sample library node updates the second sample library according to the addition request, and when the response result is that the number of consent is less than the preset number, the addition request fails.
In this embodiment, whether the page requested by the page access request is a malicious page is determined according to the second sample library, so that the determination result is more accurate, and the problem that the malicious page is sent to the target terminal and the protection effect on the target terminal is affected due to the fact that the malicious page is acquired is avoided.
In one embodiment, there is further provided a page access method, as shown in fig. 6, that is, the page access method in the embodiment of fig. 5 further includes the steps of:
s504, after a preset time period, a query request is sent to the blockchain node, and the first sample library and/or the second sample library on the blockchain node are synchronously updated to the local database under the condition that the query result indicates that the first sample library and/or the second sample library is in an updated state.
In this embodiment, the block link point is configured to store a first sample library and a second sample library, and the protection terminal sends a query request to the block chain node every a preset time period to obtain update conditions of the first sample library and the second sample library in the block chain node, if the first sample library is in an updated state, update the first sample library to the local database synchronously, if the second sample library is in an updated state, update the second sample library to the local database synchronously, and if the first sample library and the second sample library are in an updated state, update the first sample library and the second sample library to the local database synchronously.
Optionally, taking the first sample library as an example, the protection terminal sends a query request to the blockchain node every preset time period to obtain an MD5 value of the first sample library in the blockchain node, and compares the MD5 value with the first MD5 value preset in the protection terminal, if the MD5 value is consistent, the first sample library is not updated, and if the MD5 value is inconsistent, the first sample library is in an updated state.
In this embodiment, the protection terminal queries the update conditions of the first sample library and the second sample library in the blockchain node once every preset time period and updates the local sample library, so that the real-time performance of the target database is ensured, and whether the target page is a malicious page or whether malicious characters are included in the target page due to untimely update of the sample library is avoided.
In one embodiment, there is further provided a page access method, as shown in fig. 7, that is, the page access method in the embodiment of fig. 6 further includes the steps of:
s505, receiving a feedback request input by a user on a target terminal; the feedback request includes candidate malicious pages and/or candidate malicious characters.
In this embodiment, when the protection terminal determines that the target page is not a malicious page but does not include a malicious character, the user may still consider that the target page is a malicious page or that the target page includes a malicious character, and further, the user may trigger a feedback request at the target terminal, where the feedback request includes a candidate malicious page and/or a candidate malicious character, and the target terminal sends the feedback request to the protection terminal.
And S506, sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
In this embodiment, the protection terminal sends the feedback request to the blockchain node, and the blockchain node may update the first sample library and/or the second sample library according to the feedback request and the instruction of the security personnel. For example, if the feedback request includes a candidate malicious page, and the security personnel command is to approve updating, the block link point adds the candidate malicious page to the second sample library; if the feedback request includes candidate malicious characters, the security personnel instruction is to approve updating, and the block link point adds the candidate malicious characters to the first sample library.
In this embodiment, the blockchain node updates the first sample library and/or the second sample library according to the feedback request input by the user on the target terminal, so that the integrity and accuracy of the first sample library and the second sample library are improved, and the protection effect on the target terminal is improved.
An embodiment of the present disclosure is described below in connection with a specific page access scenario, the method comprising the steps of:
S1, after a preset time period, a query request is sent to a blockchain node, and when a query result indicates that a first sample library and/or a second sample library on the blockchain node are in an updated state, the first sample library and/or the second sample library are synchronously updated to a local database.
S2, receiving a page access request sent by the target terminal.
S3, determining whether address information corresponding to the page is contained in the second sample library, if yes, determining that the page requested by the page access request is a malicious page, and feeding back access failure information to the target terminal; if not, determining that the page requested by the page access request is not a malicious page, and executing step S4.
S4, sending a page access request to the server and receiving a target page returned by the server.
S5, determining whether the target page contains malicious characters in the first sample library, if so, determining that the target page contains the malicious characters, and executing the step S6; if not, the target page is determined to not contain malicious characters, and the target page is returned to the target terminal.
S6, deleting malicious characters in the target page to obtain a deleted target page; or, carrying out replacement processing on malicious characters in the target page to obtain a replaced target page, and returning the processed target page to the target terminal, or feeding back information of access failure to the target terminal.
S7, receiving a feedback request input by a user on the target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters; and sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
In the page access method, a page access request sent by a target terminal is received; determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal. When the page requested by the page access request is a malicious interface, stopping to continuously access the page, effectively protecting the target terminal, and protecting the malicious page and malicious characters in the page by using a protection component of each application program in the prior art.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a page access device for realizing the above-mentioned page access method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more page access devices provided below may refer to the limitation of the page access method described above, and will not be repeated here.
In one embodiment, as shown in fig. 8, there is provided a page access apparatus including: a receiving module 10 and a determining module 11, wherein:
a receiving module 10, configured to receive a page access request sent by a target terminal;
the determining module 11 is configured to determine whether a page requested by the page access request is a malicious page, and if yes, feed back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, as shown in fig. 9, the determining module 11 includes a sending unit 111 and a first determining unit 112, where:
And the sending unit 111 is used for sending the page access request to the server and receiving the target page returned by the server.
The first determining unit 112 is configured to determine whether the target page includes a malicious character, and if so, process the malicious character to obtain a processed target page, and return the processed target page to the target terminal, or feed back information of access failure to the target terminal; and if the target page does not contain the target page, returning the target page to the target terminal.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the first determining unit 112 is configured to delete a malicious character from the target page, to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the first determining unit 112 is configured to determine whether the target page includes malicious characters in the first sample library, and if yes, determine that the target page includes malicious characters; if not, determining that the target page does not contain malicious characters.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, as shown in fig. 10, the determining module 11 includes: a second determining unit 113, configured to determine whether address information corresponding to the page is included in the second sample library, and if yes, determine that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, as shown in fig. 11, the determining module 11 includes: and the query unit 114 is configured to send a query request to the blockchain node after a preset period of time, and synchronously update the first sample library and/or the second sample library to the local database if the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the query unit 114 is configured to receive a feedback request input by a user on the target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters; and sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
The page access device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
The various modules in the page access device described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 12. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a page access method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 12 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
receiving a page access request sent by a target terminal;
determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
Sending a page access request to a server and receiving a target page returned by the server;
determining whether the target page contains malicious characters, if so, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back access failure information to the target terminal; and if the target page does not contain the target page, returning the target page to the target terminal.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
deleting malicious characters in the target page to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
determining whether the target page contains malicious characters in the first sample library, if so, determining that the target page contains the malicious characters; if not, determining that the target page does not contain malicious characters.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
determining whether address information corresponding to the page is contained in the second sample library, if yes, determining that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
and after the preset time period, sending a query request to the blockchain node, and synchronously updating the first sample library and/or the second sample library to the local database under the condition that the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a feedback request input by a user on a target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters;
and sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
The computer device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving a page access request sent by a target terminal;
determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
sending a page access request to a server and receiving a target page returned by the server;
determining whether the target page contains malicious characters, if so, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back access failure information to the target terminal; and if the target page does not contain the target page, returning the target page to the target terminal.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
deleting malicious characters in the target page to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Determining whether the target page contains malicious characters in the first sample library, if so, determining that the target page contains the malicious characters; if not, determining that the target page does not contain malicious characters.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether address information corresponding to the page is contained in the second sample library, if yes, determining that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and after the preset time period, sending a query request to the blockchain node, and synchronously updating the first sample library and/or the second sample library to the local database under the condition that the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a feedback request input by a user on a target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters;
and sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
The computer readable storage medium provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
receiving a page access request sent by a target terminal;
determining whether a page requested by the page access request is a malicious page, if so, feeding back information of access failure to a target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
sending a page access request to a server and receiving a target page returned by the server;
determining whether the target page contains malicious characters, if so, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back access failure information to the target terminal; and if the target page does not contain the target page, returning the target page to the target terminal.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
deleting malicious characters in the target page to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether the target page contains malicious characters in the first sample library, if so, determining that the target page contains the malicious characters; if not, determining that the target page does not contain malicious characters.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
determining whether address information corresponding to the page is contained in the second sample library, if yes, determining that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and after the preset time period, sending a query request to the blockchain node, and synchronously updating the first sample library and/or the second sample library to the local database under the condition that the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a feedback request input by a user on a target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters;
and sending a feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
The computer program product provided in this embodiment may perform the above method embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A method for accessing a page, wherein the method for accessing a page is applied to a protection terminal, and the method comprises the following steps:
receiving a page access request sent by a target terminal;
determining whether the page requested by the page access request is a malicious page, if so, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
2. The method of claim 1, wherein processing the page access request to obtain a processing result comprises:
sending the page access request to a server, and receiving a target page returned by the server;
determining whether the target page contains malicious characters, if so, processing the malicious characters to obtain a processed target page, and returning the processed target page to the target terminal, or feeding back information of access failure to the target terminal; and if not, returning the target page to the target terminal.
3. The method of claim 2, wherein the processing the malicious character to obtain a processed target page comprises:
deleting the malicious characters from the target page to obtain a deleted target page; or, carrying out replacement processing on the malicious characters in the target page to obtain the replaced target page.
4. The method of claim 2, wherein the determining whether the target page contains malicious characters comprises:
determining whether the target page contains malicious characters in a first sample library, if so, determining that the target page contains the malicious characters; if not, determining that the target page does not contain malicious characters.
5. The method of claim 1, wherein the determining whether the page requested by the page access request is a malicious page comprises:
determining whether the second sample library contains address information corresponding to the page, if so, determining that the page requested by the page access request is a malicious page; if not, determining that the page requested by the page access request is not a malicious page.
6. The method according to claim 4 or 5, characterized in that the method further comprises:
and after a preset time period, sending a query request to a blockchain node, and synchronously updating the first sample library and/or the second sample library to a local database under the condition that the query result indicates that the first sample library and/or the second sample library on the blockchain node are in an updated state.
7. The method of claim 6, wherein the method further comprises:
receiving a feedback request input by a user on the target terminal; the feedback request comprises candidate malicious pages and/or candidate malicious characters;
and sending the feedback request to the blockchain node to instruct the blockchain node to update the first sample library and/or the second sample library according to the candidate malicious page and/or the candidate malicious character.
8. A page access device, wherein the page access method is applied to a protection terminal, the device comprising:
the receiving module is used for receiving the page access request sent by the target terminal;
the determining module is used for determining whether the page requested by the page access request is a malicious page or not, and if yes, feeding back information of access failure to the target terminal; if not, processing the page access request to obtain a processing result, and returning the processing result to the target terminal.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202311197824.8A 2023-09-15 2023-09-15 Page access method, page access device, computer equipment and storage medium Pending CN117439769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311197824.8A CN117439769A (en) 2023-09-15 2023-09-15 Page access method, page access device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311197824.8A CN117439769A (en) 2023-09-15 2023-09-15 Page access method, page access device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117439769A true CN117439769A (en) 2024-01-23

Family

ID=89545249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311197824.8A Pending CN117439769A (en) 2023-09-15 2023-09-15 Page access method, page access device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117439769A (en)

Similar Documents

Publication Publication Date Title
CN109062512B (en) Distributed storage cluster, data read-write method, system and related device
CN115470156A (en) RDMA-based memory use method, system, electronic device and storage medium
CN114089921A (en) Power system data storage method and device, computer equipment and storage medium
CN116991800A (en) File acquisition system, method, device, computer equipment and storage medium
CN116910405A (en) Page processing method, device, computer equipment and storage medium
CN114928620B (en) User information synchronization method, apparatus, device, storage medium, and program product
CN117439769A (en) Page access method, page access device, computer equipment and storage medium
CN113986921A (en) Blacklist query method, system, electronic equipment and storage medium
CN112395243B (en) Access method and device of processor
CN118245160A (en) Tab label updating method, device, computer equipment and storage medium
CN115456568A (en) Process approval method, apparatus, computer device, storage medium, and program product
CN117932186A (en) Page instance management method, device, computer equipment and storage medium
CN116644444A (en) File access method, device, computer equipment and storage medium thereof
CN116226866A (en) Web application framework vulnerability detection method and device and computer equipment
CN116541145A (en) Data calling method, device, computer equipment and computer storage medium
CN114915573A (en) Test method, device, equipment, storage medium and program product
CN114138196A (en) Power system data storage method and device, computer equipment and storage medium
CN116894044A (en) Data management method, device, computer equipment and storage medium
CN115374114A (en) Data maintenance method and device, computer equipment and storage medium
CN118193396A (en) Test method, test apparatus, computer device, storage medium, and program product
CN116304407A (en) Page rendering method, device, computer equipment and storage medium
CN116881388A (en) Entry database determination method, apparatus, device, storage medium, and program product
CN115221222A (en) Receipt processing method and device, computer equipment and storage medium
CN117271656A (en) Data synchronization method, device and computer equipment
CN116546103A (en) Processing method, device, equipment, storage medium and product of distributed service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination