WO2012126263A1 - 一种访问互联网网页的装置、系统及方法 - Google Patents
一种访问互联网网页的装置、系统及方法 Download PDFInfo
- Publication number
- WO2012126263A1 WO2012126263A1 PCT/CN2011/083807 CN2011083807W WO2012126263A1 WO 2012126263 A1 WO2012126263 A1 WO 2012126263A1 CN 2011083807 W CN2011083807 W CN 2011083807W WO 2012126263 A1 WO2012126263 A1 WO 2012126263A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- webpage
- information
- security
- module
- user terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Definitions
- the present invention relates to secure access technologies, and in particular, to an apparatus, system, and method for accessing an Internet web page. Background of the invention
- web pages mainly including direct connection access and proxy servers. Access two ways. among them,
- the direct connection type access method is to directly initiate an access request to the target webpage when the user accesses the target webpage through the user terminal browser; and the proxy server access mode is that the user passes the preset proxy when accessing all the internet webpages through the user terminal browser.
- the server is completed, that is, the proxy server is responsible for the proxy user to initiate an access request to the target webpage, obtain the webpage, and perform webpage conversion as needed, and output the converted webpage to the user terminal browser for display.
- the user terminal can complete the webpage conversion, thereby returning the webpage suitable for the user terminal browser layout display, not only saving the calculation amount of the user terminal interpreting the script language, but also It can effectively reduce the traffic of user terminals; on the other hand, the proxy server itself has a cache function, which is also beneficial to improve the speed experience of users accessing web pages.
- the user terminal browser application proxy server has a wide range of access, such as a QQ user terminal browser, a mainstream user terminal browser such as UCWeb and Opera Mini, and a proxy server access mechanism.
- the secure access of the browser is ensured based on the networked scanning, that is, the user downloads the display page through the user terminal browser.
- the security server when requesting access to the target webpage, sending the Uniform Resource Locator (URL) information of the target webpage to the networked security server, requesting the security server to authenticate the security of the URL, and the security server according to the storage
- the web security database information is authenticated securely, and the security authentication response result of the URL is returned to the user terminal, and the user terminal performs a corresponding operation according to the security authentication response result: if the security authentication response result is secure, the access request is initiated to the proxy server, If the security server determines that the URL has a security risk, the security server may prohibit the user terminal browser from accessing the target webpage, and the user terminal may not initiate an access request to the webpage to the proxy server, or the user may Full results of the security risks authentication response contained in message, decide whether to initiate an access request to the proxy server.
- URL Uniform Resource Locator
- the existing method for accessing the Internet webpage uses the security data information of each webpage pre-collected by the background (security server) to perform security authentication on the webpage requested by the user, and outputs the security authentication response result to the user terminal, the user terminal. Then, according to the result of the security authentication response, it is determined whether the access request is initiated to the proxy server, so as to achieve the security access function, but after the security authentication, the security server also needs to send the security authentication information to the user terminal, and then the user terminal initiates the access request. , which makes the user need to access the webpage for a long time, which brings a certain network delay overhead; further, even through security authentication In the webpage, there are still more link jumps in the webpage.
- the link jump information needs to be sent back to the security server for security authentication, so that the user accesses the webpage.
- the webpage corresponding to the link jump causes a larger network delay, which reduces the user experience.
- it needs to continuously interact with the security server, which also increases the traffic overhead and increases the user cost.
- the main object of the present invention is to provide an apparatus for accessing an Internet webpage, which reduces network delay overhead of accessing an Internet webpage and improves user experience.
- Another object of the present invention is to provide a system for accessing an Internet web page, which reduces network delay overhead and improves user experience for accessing Internet web pages.
- Still another object of the present invention is to provide a method of accessing an Internet webpage, which reduces network delay overhead of accessing an Internet webpage and improves user experience.
- the present invention provides an apparatus for accessing an Internet webpage, the apparatus comprising: an access request processing module, a security module, a target webpage pull module, and a webpage security database module, wherein
- the access request processing module is configured to receive an access request, and if the Uniform Resource Locator URL information of the target webpage included in the access request carries an identifier that needs to be authenticated, the URL information of the target webpage is output to the security module;
- the security module is configured to perform security authentication on the URL information of the received target webpage according to the webpage secure database information stored by the webpage security database module, and if the authentication is passed, output the URL information of the target webpage to the target webpage pull module;
- the target webpage pull module is configured to pull webpage information from the target webpage according to the received URL information of the target webpage, and output the webpage information to the user terminal;
- the webpage security database module is configured to store webpage security database information.
- a system for accessing an Internet webpage comprising: a user terminal and a proxy server, wherein
- the user terminal is configured to initiate an access request to the proxy server, and carry the URL information of the target webpage that needs to be authenticated by the security server; receive the target webpage information output by the proxy server, and display the information;
- the proxy server is configured to receive the access request, perform security authentication on the URL information of the target webpage that carries the security authentication, and obtain the target webpage information and output the information to the user terminal according to the pre-stored webpage security database information.
- a method of accessing an internet webpage comprising:
- the user terminal initiates an access request, and carries a unified resource locator URL information that identifies the target webpage that needs to be authenticated securely;
- the proxy server performs security authentication on the received URL information of the target webpage that needs to be securely authenticated according to the pre-stored webpage security database information, determines the security authentication, obtains the target webpage information, and outputs the target webpage information to the user terminal;
- the user terminal receives the target webpage information output by the proxy server for display.
- the device, the system and the method for accessing an Internet webpage are provided by the above technical solution.
- the system includes: a user terminal and a proxy server, wherein the user terminal initiates an access request to the proxy server, and carries the identifier to perform security authentication.
- the Uniform Resource Locator URL information of the target webpage ; receiving the target webpage information output by the proxy server, and displaying; the proxy server receiving the access request, and according to the pre-stored webpage security database information, the URL of the target webpage carrying the identifier for secure authentication
- the information is securely authenticated. If the security authentication is passed, the target web page information is obtained and output to the user terminal.
- the proxy server is used to extend the security access function of the user terminal browser, and the webpage is securely authenticated through the configuration of the mobile terminal browser and the proxy server, and after the security authentication is passed, the webpage information is directly pulled, thereby reducing the access.
- Internet webpage latency overhead thus Improve the user experience by providing users with secure browsing without adding additional network delays.
- FIG. 1 is a schematic structural diagram of a system for accessing an Internet webpage according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a proxy server according to an embodiment of the present invention.
- FIG. 3 is a schematic flowchart of a method for accessing an Internet webpage according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of a method for directly requesting webpage access according to an embodiment of the present invention.
- FIG. 5 is a schematic flowchart of a method for link jump access according to an embodiment of the present invention. Mode for carrying out the invention
- the user terminal needs to send the URL information of the target webpage to the security server for security authentication, and according to the security authentication response information returned by the security server, determine whether to initiate the target through the proxy server.
- the access of the webpage increases the network delay overhead caused by the interaction between the user terminal and the security server, and reduces the user experience.
- the security of the webpage that the user requests to access is replaced by the proxy server instead of the security server. If the security authentication of the webpage requested to be accessed is passed, the webpage requested to be accessed is directly accessed, and the security authentication fails.
- the webpage the user terminal determines whether to access the webpage according to the security authentication response result returned by the proxy server, thereby providing the user with a secure browsing service without adding additional network delay.
- FIG. 1 is a schematic structural diagram of a system for accessing an Internet webpage according to an embodiment of the present invention.
- the system includes: a user terminal and a proxy server, where
- the user terminal is configured to initiate an access request to the proxy server, and the identifier is required to be carried.
- URL information of the fully authenticated target webpage receiving the target webpage information output by the proxy server for display;
- the identifier for performing security authentication may be determined in advance by the proxy server and the user terminal.
- the user terminal is further configured to receive the security authentication response result returned by the proxy server, determine to access the target webpage, initiate an access request to the proxy server, and carry the URL information of the target webpage that identifies the mandatory access.
- the proxy server is configured to receive the access request, perform security authentication on the URL information of the target webpage that carries the security authentication, and obtain the target webpage information and output the information to the user terminal according to the pre-stored webpage security database information.
- the proxy server is further configured to: when the security authentication fails, return a security authentication response result to the user terminal; receive the URL information of the target webpage that carries the identity mandatory access, obtain the target webpage information, and output the target webpage information to the user terminal.
- the results of the security certification response include: The target web page security level is unknown and the target web page security level is risk.
- a malicious website whose security level is risk or unknown, such as a deduction website, a phishing website, a fake information website, and a virus Trojan link
- the information may be directly carried in the security authentication response result to prompt the user to visit the target webpage.
- a malicious website such as a deduction website, a phishing website, a fake information website or a virus Trojan link.
- the proxy server is further configured to convert the target webpage into a webpage structure adapted to the browser of the user terminal according to the user terminal browser information carried by the access request, and output to the user terminal to which the access request belongs.
- FIG. 2 is a schematic structural diagram of a proxy server according to an embodiment of the present invention.
- the proxy server includes: an access request processing module, a security module, a target webpage pull module, and a webpage security database module, where The access request processing module is configured to receive an access request, if the URL information of the target webpage included in the access request carries an identifier that needs to be authenticated, and output the URL information of the target webpage to the security module;
- the access request processing module is further configured to: if the URL information of the target webpage included in the access request carries the identifier of the mandatory access, output the URL information of the target webpage to the target webpage pulling module.
- the security module is configured to perform security authentication on the URL information of the received target webpage according to the webpage secure database information stored by the webpage security database module, and if the authentication is passed, output the URL information of the target webpage to the target webpage pull module;
- the security module is further configured to: when the security authentication fails, return a security authentication response result to the user terminal; and, after the security authentication of the URL information of the target webpage fails, further according to the preset security.
- the policy determines that the target webpage cannot be accessed, and carries the forbidden access identifier in the returned security authentication response result. In this way, even if the user terminal receives the security authentication response result returned by the proxy server, determines that the target webpage is accessed, and does not initiate an access request to the proxy server, but displays the information that the target webpage is prohibited from being accessed, so as to effectively protect the user's interest. .
- the user is provided with an entry for mandatory continued access on the risk alert page.
- the relevant security parameter is added in the GET method (access request) of the Hypertext Transfer Protocol (HTTP) to indicate that the proxy server requests the URL to be the user.
- HTTP Hypertext Transfer Protocol
- the pre-set security policy may be that the user is a minor according to the user information in the user access request, or the target webpage involves pornographic, violent, and the like.
- the target webpage pull module is configured to: according to the URL information of the received target webpage, The target webpage pulls the webpage information and outputs it to the user terminal;
- the webpage security database module is configured to store webpage security database information.
- the stored webpage security database information includes webpage URL information and its mapped security level information. For example, you can set 1 in advance to indicate that the security level is security, 2 to indicate that the security level is unknown, and 3 to indicate that the security level is risk. Thus, if the security level value of the web page URL mapping is 1, it means that the web page is secure.
- the proxy server further includes:
- a webpage conversion module configured to convert, according to the browser information of the user terminal carried by the access request, the webpage information pulled by the target webpage pull module into a webpage structure adapted to the browser of the user terminal, and output to the user terminal to which the access request belongs .
- the link jump information of the pulled webpage is further set, and the webpage link information is further analyzed.
- the module is configured to parse the webpage information pulled by the target webpage pull module, obtain the link jump information included, and output the information to the security module; receive the security level information output by the security module, and embed the link jump information into the webpage information. And outputting the webpage information to the user terminal; correspondingly, the security module is further configured to receive the link jump information output by the webpage link information parsing module, perform security authentication, and output the authenticated security level information to the webpage link information parsing module.
- the user terminal further displays the security level information corresponding to the link jump when browsing the webpage information to trigger the access to the link jump in the webpage information; and when the user determines to access the webpage corresponding to the link jump , initiate an access request to the access request processing module Carries an identifier of mandatory access.
- the user is provided with an entry for forcibly continuing access in the page of the risk prompt. If the user needs to access the webpage corresponding to the link, the link does not need to be re-established.
- the jump information is sent to the security server for secure authentication, which effectively reduces the network delay and network access of the webpage corresponding to the link jump. Traffic, which improves the user experience.
- the user terminal initiates an access request to the proxy server, carries the URL information of the target webpage that needs to be authenticated securely, and receives the target webpage information output by the proxy server for display;
- the server receives the access request, and performs security authentication on the URL information of the target webpage that needs to be authenticated by the security authentication according to the pre-stored webpage security database information. If the security authentication passes, the target webpage information is obtained and output to the user terminal.
- the proxy server is used to extend the secure browsing function of the user terminal browser, and the webpage is securely authenticated through the configuration of the mobile terminal browser and the proxy server, and after the security authentication is passed, the webpage information is directly pulled, thereby reducing the access.
- the network latency of Internet web pages provides a safe browsing service for users without adding additional network delays, improving the user experience. Further, by embedding relevant security level information in the link jump information of the webpage information, by adding a small amount of additional network traffic, the user can promptly and promptly prompt the user for the deduction website, the phishing website, the fake information website, and the virus Trojan link.
- the website can give the user the necessary risk reminders and does not extend the user's web page waiting time.
- FIG. 3 is a schematic flowchart of a method for accessing an Internet webpage according to an embodiment of the present invention. Referring to Figure 3, the process includes:
- Step 301 The user terminal initiates an access request, and carries the URL information of the target webpage that identifies the security authentication.
- the URL information of the target webpage to be accessed is obtained, and the identifier that needs to be authenticated is carried, encapsulated in the access request, and sent to the proxy server.
- Step 302 The proxy server performs security authentication on the received URL information of the target webpage that needs to be securely authenticated according to the pre-stored webpage security database information, determines the security authentication, obtains the target webpage information, and outputs the target webpage information to the user terminal.
- the proxy server successfully passes the URL information of the target webpage, the target webpage information is directly pulled according to the URL information of the target webpage, and the authentication information is not returned to the user terminal, thereby reducing access to the Internet webpage.
- Network latency overhead is used to reduce the Internet webpage.
- Step 303 The user terminal receives the target webpage information output by the proxy server, and displays the information.
- the security authentication of the received URL information of the target webpage that carries the security authentication is further included:
- the proxy server determines that the security authentication fails, and returns a security authentication response result to the user terminal;
- the user terminal receives the security authentication response result returned by the proxy server, determines to access the target webpage, initiates an access request to the proxy server, and carries the URL information of the target webpage that is forcibly accessed;
- the user terminal browser accesses the Internet webpage, according to the manner in which the user's webpage is opened, it can be divided into two cases: "direct request webpage” and "link jump".
- the open target webpage is opened.
- the link jump the open target page contains the embedded link page URL information, and the user can click the link page URL information in the opened web page, thereby
- the URL authentication information of the linked webpage needs to be securely authenticated, which are respectively described below.
- FIG. 4 is a schematic flowchart of a method for directly requesting webpage access according to an embodiment of the present invention. Referring to Figure 4, the process includes:
- Step 401 The user terminal browser requests an authentication URL from the proxy server.
- Step 402 The proxy server queries the webpage security database to obtain the security attribute of the URL.
- Step 403 determining whether the security attribute of the URL has a security risk, and if so, executing step 404, otherwise, performing step 405;
- Step 404 The proxy server generates the prompt webpage information according to the risk type, and returns the information to the user terminal browser.
- the proxy server can directly return a specific web page to inform the user of its security risks.
- Step 405 Access a webpage corresponding to the URL.
- the web page corresponding to the URL is directly accessed to provide services for the user.
- FIG. 5 is a schematic flowchart of a method for link jump access according to an embodiment of the present invention. Whether the link jump occurs, the target server webpage information can be parsed by the proxy server, and the link jump information is determined in the target webpage information. If yes, referring to FIG. 5, the process includes: Step 501: The proxy server webpage page The security attribute of each URL that appears in the judgment is made;
- the proxy server receives the content of the page returned by the target webpage (web server), and the security module connects to the webpage security database for security attribute query for each URL included in the page.
- Step 502 The proxy server adds a corresponding security attribute value description to a label corresponding to some or all URLs according to a preset security attribute marking policy.
- the security module of the proxy server may perform the security attribute tagging policy according to the preset security attribute tagging policy.
- the security attribute marking policy includes: a blacklist mechanism marking policy, a whitelisting machine Tagging strategy and a hybrid list mechanism tagging strategy, where
- the blacklist mechanism that is, only the security attribute value is added to the URL tag with security risks, so that no additional processing is required for most normal web pages.
- the user terminal browser will block and pop up a prompt message in an appropriate manner to remind the user.
- a prompt to prohibit access to the web page may also be popped up, and the user is prohibited from accessing.
- the blacklist mechanism is applicable to the online environment where the security requirements of the user terminal are relatively loose. Therefore, by maintaining the webpage information with only risk, the database size can be reduced. Of course, if the webpage security database is not perfect, some security risks will be introduced. Judge.
- the whitelist mechanism that is, only the security attribute value is added to the URL tag that does not have any security risk, and correspondingly, when the user attempts to open the URL with the security attribute value and indicates the security, the user terminal browser will be appropriate.
- the mode explicitly indicates that the user's current access is secure. For URLs whose security attribute values are not given, ie other uncertain risk levels and risky URLs, the user terminal browser does not give an indication of secure browsing when attempting to open. Of course, in actual applications, risk warnings can also be popped up.
- This mechanism is applicable to the Internet environment where the access security requirements are relatively strict.
- the size of the database can be effectively reduced.
- the webpage security database is not perfect, some original security will be introduced.
- the URL is not explicitly indicated by the browser.
- the hybrid list mechanism that is, for URLs that do not have security risks, increase the URL security tag attribute value, indicating that the URL is secure; for uncertain URLs, for example, the web security database queries for missed URLs or URLs with security risks, No additional processing or addition of tag attribute values that mean unknown security or risk.
- the web security database needs to maintain a full amount of URL information, thus, The browser can give a clearer security indication.
- the value range of the security attribute value depends on the security status description of the website, including security, unknown and risk.
- the risk can be further subdivided into deduction website, virus website, Trojan website, false information website, and fishing. Website, etc. This information is represented by a specific ID and establishes a uniform agreement between the proxy server and the browser, thus facilitating the browser to present detailed risk type prompts to the user.
- the proxy server takes a deduplication method when identifying the value of the security attribute. In this way, the same URL will not be added security attribute values multiple times, reducing the computational overhead of browser parsing.
- Step 503 The user terminal browser parses each URL tag in the webpage, and records the security attribute value thereof, and uses a proper prompt according to the security attribute value of the URL when displaying the page.
- the user may decide whether to access the link jump corresponding to the URL according to the prompt information. If the access is determined, the user initiates an access request to the proxy server, and carries the URL information of the target webpage that is forcibly accessed.
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/005,962 US8898738B2 (en) | 2011-03-23 | 2011-12-12 | Apparatus, system and method for accessing internet webpage |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110070193.4A CN102694772B (zh) | 2011-03-23 | 2011-03-23 | 一种访问互联网网页的装置、系统及方法 |
CN201110070193.4 | 2011-03-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012126263A1 true WO2012126263A1 (zh) | 2012-09-27 |
Family
ID=46860059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/083807 WO2012126263A1 (zh) | 2011-03-23 | 2011-12-12 | 一种访问互联网网页的装置、系统及方法 |
Country Status (3)
Country | Link |
---|---|
US (1) | US8898738B2 (zh) |
CN (1) | CN102694772B (zh) |
WO (1) | WO2012126263A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368958A (zh) * | 2013-07-05 | 2013-10-23 | 腾讯科技(深圳)有限公司 | 一种网页检测方法、装置和系统 |
CN104572641A (zh) * | 2013-10-10 | 2015-04-29 | 腾讯科技(深圳)有限公司 | 网页资源的管理方法及装置 |
CN114338142A (zh) * | 2021-12-27 | 2022-04-12 | 云深互联(北京)科技有限公司 | 一种基于浏览器的安全访问系统及方法 |
Families Citing this family (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368999A (zh) * | 2012-03-29 | 2013-10-23 | 富泰华工业(深圳)有限公司 | 互联网的访问系统及方法 |
CN102882886B (zh) * | 2012-10-17 | 2016-03-30 | 北京奇虎科技有限公司 | 一种呈现访问网站的相关信息的网络终端和方法 |
CN103116725B (zh) * | 2013-02-01 | 2015-12-02 | 北京奇虎科技有限公司 | 对网页进行锁屏的方法、装置及浏览器 |
CN103973749A (zh) * | 2013-02-05 | 2014-08-06 | 腾讯科技(深圳)有限公司 | 基于云服务器的网站处理方法及云服务器 |
CN104052630B (zh) * | 2013-03-14 | 2019-10-11 | 北京百度网讯科技有限公司 | 对网站执行验证的方法和系统 |
CN104125258B (zh) * | 2013-04-28 | 2016-03-30 | 腾讯科技(深圳)有限公司 | 页面跳转方法、终端、服务器和系统 |
CN104239302B (zh) * | 2013-06-07 | 2017-10-03 | 腾讯科技(深圳)有限公司 | 页面内容获取方法、装置及应用设备与移动终端 |
CN104468485B (zh) * | 2013-09-23 | 2018-11-16 | 西门子公司 | 一种网页扫描方法、装置和系统 |
US9935977B1 (en) | 2013-12-09 | 2018-04-03 | Amazon Technologies, Inc. | Content delivery employing multiple security levels |
US10068014B2 (en) * | 2014-02-06 | 2018-09-04 | Fastly, Inc. | Security information management for content delivery |
US9419986B2 (en) * | 2014-03-26 | 2016-08-16 | Symantec Corporation | System to identify machines infected by malware applying linguistic analysis to network requests from endpoints |
RU2689439C2 (ru) * | 2014-05-13 | 2019-05-28 | Опера Софтвэар Ас | Улучшение производительности веб-доступа |
US9635041B1 (en) * | 2014-06-16 | 2017-04-25 | Amazon Technologies, Inc. | Distributed split browser content inspection and analysis |
CN104994091B (zh) * | 2015-06-30 | 2018-04-27 | 东软集团股份有限公司 | 异常流量的检测方法及装置、防御Web攻击的方法和装置 |
CN106453216A (zh) * | 2015-08-13 | 2017-02-22 | 阿里巴巴集团控股有限公司 | 恶意网站拦截方法、装置及客户端 |
CN105335511A (zh) * | 2015-10-30 | 2016-02-17 | 百度在线网络技术(北京)有限公司 | 网页的访问方法及装置 |
CN106911733B (zh) * | 2015-12-22 | 2021-07-23 | 北京奇虎科技有限公司 | 云代理的网址访问方法及装置 |
CN105743890B (zh) * | 2016-01-27 | 2020-07-17 | 上海优扬新媒信息技术有限公司 | 权限信息生成方法和装置 |
CN105704238B (zh) * | 2016-03-31 | 2019-02-01 | 上海爱数信息技术股份有限公司 | 基于开放存储服务系统的html预览方法及系统 |
US10860715B2 (en) * | 2016-05-26 | 2020-12-08 | Barracuda Networks, Inc. | Method and apparatus for proactively identifying and mitigating malware attacks via hosted web assets |
CN105915639B (zh) * | 2016-06-06 | 2020-08-04 | 腾讯科技(深圳)有限公司 | 页面访问方法及装置 |
CN106357603A (zh) * | 2016-08-18 | 2017-01-25 | 乐视控股(北京)有限公司 | 网页安全检测处理方法及装置 |
US11095682B1 (en) * | 2016-08-26 | 2021-08-17 | Palo Alto Networks, Inc. | Mitigating phishing attempts |
CN106326455A (zh) * | 2016-08-26 | 2017-01-11 | 乐视控股(北京)有限公司 | 网页浏览过滤处理方法及系统、终端、云加速服务器 |
US10075417B2 (en) * | 2016-09-12 | 2018-09-11 | International Business Machines Corporation | Verifying trustworthiness of redirection targets in a tiered web delivery network |
US20180183799A1 (en) * | 2016-12-28 | 2018-06-28 | Nanning Fugui Precision Industrial Co., Ltd. | Method and system for defending against malicious website |
CN107819754B (zh) * | 2017-10-30 | 2020-01-14 | 网宿科技股份有限公司 | 一种防劫持方法、监控服务器、终端及系统 |
WO2019089418A1 (en) * | 2017-10-31 | 2019-05-09 | Wood Michael C | Computer security system and method based on user-intended final destination |
CN107948179B (zh) * | 2017-12-05 | 2020-09-18 | 北京知道创宇信息技术股份有限公司 | 网络支付监测方法及系统 |
CN108052632B (zh) * | 2017-12-20 | 2022-02-18 | 成都律云科技有限公司 | 一种网络信息获取方法、系统及企业信息搜索系统 |
US11470113B1 (en) * | 2018-02-15 | 2022-10-11 | Comodo Security Solutions, Inc. | Method to eliminate data theft through a phishing website |
CN110213211B (zh) * | 2018-05-22 | 2021-08-20 | 腾讯科技(深圳)有限公司 | 识别安全下载链接的方法、装置、终端及存储介质 |
CN111597473B (zh) * | 2019-02-20 | 2023-04-25 | 阿里巴巴集团控股有限公司 | 数据传递方法、终端设备、服务器及数据传递系统 |
CN110377848A (zh) * | 2019-06-21 | 2019-10-25 | 深圳壹账通智能科技有限公司 | 页面访问方法、装置、设备及计算机可读存储介质 |
CN110275877A (zh) * | 2019-06-24 | 2019-09-24 | 北京搜房科技发展有限公司 | 数据处理方法及装置 |
CN110278271B (zh) * | 2019-06-24 | 2022-04-12 | 厦门美图之家科技有限公司 | 网络请求控制方法、装置及终端设备 |
CN110413846B (zh) * | 2019-07-29 | 2022-05-20 | 数译(成都)信息技术有限公司 | 用于网页镜像的数据处理方法、装置及计算机可读存储介质 |
CN111190492B (zh) * | 2019-12-25 | 2023-07-18 | 曙光信息产业(北京)有限公司 | 开启kvm的方法及装置 |
US20220131877A1 (en) * | 2020-10-23 | 2022-04-28 | Paypal, Inc. | Neutralizing Evasion Techniques of Malicious Websites |
CN114745145B (zh) * | 2021-01-07 | 2023-04-18 | 腾讯科技(深圳)有限公司 | 业务数据访问方法、装置和设备及计算机存储介质 |
CN112511569B (zh) * | 2021-02-07 | 2021-05-11 | 杭州筋斗腾云科技有限公司 | 网络资源访问请求的处理方法、系统及计算机设备 |
CN113641936B (zh) * | 2021-08-12 | 2023-08-11 | 百度在线网络技术(北京)有限公司 | 用于页面跳转的方法、装置、电子设备及存储介质 |
CN115842641A (zh) * | 2021-09-18 | 2023-03-24 | 贵州白山云科技股份有限公司 | 访问请求的处理方法、电子装置、电子设备以及介质 |
US20230171260A1 (en) * | 2021-12-01 | 2023-06-01 | Bank Of America Corporation | System and method for maintaining network security in a mesh network by analyzing ip stack layer information in communications |
CN113938327B (zh) * | 2021-12-17 | 2022-05-24 | 亿次网联(杭州)科技有限公司 | Vpn服务的访问方法和访问系统、电子设备、存储介质 |
CN115904444A (zh) * | 2022-12-10 | 2023-04-04 | 中电金信软件有限公司 | 网络应用的显示方法、装置、计算机设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132404A (zh) * | 2007-09-14 | 2008-02-27 | 腾讯科技(深圳)有限公司 | 一种网页内容分级显示系统及方法 |
CN101159000A (zh) * | 2007-10-17 | 2008-04-09 | 深圳市迅雷网络技术有限公司 | 一种网页安全信息检测系统及方法 |
US20080119177A1 (en) * | 2006-09-15 | 2008-05-22 | Speedus Corp. | Metadata Content Delivery System for Wireless Networks |
CN101729857A (zh) * | 2009-11-24 | 2010-06-09 | 中兴通讯股份有限公司 | 一种接入视频服务的方法及视频播放系统 |
CN101977235A (zh) * | 2010-11-03 | 2011-02-16 | 北京北信源软件股份有限公司 | 一种针对https加密网站访问的网址过滤方法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101917404B (zh) * | 2010-07-15 | 2016-03-16 | 优视科技有限公司 | 移动终端的浏览器安全防御方法 |
-
2011
- 2011-03-23 CN CN201110070193.4A patent/CN102694772B/zh active Active
- 2011-12-12 US US14/005,962 patent/US8898738B2/en active Active
- 2011-12-12 WO PCT/CN2011/083807 patent/WO2012126263A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080119177A1 (en) * | 2006-09-15 | 2008-05-22 | Speedus Corp. | Metadata Content Delivery System for Wireless Networks |
CN101132404A (zh) * | 2007-09-14 | 2008-02-27 | 腾讯科技(深圳)有限公司 | 一种网页内容分级显示系统及方法 |
CN101159000A (zh) * | 2007-10-17 | 2008-04-09 | 深圳市迅雷网络技术有限公司 | 一种网页安全信息检测系统及方法 |
CN101729857A (zh) * | 2009-11-24 | 2010-06-09 | 中兴通讯股份有限公司 | 一种接入视频服务的方法及视频播放系统 |
CN101977235A (zh) * | 2010-11-03 | 2011-02-16 | 北京北信源软件股份有限公司 | 一种针对https加密网站访问的网址过滤方法 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368958A (zh) * | 2013-07-05 | 2013-10-23 | 腾讯科技(深圳)有限公司 | 一种网页检测方法、装置和系统 |
US9712562B2 (en) | 2013-07-05 | 2017-07-18 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for detecting potential phishing websites |
CN104572641A (zh) * | 2013-10-10 | 2015-04-29 | 腾讯科技(深圳)有限公司 | 网页资源的管理方法及装置 |
CN114338142A (zh) * | 2021-12-27 | 2022-04-12 | 云深互联(北京)科技有限公司 | 一种基于浏览器的安全访问系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
US20140059649A1 (en) | 2014-02-27 |
US8898738B2 (en) | 2014-11-25 |
CN102694772A (zh) | 2012-09-26 |
CN102694772B (zh) | 2014-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012126263A1 (zh) | 一种访问互联网网页的装置、系统及方法 | |
US9954855B2 (en) | Login method and apparatus, and open platform system | |
US11128621B2 (en) | Method and apparatus for accessing website | |
US9544295B2 (en) | Login method for client application and corresponding server | |
WO2014071763A1 (zh) | 一种多核浏览器中拦截恶意网址的方法和多核浏览器 | |
WO2017190641A1 (zh) | 拦截爬虫的方法、装置、服务器终端以及计算机可读介质 | |
US9305174B2 (en) | Electronic clipboard protection | |
US8448260B1 (en) | Electronic clipboard protection | |
US8484373B2 (en) | System and method for redirecting a request for a non-canonical web page | |
US20110258326A1 (en) | Method, device, and system for implementing resource sharing | |
WO2013044757A1 (zh) | 一种下载链接安全性检测方法、装置及系统 | |
WO2013143403A1 (zh) | 一种访问网站的方法和系统 | |
EP2894833B1 (en) | Portal push method and network equipment | |
US10972507B2 (en) | Content policy based notification of application users about malicious browser plugins | |
WO2017020585A1 (zh) | 一种基于cdn的访问控制方法及相关设备 | |
US11831617B2 (en) | File upload control for client-side applications in proxy solutions | |
WO2015074459A1 (zh) | 打开网页、调用客户端及创建轻应用的方法及装置 | |
WO2015109928A1 (zh) | 一种加载推荐信息、网址检测的方法、装置和系统 | |
WO2014127653A1 (zh) | 恶意网站的访问方法、装置和系统 | |
KR20180074774A (ko) | 악의 웹 사이트 식별 방법, 장치 및 컴퓨터 기억매체 | |
US8381269B2 (en) | System architecture and method for secure web browsing using public computers | |
CN114357457A (zh) | 漏洞检测方法、装置、电子设备和存储介质 | |
CN110177096B (zh) | 客户端认证方法、装置、介质和计算设备 | |
CN112202813A (zh) | 网络访问方法及装置 | |
US10079856B2 (en) | Rotation of web site content to prevent e-mail spam/phishing attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11861430 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: IDW00201304868 Country of ref document: ID |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14005962 Country of ref document: US |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 29/11/2013) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11861430 Country of ref document: EP Kind code of ref document: A1 |