WO2015062326A1 - Procédé, dispositif et système de contrôle d'accès à une page - Google Patents

Procédé, dispositif et système de contrôle d'accès à une page Download PDF

Info

Publication number
WO2015062326A1
WO2015062326A1 PCT/CN2014/083842 CN2014083842W WO2015062326A1 WO 2015062326 A1 WO2015062326 A1 WO 2015062326A1 CN 2014083842 W CN2014083842 W CN 2014083842W WO 2015062326 A1 WO2015062326 A1 WO 2015062326A1
Authority
WO
WIPO (PCT)
Prior art keywords
script
links
security level
source code
user terminal
Prior art date
Application number
PCT/CN2014/083842
Other languages
English (en)
Chinese (zh)
Inventor
黄骅
邵付东
王琰
潘丽
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2015062326A1 publication Critical patent/WO2015062326A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Definitions

  • the present invention relates to the field of network security technologies, and in particular, to a page access control method, apparatus, and system. Background technique
  • the forum is a platform for a large number of users to exchange information and discuss. Utilizing the rapid spread of forum information, criminals often make malicious links in forums that entice users to click on malicious links to gain benefits. For example, online hot-selling such as discuz irrigators, discuz advertising robots, etc. also justify the tricky users to click on the link to get rich benefits.
  • Embodiments of the present invention provide a page access control method and related apparatus and system, in order to enhance flexibility and reliability against malicious link defense.
  • the present invention provides a page access control method, which may include:
  • the user terminal obtains the page source code from the site server;
  • N is a natural number greater than or equal to 1.
  • the present invention provides a page access control method, which may include:
  • the secure cloud server sends a script corresponding to the path information to the user terminal, where the path information is path information included in the script tag embedded in the page source code acquired by the user terminal from the site server;
  • N is a natural number greater than or equal to 1.
  • the present invention provides a page access control method, which may include:
  • the site server sends the page source code to the user terminal
  • the security level information corresponding to the N links is sent to the user terminal, so that the user terminal invokes the script to determine the security level based on the security level information corresponding to the N links.
  • the link performs access control; N is a natural number greater than or equal to 1.
  • the present invention provides a user terminal, which may include:
  • a source code obtaining unit configured to obtain a page source code from a site server
  • a script obtaining unit configured to obtain a script corresponding to the path information from path information included in a script tag embedded in the page source code
  • a sending unit configured to invoke the script to send the N links included in the page source code to the first secure cloud server
  • a receiving unit configured to invoke the script to receive security level information corresponding to the N links from the first secure cloud server
  • control unit configured to invoke the script to perform access control on the N links based on a security level described by the security level information corresponding to the N links; N is a natural number greater than or equal to 1.
  • the present invention provides a secure cloud server, which may include:
  • a first sending unit configured to send a script corresponding to the path information to the user terminal, where the path information is path information included in a script tag embedded in a page source code acquired by the user terminal from the site server;
  • a receiving unit configured to receive, by the user terminal, the N links included in the page source code sent by the script
  • a determining unit configured to determine security level information corresponding to the N links
  • a second sending unit configured to send the security level information corresponding to the N links to the user terminal, so that the user terminal invokes the security level information corresponding to the N links after the script is invoked by the script
  • the script performs access control on the N links based on the security level described by the security level information corresponding to the N links; N is greater than or equal to 1. Natural number.
  • the present invention provides a site server, which may include:
  • a first sending unit configured to send a page source code to the user terminal
  • a script obtaining unit configured to obtain a script corresponding to the path information from a first secure cloud server based on path information included in a script tag embedded in the page source code; and a second sending unit, configured to send the user The terminal sends the script;
  • a receiving unit configured to receive, by the user terminal, the N links included in the page source code sent by the script
  • a third sending unit configured to send the N links to the second secure cloud server, and after the receiving unit receives the security level information corresponding to the N links from the second secure cloud server, The user terminal sends the security level information corresponding to the N links, so that the user terminal invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links; Is a natural number greater than or equal to 1.
  • the present invention provides a communication system, which may include:
  • the site server is configured to send a page source code to the user terminal
  • the user terminal is configured to obtain the page source code from the site server, and obtain a script corresponding to the path information, where the page source code is embedded
  • the script tag includes the path information; the script is invoked to send the N links included in the page source code to the secure cloud server; and the script is invoked to receive the N links corresponding to the secure cloud server.
  • the user terminal obtains from the site server The page source code, the user terminal obtains the script corresponding to the path information.
  • the script tag embedded in the page source code includes the path information.
  • the user terminal invokes the script to send the N links included in the page source code to the first secure cloud server; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked based on the foregoing
  • the security level described by the security level information corresponding to the N links controls access to the above N links.
  • the script Since the user terminal acquires the script corresponding to the path information in the page source code and the page source code on the network side, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the The script controls access to the N links based on the security level described by the security level information corresponding to the N links.
  • the user terminal can protect the malicious link included in the source code of the page without installing the anti-virus software in advance, which is beneficial to improving the defense capability, and is beneficial for eliminating the risk caused by the failure of the anti-virus software in the user terminal, which is very large. To a certain extent, it enhances the flexibility and reliability of the user terminal's defense against malicious links.
  • the script There is a correspondence between the script and the page source code, which is beneficial to further enhance the flexibility and reliability of the user terminal to defend against malicious links.
  • FIG. 1 is a schematic flowchart of a page access control method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart diagram of another page access control method according to an embodiment of the present invention
  • FIG. 3 is another embodiment of the present invention.
  • Schematic diagram of the control method 4 is a schematic flowchart of another method for controlling page access according to an embodiment of the present invention
  • FIG. 5 is a schematic flowchart of another method for controlling page access according to an embodiment of the present invention
  • FIG. 6 is another embodiment of the present invention.
  • FIG. 7 is a schematic flowchart diagram of another method for controlling page access according to an embodiment of the present invention
  • FIG. 8 is a schematic flowchart of another method for controlling page access according to an embodiment of the present invention
  • FIG. 9 is a schematic diagram of a user terminal according to an embodiment of the present invention
  • FIG. 9 is a schematic diagram of a user terminal according to an embodiment of the present invention
  • FIG. 9 is a schematic diagram of a user terminal according
  • FIG. 10 is a schematic diagram of a secure cloud server according to an embodiment of the present invention
  • FIG. 11 is a schematic diagram of a site server according to an embodiment of the present invention
  • FIG. 12 is a schematic diagram of a user terminal according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of a secure cloud server according to an embodiment of the present invention
  • FIG. 14 is a schematic diagram of a site server according to an embodiment of the present invention
  • Figure 15 is a schematic diagram of a mobile communication terminal according to an embodiment of the present invention
  • Figure 16 is a schematic diagram of a communication system according to an embodiment of the present invention
  • 17 is a schematic diagram of another communication system provided by an embodiment of the present invention. detailed description
  • Embodiments of the present invention provide a page access control method and related apparatus and system, in order to enhance flexibility and reliability against malicious link defense.
  • An embodiment of the page access control method of the present invention wherein the page access control method may include: the user terminal acquiring the page source code from the site server; and acquiring the script corresponding to the path information.
  • the script tag embedded in the page source code includes the path information; the script is invoked to send the N links included in the page source code to the first secure cloud server; and the script is invoked to receive the N from the first secure cloud server.
  • Links to the corresponding security level information, and call the above script based on the security of the above N links The security level described by the level information controls access to the above N links.
  • FIG. 1 is a schematic flowchart of a page access control method according to an embodiment of the present invention.
  • a page access control method provided by an embodiment of the present invention may include the following contents:
  • the user terminal obtains the page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information.
  • the path information included in the script tag embedded in the page source code refers to a script stored in the second secure cloud server, that is, the path of the script is path information included in the script tag embedded in the page source code.
  • the path information mentioned in the embodiments of the present invention may be a Uniform Resource Locator (URL) or other information used to describe the path.
  • URL Uniform Resource Locator
  • the acquiring, by the user terminal, the script corresponding to the path information may include: obtaining, by the user terminal, the script corresponding to the path information from the second secure cloud server based on the path information (eg, the user terminal may cross-domain communication mode, based on the path information) Obtaining a script corresponding to the path information from the second secure cloud server.
  • the user terminal may send the path information to the site server, to instruct the site server to obtain the script corresponding to the path information from the second secure cloud server based on the path information, where the site The server forwards the script corresponding to the path information to the user terminal; or the user terminal receives the script corresponding to the path information sent by the site server, where the site server obtains the path information corresponding to the path information from the second secure cloud server based on the path information. script.
  • the user terminal may obtain the script corresponding to the path information stored in the second security cloud server by using other methods.
  • the user terminal invokes the foregoing script to send the foregoing page source to the first secure cloud server.
  • the code contains N links. In the embodiment of the present invention, N is a natural number greater than or equal to 1.
  • the user terminal invokes the script to receive the security level information corresponding to the N links from the first secure cloud server, and invokes the script to perform the N links according to the security level described by the security level information corresponding to the N links. Access control.
  • the first secure cloud server and the second secure cloud server are the same or different.
  • the sending the script to send the N links included in the page source code to the first secure cloud server may include: calling the script to send the N links included in the page source code to the site server. And sending, by the above-mentioned site server, the N links included in the source code of the above page to the first secure cloud server.
  • the sending the script to send the N links included in the page source code to the first secure cloud server may include: calling the script to cross-domain communication mode (the first secure cloud server and the user) The terminal is usually in a different domain) sends the N links included in the above page source code to the first secure cloud server.
  • the path of the N links included in the source code of the above page sent by the user terminal to the first secure cloud server does not need to pass through the above site server.
  • the first secure cloud server may query the link security record in the secure cloud database to determine the corresponding security level information of the N links according to the query result.
  • the first secure cloud server may also check the security of the N links in real time, and determine the security level information corresponding to the N links according to the security of the detected N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, Rendering the display effect of the display content of each of the above N links in the above page to correspond to each of the links
  • the security level information describes the corresponding display effect of the security level.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, which is not used herein.
  • the user terminal invokes the public library used by the script to invoke the closure method.
  • the above script is a javascript script.
  • the above javascript script is registered as a prototype member in the extended object of the corresponding javascript.
  • the above scripts can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be cases where the script and the internal logic conflict of the site server. For example, a javascript script does not have a concept like a java package, or a namespace concept such as C++ or c#.
  • a javascript script can be registered as a prototype member in an extended object of a corresponding javascript. This helps ensure that the loaded javascript script does not conflict with functions and variables in the original page. Or, because the script may need to call a third-party library, it may also conflict with some naming of the page source code.
  • the public used by calling the above script (such as a javascript script)
  • the common library uses the closure call method, so all the code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the N links included in the source code of the page; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked based on the security level information corresponding to the N links. Describe the security level to access the above N links.
  • the user terminal is configured to obtain the script corresponding to the path information in the page source code and the page source code from the network side, and invoke the script to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and invoke the The script controls access to the N links based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without installing the anti-virus software in advance. It is beneficial to improve the defense capability, and is beneficial to eliminate the risk of crisis caused by the failure of anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense.
  • There is a correspondence between the script and the page source code which is beneficial to further enhance the flexibility and reliability of the user terminal to defend against malicious links.
  • FIG. 2 is a schematic flowchart diagram of another page access control method according to an embodiment of the present invention.
  • another page access control method provided by an embodiment of the present invention may include the following contents:
  • the user terminal acquires a page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum.
  • the page source code for the face or other pages.
  • the user terminal parses the obtained page source code to obtain path information included in the script tag embedded in the page source code.
  • the user terminal obtains a corresponding script from the second secure cloud server in a cross-domain communication manner based on the path information obtained as described above.
  • the path information included in the script tag embedded in the page source code points to a script stored in the second secure cloud server, that is, the path of the script is described by the path information included in the script tag embedded in the page source code. path.
  • the user terminal invokes the script to send the N links included in the source code of the page to the first secure cloud server in a cross-domain communication manner, where N is a natural number greater than or equal to 1.
  • the first security cloud server determines security level information corresponding to the N links, and sends the security level information corresponding to the N links to the user terminal.
  • the first secure cloud server and the second secure cloud server are the same or different.
  • the first secure cloud server may query the link security record in the secure cloud database, and determine the security level information corresponding to the N links according to the query result; or the first secure cloud server may also check in real time.
  • the security of the N links determines the corresponding security level information of the N links based on the security of the detected N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the user terminal invokes the script to receive the security level information corresponding to the N links from the first secure cloud server, and invokes the script to use the security level described by the security level information corresponding to the N links to the N links. Perform access control.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, Put each of the above N links The display effect of the linked display content in the above page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the accessing the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the foregoing page When the mouse is hovered to the display position of the display content of the first link among the above N links, the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link of the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, the access to the second link is blocked. .
  • the user terminal can call the above script to provide a mouseover display without adding an icon before the link to ensure the smoothness of the user browsing the article. If the actual address of the link does not match the address presented by the link, for example, the content displayed by the link is www.xxxx.com, but the actual link address is www.xxxy.com, indicating a risk. The user terminal can invoke the above script to prompt for cautious access during mouseover. If the link is a dangerous link, the danger icon is displayed when the user terminal can call the above script.
  • the public library used by the user terminal to invoke the above script is invoked in a closed call mode.
  • the above script is a javascript script, wherein the above javascript script is registered as a prototype member in an extended object of the corresponding javascript.
  • the above scripts can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict. For example, the javascript script does not have the concept of a java package.
  • the javascript script can be registered as a prototype member to the corresponding javascript extension object, which is beneficial to ensure that the loaded javascript script does not match the original page.
  • the functions and variables in the other conflict with each other.
  • the script may need to call the third-party library, and may also conflict with some naming manners of the page source code, in the embodiment of the present invention, the public library used by calling the script (such as a javascript script) is called with a closure. The mode is called, so that all code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure.
  • the above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires the script corresponding to the path information.
  • the script tag embedded in the page source code includes the path information; the script is invoked to send the N links included in the page source code to the first secure cloud server; and the script is invoked to receive the N from the first secure cloud server.
  • the security level information corresponding to the links is invoked by the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links. Based on the mechanism, the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software.
  • FIG. 3 is another page access control method according to an embodiment of the present invention. Schematic diagram of the process. As shown in FIG. 3, another page access control method provided by an embodiment of the present invention may include the following content:
  • the user terminal obtains the page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the user terminal parses the obtained page source code to obtain path information included in the script tag embedded in the page source code.
  • the user terminal sends the obtained path information to the site server.
  • the site server obtains a corresponding script from the second secure cloud server based on the path information from the user terminal.
  • the path information included in the script tag embedded in the page source code points to the script in the second secure cloud server, that is, the path of the script is the path described by the path information included in the script tag embedded in the page source code. .
  • the site server sends the foregoing script obtained from the second secure cloud server to the user terminal.
  • the user terminal invokes the script to send the N links included in the source code of the page to the first secure cloud server in a cross-domain communication manner; N is a positive integer greater than or equal to 1.
  • the first secure cloud server determines the corresponding security level information of the N links, and sends the corresponding security level information of the N links to the user terminal, where the first secure cloud server and the second secure cloud server are the same or different. .
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the way the first secure cloud server determines the corresponding security level information for N links is varied. , no longer repeat here.
  • the user terminal invokes the script to receive the security level information corresponding to the N links from the first secure cloud server, and invokes the script to perform the N links according to the security level described by the security level information corresponding to the N links. Access control.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the accessing the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the foregoing page When the mouse is hovered to the display position of the display content of the first link among the above N links, the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may invoke the above script to provide a mouseover display without adding an icon before the link to ensure the user.
  • the smoothness of browsing the article If the actual address of the link does not match the address displayed by the link, such as the content displayed by the link www.xxxx.com, but the actual link address is www.xxxy.com, it indicates that there is a risk, the user terminal can Call the above script to prompt for cautious access when mouseover; if the link is Dangerous links, user terminals can call the above scripts to appear dangerous icons in any situation.
  • the public library used by the user terminal to invoke the script is invoked by using a closed call method; or the above script is a javascript script, wherein the javascript script is registered as a prototype member to the corresponding javascript. Extend the object.
  • the above scripts can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict. For example, the javascript script does not have the concept of java package or c++. The concept of the namespace is c#.
  • the javascript script can be registered as a prototype member to the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not match the function in the original page. Variables and the like conflict with each other. Or, because the script may need to call the third-party library, and may also conflict with some naming manners of the page source code, in the embodiment of the present invention, the public library used by calling the script (such as a javascript script) is called with a closure. The mode is called, so that all code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the first secure cloud server may perform automatic secondary detection on the false alarm data reported by the user terminal, and the detected data is immediately synchronized to the secure cloud database to ensure that the link is processed after the false alarm processing. It can return to a safe state normally at a time. Moreover, the content displayed by a link may be changed in real time, so the first secure cloud server may periodically retrace the data to ensure that the change of the security state caused by the change of the link content can correctly inform the user. If the user terminal using the first secure cloud server fails to query the link request, the first secure cloud server can accurately locate the request processing of the site by using the header information of the requested ip, host name, and the like. Anomalies, the online code can be modified after the problem is determined, and can be released in a grayscale or full amount. Loopholes on the line.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the N links included in the source code of the page;
  • the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked to be described based on the security level information corresponding to the N links.
  • the security level controls access to the above N links. Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and the script and page source code are Correspondence is beneficial to further enhance the flexibility and reliability of the user terminal for malicious link defense.
  • FIG. 4 is a schematic flowchart diagram of another page access control method according to an embodiment of the present invention.
  • another page access control method provided by an embodiment of the present invention may include the following contents:
  • the user terminal acquires a page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the user terminal parses the obtained page source code to obtain path information included in the script tag embedded in the page source code.
  • the user terminal sends the obtained path information to the site server.
  • the site server obtains a corresponding script from the second secure cloud server based on the path information from the user terminal.
  • the path information included in the script tag embedded in the page source code points to the script in the second secure cloud server, that is, the path of the script is the path described by the path information included in the script tag embedded in the page source code. .
  • the site server sends the foregoing script obtained from the second secure cloud server to the user terminal.
  • the user terminal invokes the script to send the N links included in the source code of the page to the site server.
  • N is a positive integer greater than or equal to 1.
  • javascript scripts may pop up dialog prompts in IE, which affects user friendliness.
  • php scripts for relaying can be deployed on the site server, and the user terminal can call javascript scripts with the php of the site server.
  • Script communication the php script called by the site server communicates with the secure cloud server.
  • the secure cloud server can obtain a unified site server ip, which can easily form a policy of restricting access by ip.
  • the site server calls the php script to communicate with the secure cloud server, and the file_get_contents function can be called.
  • This function belongs to the php standard library, and all php versions will carry this. function.
  • Php's Curl extension is a library that simulates url behavior, and can be used to simulate url get and post requests using the provided functions.
  • curl can do the domain name resolution cache for the requested url.
  • the request for the web page or image under the same domain name only needs one d query, which greatly reduces the number of domain name resolution queries, and the performance may be better than the curl.
  • File_get_contents is better.
  • the site server sends, to the first secure cloud server, the N links included in the page source code of the user terminal. 408.
  • the first secure cloud server determines the security level information corresponding to the N links, and sends the security level information corresponding to the N links to the site server, where the first secure cloud server and the second secure cloud server are the same or different.
  • the site server sends the corresponding security level information of the foregoing N links to the user terminal.
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the user terminal invokes the script to receive the security level information corresponding to the N links from the first secure cloud server, and invokes the script to perform the N links according to the security level described by the security level information corresponding to the N links. Access control.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the accessing the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the foregoing page When the mouse is hovered to the display position of the display content of the first link among the above N links, the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed.
  • the above calling the script is based on the N links
  • the security level described in the corresponding security level information, the access control of the N links includes: in the page corresponding to the displayed source code of the page, when the user selects the display content of the second link of the N links, If the security level described by the security level information corresponding to the second link conforms to the set blocked access condition, access to the second link is blocked.
  • FIG. 5 is a schematic flowchart diagram of another page access control method according to an embodiment of the present invention.
  • another page access control method provided by an embodiment of the present invention may include the following content:
  • the user terminal obtains the page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the site server parses the page source code to obtain path information included in the script tag embedded in the page source code.
  • the site server obtains a corresponding script from the second secure cloud server based on the obtained path information.
  • the path information included in the script tag embedded in the page source code points to the script in the second secure cloud server, that is, the path of the script is the path described by the path information included in the script tag embedded in the page source code. .
  • the site server sends the foregoing script obtained from the second secure cloud server to the user terminal.
  • the user terminal invokes the above script to send the N links included in the source code of the page to the site server.
  • the site server sends, to the first secure cloud server, the N links included in the above page source code of the user terminal.
  • javascript scripts may pop up dialog prompts in IE, which affects user-friendliness.
  • php scripts for relaying can be deployed on the site server.
  • the client terminal invokes the javascript script to communicate with the php script invoked by the site server, and the php script invoked by the site server communicates with the secure cloud server.
  • the secure cloud server can obtain a unified site server ip, which can conveniently form a policy of restricting access by ip.
  • the site server calls the php script to communicate with the secure cloud server, and the file_get_contents function can be called.
  • This function belongs to the php standard library, and all php versions will carry this. function.
  • Php's Curl extension is a library that simulates url behavior, and can be used to simulate url get and post requests using the provided functions.
  • curl can do the domain name resolution cache for the requested url.
  • the request for the web page or image under the same domain name only needs one d query, which greatly reduces the number of domain name resolution queries, and the performance may be better than the curl.
  • File_get_contents is better.
  • the first secure cloud server determines corresponding security level information of the N links, and sends the corresponding security level information of the N links to the site server.
  • the first secure cloud server and the second secure cloud server are the same or different.
  • the site server sends the corresponding security level information of the N links to the user terminal.
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the user terminal invokes the script to receive security level information corresponding to the N links from the first secure cloud server, and invokes the script according to the N links.
  • the security level described by the security level information controls access to the above N links.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the accessing the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the foregoing page When the mouse is hovered to the display position of the display content of the first link among the above N links, the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • FIG. 6 is a schematic flowchart diagram of another page access control method according to an embodiment of the present invention.
  • another page access control method provided by an embodiment of the present invention may include the following contents:
  • the user terminal obtains a page source code from the site server.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the site server parses the page source code to obtain path information included in the script tag embedded in the page source code.
  • the site server obtains the foregoing path information from the second secure cloud server. Get the corresponding script.
  • the path information included in the script tag embedded in the page source code points to the script in the second secure cloud server, that is, the path of the script is the path described by the path information included in the script tag embedded in the page source code. .
  • the site server sends the foregoing script obtained from the second secure cloud server to the user terminal.
  • the user terminal invokes the script to send the N links included in the page source code to the first secure cloud server in a cross-domain communication manner.
  • the first security cloud server determines the corresponding security level information of the N links, and sends the corresponding security level information of the N links to the user terminal, where the first secure cloud server and the second secure cloud server are the same or different. .
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the user terminal invokes the script to receive the security level information corresponding to the N links from the first secure cloud server, and invokes the script to perform the N links according to the security level described by the security level information corresponding to the N links. Access control.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the accessing the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the foregoing page When the mouse is hovered to the display position of the display content of the first link among the above N links, the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • FIG. 7 is a schematic flowchart of a page access control method according to an embodiment of the present invention.
  • a page access control method provided by an embodiment of the present invention may include the following contents:
  • the secure cloud server sends a script corresponding to the path information to the user terminal, where the path information is path information included in the script tag embedded in the page source code obtained by the user terminal from the site server.
  • the secure cloud server receives, by the user terminal, the N links included in the page source code sent by the script.
  • the secure cloud server determines security level information corresponding to the foregoing N links.
  • N is a natural number greater than or equal to 1.
  • the secure cloud server may query the link security record in the secure cloud database, and determine the corresponding security level information of the N links according to the query result; or the secure cloud server may also check the N links in real time.
  • the security determines the corresponding security level information of the N links according to the security of the detected N links. The way the secure cloud server determines the corresponding security level information for N links is varied, no longer here. Narration.
  • the security cloud server sends the security level information corresponding to the N links to the user terminal, so that the user terminal invokes the script based on the N links after calling the script to receive the security level information corresponding to the N links.
  • the security level described in the corresponding security level information controls access to the above N links.
  • the sending the script corresponding to the path information to the user terminal may include: sending a script corresponding to the path information to the site server, and sending, by using the site server, a script corresponding to the path information to the user terminal; or
  • the cross-domain communication method transmits a script corresponding to the path information to the user terminal.
  • the sending the security level information corresponding to the N links to the user terminal may include: sending, to the site server, security level information corresponding to the N links, and using the foregoing site server to The user terminal sends the security level information corresponding to the N links, or sends the security level information corresponding to the N links to the user terminal in a cross-domain communication manner.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the above calling the script is based on the N links
  • the security level described in the corresponding security level information, the access control of the N links includes: in the page corresponding to the displayed source code of the page, when the user selects the display content of the second link of the N links, If the security level described by the security level information corresponding to the second link conforms to the set blocked access condition, access to the second link is blocked.
  • the user terminal invokes the public library used by the script in a closure call mode.
  • the above script is a javascript script, wherein the above javascript script is registered as a prototype member in the extended object of the corresponding javascript.
  • the above scripts can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict. For example, the javascript script does not have the concept of java package or C++. , c# this namespace concept.
  • the javascript script can be registered as a prototype member to the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not conflict with functions and variables in the original page. Or, because the script may need to call a third-party library, it may also conflict with some naming of the page source code.
  • the public library used by the above script (such as a javascript script) is invoked by a closed package, so that all code logic inside the closure can still use the variables declared by the original library without affecting The logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal obtains the page source code from the site server, and the secure cloud server sends a script corresponding to the path information to the user terminal, where the script tag embedded in the page source code includes the path information;
  • the security cloud server receives, by the server, the security level information corresponding to the N links, the security cloud server sends the security level information corresponding to the N links to the user terminal, so that the user terminal receives the security corresponding to the N links by calling the script.
  • the above script is called based on The security level described by the security level information corresponding to the above N links controls access to the N links.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • FIG. 8 is a schematic flowchart of a page access control method according to an embodiment of the present invention.
  • a page access control method provided by an embodiment of the present invention may include the following contents:
  • the site server sends the page source code to the user terminal.
  • the site server obtains a corresponding script from the second secure cloud server based on the path information included in the script tag embedded in the page source code.
  • the user terminal may send the path information to the site server, and instruct the site server to obtain a script corresponding to the path information from the second secure cloud server based on the path information, and the script corresponding to the path information by the site server Forwarding to the user terminal; or the site server may parse the page source code, obtain the path information included in the script tag embedded in the page source code, and obtain the corresponding script from the second secure cloud server based on the obtained path information.
  • obtaining the corresponding script from the second secure cloud server based on the path information included in the script tag embedded in the page source code including: receiving the page source code sent by the user terminal Included in the script tag embedded in After the path information, obtaining a corresponding script from the second secure cloud server based on the path information included in the script tag embedded in the page source code; or, after obtaining the path information from the script tag embedded in the page source code And obtaining a corresponding script from the second secure cloud server based on the path information.
  • the site server sends the foregoing script to the user terminal.
  • the site server receives, by the user terminal, the N links included in the page source code sent by the script.
  • N is a positive integer greater than or equal to 1.
  • the site server sends the foregoing N links to the first secure cloud server, and after receiving the security level information corresponding to the N links from the first secure cloud server, sending the security corresponding to the N links to the user terminal.
  • Level information after the user terminal invokes the script to receive the security level information corresponding to the N links, and invokes the script to access the N links based on the security level described by the security level information corresponding to the N links. Control, wherein the first secure cloud server and the second secure cloud server are the same or different.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the above calling the script is based on the N links
  • the security level described in the corresponding security level information, the access control of the N links includes: in the page corresponding to the displayed source code of the page, when the user selects the display content of the second link of the N links, If the security level described by the security level information corresponding to the second link conforms to the set blocked access condition, access to the second link is blocked.
  • the user terminal obtains a script corresponding to the page source code and the path information from the site server, where the script tag embedded in the page source code includes the path information; and the site server receives the script sent by the user terminal.
  • the above page source code includes N links; the site server sends the N links to the first secure cloud server, and after receiving the security level information corresponding to the N links from the first secure cloud server, the user is sent to the user
  • the terminal sends the security level information corresponding to the N links, so that the user terminal invokes the script to describe the security level information corresponding to the N links after receiving the security level information corresponding to the N links.
  • the security level controls access to the N links, where the first secure cloud server and the second secure cloud server are the same or different.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to relieve the crisis caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and the script corresponds to the page source code.
  • the relationship, pertinence and reliability are conducive to further enhance the flexibility and reliability of the user terminal for malicious link defense.
  • an embodiment of the present invention provides a user terminal 900, which may include: a source code obtaining unit 910, a script obtaining unit 920, a sending unit 930, and a receiving unit.
  • the source code obtaining unit 910 is configured to obtain the page source code from the site server.
  • the script obtaining unit 920 is configured to obtain a script corresponding to the path information, where the script tag embedded in the page source code includes the path information.
  • the sending unit 930 is configured to invoke the above script to send the N links included in the page source code to the first secure cloud server.
  • N is a natural number greater than or equal to 1.
  • the receiving unit 940 is configured to invoke the script to receive the security level information corresponding to the N links from the first secure cloud server.
  • the control unit 950 is configured to invoke the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, where the first security cloud server and the second secure cloud server are the same or different.
  • the script obtaining unit 920 is specifically configured to: obtain a script corresponding to the path information from the second secure cloud server based on the path information; or receive a script corresponding to the path information sent by the site server, where The site server obtains the script corresponding to the path information from the second secure cloud server based on the path information.
  • the script obtaining unit 920 may obtain the script corresponding to the path information from the second secure cloud server based on the path information (for example, the script obtaining unit 920 may perform the cross-domain communication manner, based on The path information is obtained from the second secure cloud server and the script corresponding to the path information is obtained.
  • the script obtaining unit 920 may send the path information to the site server, to instruct the site server to obtain the path information corresponding to the path information from the second secure cloud server based on the path information.
  • the site server forwards the script corresponding to the path information to the user terminal 900); or the script obtaining unit 920 can receive the above site A script corresponding to the path information sent by the server, where the site server obtains a script corresponding to the path information from the second secure cloud server based on the path information.
  • the script obtaining unit 920 can also obtain the script corresponding to the path information stored in the second secure cloud server by using other methods.
  • the sending unit 930 is specifically configured to: invoke the script to send the N links included in the page source code to the first secure cloud server in a cross-domain communication manner; or, invoke the script to the site server. Sending N links included in the source code of the above page, and sending the N links included in the source code of the page to the first secure cloud server through the above site server.
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • control unit 950 is specifically configured to: in the page corresponding to the page source code that is displayed, display the display effect of the displayed content of each of the N links in the page Corresponding display effect of the security level described by the security level information corresponding to each link; or, in the page corresponding to the above-mentioned page source code displayed, when the mouse is hovered to the display of the first link among the N links
  • the corresponding risk prompt of the security level described by the security level information corresponding to the first link is displayed, wherein the first link is any one of the N links; or, the above page displayed In the page corresponding to the source code, when the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, the pair is blocked.
  • Second link access where, second The link is any of the N links.
  • the user terminal invokes the public library used by the script to invoke the closure.
  • the above script is a javascript script, wherein the above javascript script is registered as a prototype member in the extended object of the corresponding javascript.
  • the above scripts can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict.
  • the javascript script does not have the concept of java package or C++.
  • the concept of the namespace is c#.
  • the javascript script can be registered as a prototype member to the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not match the function in the original page. Variables and the like conflict with each other. Or, because the script may need to call the third-party library, and may also conflict with some naming manners of the page source code, in the embodiment of the present invention, the public library used by calling the script (such as a javascript script) is called with a closure. The mode is called, so that all code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the N links included in the source code of the page; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked based on the security level information corresponding to the N links. Describe the security level to access the above N links. Since the user terminal is the network side to obtain the page source code and the path information in the page source code.
  • the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and invoke the script to determine the security level based on the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without installing the anti-virus software in advance, which is beneficial to improving the defense capability and is beneficial to eliminate the failure of the anti-virus software in the user terminal.
  • Risk which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and there is a correspondence between the script and the page source code, which is beneficial to further enhance the flexibility and reliability of the user terminal for malicious link defense. Sex.
  • a secure cloud server 1000 may include: a first sending unit 1010, a receiving unit 1020, a determining unit 1030, and a second sending unit 1040.
  • the first sending unit 1010 is configured to send a script corresponding to the path information to the user terminal, where the path information is path information included in a script tag embedded in a page source code acquired by the user terminal from the site server;
  • the receiving unit 1020 is configured to receive, by the user terminal, the N links included in the page source code sent by the script;
  • the determining unit 1030 is configured to determine security level information corresponding to the foregoing N links.
  • N may be a natural number greater than or equal to 1.
  • the second sending unit 1040 is configured to send the security level information corresponding to the N links to the user terminal, so that the user terminal invokes the script based on the N after calling the script to receive the security level information corresponding to the N links.
  • the security level described by the security level information corresponding to the link controls access to the above N links.
  • the first sending unit 1010 may be specifically configured to: send a script corresponding to the path information to the site server, and send the script corresponding to the path information to the user terminal by using the site server; or Domain communication mode to the above users
  • the terminal sends a script corresponding to the path information.
  • the second sending unit 1040 is specifically configured to send the security level information corresponding to the N links to the site server, and send the N links corresponding to the user terminal by using the site server.
  • the security level information; or the security level information corresponding to the N links is sent to the user terminal in a cross-domain communication manner.
  • the determining unit 1030 may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the determining unit 1030 may also check the N links in real time.
  • the security determines the corresponding security level information of the N links according to the security of the detected N links.
  • the manner in which the determining unit 1030 determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page In the case that the user selects the display content of the second link among the N links, if the security level information corresponding to the second link is Determining that the security level meets the set blocked access conditions prevents access to the second link.
  • the user terminal obtains the page source code from the site server, and the secure cloud server sends a script corresponding to the path information to the user terminal, where the script tag embedded in the page source code includes the path information;
  • the security cloud server receives, by the server, the security level information corresponding to the N links, the security cloud server sends the security level information corresponding to the N links to the user terminal, so that the user terminal receives the security corresponding to the N links by calling the script.
  • the above script is invoked to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • a site server 1100 may include: a first sending unit 1110, a script obtaining unit 1120, a second sending unit 1130, a receiving unit 1140, and a third sending unit 1150.
  • the first sending unit 1110 is configured to send a page source code to the user terminal.
  • the script obtaining unit 1120 is configured to obtain a corresponding script from the second secure cloud server based on the path information included in the script tag embedded in the page source code.
  • the second sending unit 1130 is configured to send the script to the user terminal.
  • the receiving unit 1140 is configured to receive the N links included in the page source code sent by the user terminal by using the script.
  • N may be a natural number greater than or equal to 1.
  • the third sending unit 1150 is configured to send the N links to the first secure cloud server, and send the security level information corresponding to the N links from the first secure cloud server to the user terminal after the receiving unit receives the security level information corresponding to the N links from the first secure cloud server.
  • the security level information corresponding to the N links so that the user terminal invokes the security level information corresponding to the security level information corresponding to the N links after the user terminal receives the security level information corresponding to the N links. Access control is performed on the foregoing N links, where the first secure cloud server and the second secure cloud server are the same or different.
  • the script obtaining unit 1120 may be specifically configured to: after receiving the path information included in the script tag embedded in the page source code sent by the user terminal, based on the embedded in the page source code The path information included in the script tag is obtained from the second secure cloud server; or, after obtaining the path information from the script tag embedded in the page source code, obtaining the corresponding information from the second secure cloud server based on the path information. Script.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the above calling the script is based on the N links
  • the security level described by the corresponding security level information controls access to the N links, including: in the page corresponding to the source code of the page displayed, when the mouse is hovered to the display content of the first link of the N links When the location is displayed, a corresponding risk alert corresponding to the security level described by the security level information corresponding to the first link is displayed.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, which is not used herein.
  • the user terminal obtains a script corresponding to the page source code and the path information from the site server, where the script tag embedded in the page source code includes the path information; and the site server receives the script sent by the user terminal.
  • the above page source code includes N links; the site server sends the N links to the first secure cloud server, and after receiving the security level information corresponding to the N links from the first secure cloud server, the user is sent to the user
  • the terminal sends the security level information corresponding to the N links, so that the user terminal invokes the script to describe the security level information corresponding to the N links after receiving the security level information corresponding to the N links.
  • the security level controls access to the N links, where the first secure cloud server and the second secure cloud server are the same or different.
  • the script Since the user terminal is the network side to obtain the page source generation
  • the script corresponding to the path information in the code and the page source code the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked to be based on the N links.
  • the security level describes the security level to control the above N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without installing the anti-virus software in advance, which is beneficial to improving the defense capability and facilitating the elimination of the cause.
  • the risk of failure of the anti-virus software in the user terminal which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and the correspondence between the script and the page source code is beneficial to further enhance the user. Terminal flexibility and reliability against malicious link defense.
  • FIG. 12 illustrates a structure of a user terminal 1200 according to an embodiment of the present invention.
  • the user terminal 1200 includes: at least one processor 1201, such as a CPU, at least one network interface 1204 or other user interface 1203, and a memory 1205, at least one communication.
  • Bus 1202. Communication bus 1202 is used to implement connection communication between these components.
  • the user terminal 1200 optionally includes a user interface 1203, including a display, a keyboard or a pointing device (such as a mouse, trackball, touchpad or tactile display).
  • the memory 1205 may include a high speed RAM memory, and may also include a non-volatile memory such as at least one disk memory or the like.
  • the memory 1205 can optionally include at least one storage device located remotely from the aforementioned processor 1201.
  • memory 1205 stores the following elements, executable modules or data structures, or a subset thereof, or their extension set:
  • Operating system 12051 which contains various system programs for implementing various basic services and handling hardware-based tasks;
  • the application module 12052 includes various applications for implementing various application services.
  • the application module 12052 may include, but is not limited to, a source code acquisition unit 910, a script acquisition unit 920, a transmission unit 930, a reception unit 940, and a control unit 950.
  • a source code acquisition unit 910 a script acquisition unit 920
  • a transmission unit 930 a transmission unit 930
  • a reception unit 940 a control unit 950.
  • each module in the application module 12052 refer to the corresponding module in the embodiment shown in FIG. 9, and details are not described herein.
  • the processor 1201 by calling a program or instruction stored in the memory 1205, the processor 1201 is configured to obtain a page source code from the site server; and obtain a script corresponding to the path information, where the script tag embedded in the page source code includes The path information is sent to the first secure cloud server to send the N links included in the source code of the page; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked.
  • the access control is performed on the N links based on the security level described by the security level information corresponding to the N links.
  • N is a natural number greater than or equal to 1.
  • the obtaining, by the processor 1201, the script corresponding to the path information includes: obtaining, according to the path information, a script corresponding to the path information from the second secure cloud server (for example, the processor 1201 may be in a cross-domain communication manner, based on the path information.
  • the second secure cloud server obtains the script corresponding to the path information.
  • the processor 1201 may send the path information to the site server, to instruct the site server to obtain the script corresponding to the path information from the second secure cloud server based on the path information, where the site The server forwards the script corresponding to the path information to the user terminal 1200); or the processor 1201 receives the script corresponding to the path information sent by the site server, where the site server obtains the path information from the second secure cloud server based on the path information. Corresponding script.
  • the processor 1201 may obtain the script corresponding to the path information stored in the second secure cloud server by using other methods.
  • the processor 1201 invoking the script to send the N links included in the page source code to the first secure cloud server may include: calling the script to send the N included in the page source code to the site server. Linking, and sending the N links included in the source code of the above page to the first secure cloud server through the above site server.
  • the processor 1201 invokes the above script to the first security
  • the sending, by the full cloud server, the N links included in the source code of the foregoing page may include: calling the script to send the foregoing page source code to the first secure cloud server in a cross-domain communication manner (the first secure cloud server and the user terminal are usually in different domains) Contains N links.
  • the path of the N links included in the page source code sent by the processor 1201 to the first secure cloud server does not need to pass through the site server.
  • the processor 1201 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the effect of displaying the displayed content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect of the security level described by the security level information corresponding to each of the links.
  • the processor 1201 invokes the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: corresponding to the page source code of the displayed page.
  • the processor 1201 invokes the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: corresponding to the page source code of the displayed page.
  • the processor 1201 invokes the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: corresponding to the page source code of the displayed page.
  • the processor 1201 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the processor 1201 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the processor 1201 invokes a public library call closure method used by the script;
  • the script is a javascript script, wherein the javascript script is registered as a prototype member in an extended object of the corresponding javascript.
  • the above scripts can also be scripts in other formats. Understandably, because the script will be embedded in different stations In the source code of the server of the point server, there may be a situation in which the script and the internal logic of the site server conflict.
  • the javascript script does not have the concept of a java package, or the concept of a namespace such as C++ and c#, so the present invention is implemented.
  • the javascript script can be registered as a prototype member in the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not conflict with the functions and variables in the original page.
  • the script since the script may need to call the third-party library, it may also conflict with some naming manners of the page source code.
  • the processor 1201 calls the public library used by the script to perform the closed call calling manner. Called, so that all code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the N links included in the source code of the page;
  • the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked based on the security level information corresponding to the N links. Describe the security level to access the above N links. Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. Conducive to improving defense capabilities, helping to eliminate the failure of anti-virus software in user terminals The risk brought by this greatly enhances the flexibility and reliability of the user terminal against malicious link defense; and the correspondence between the script and the page source code is beneficial to further enhance the user terminal's defense against malicious links. Flexibility and reliability.
  • FIG. 13 illustrates a structure of a secure cloud server 1300 according to an embodiment of the present invention.
  • the secure cloud server 1300 includes: at least one processor 1301, such as a CPU, at least one network interface 1304 or other user interface 1303, and a memory 1305, at least A communication bus 1302. Communication bus 1302 is used to implement connection communication between these components.
  • the secure cloud server 1300 optionally includes a user interface 1303, including a display, a keyboard, or a pointing device (eg, a mouse, a trackball, a touchpad, or a touch sensitive display).
  • Memory 1305 may contain high speed RAM memory and may also include non-volatile memory, such as at least one disk memory.
  • the memory 1305 can optionally include at least one storage device located remotely from the aforementioned processor 1301.
  • memory 1305 stores the following elements, executable modules or data structures, or a subset thereof, or their extension set:
  • Operating system 13051 which contains various system programs for implementing various basic services and handling hardware-based tasks;
  • the application module 13052 includes various applications for implementing various application services.
  • the application module 13052 includes, but is not limited to, a first transmitting unit 1010, a receiving unit 1020, and a determining unit 1030 and a second transmitting unit 1040.
  • each module in the application module 13052 refers to the corresponding module in the embodiment shown in FIG. 10, and details are not described herein.
  • the processor 1301 may be configured to send a script corresponding to the path information to the user terminal by using a program or an instruction stored in the memory 1305, where the path information is the page source code obtained by the user terminal from the site server. Path information included in the embedded script tag; receiving the above-mentioned user terminal to invoke the above script to send the above
  • the N source links included in the page source code are determined; the security level information corresponding to the N links is determined; the security level information corresponding to the N links is sent to the user terminal, so that the user terminal receives the N links corresponding to the script
  • the above script is invoked to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • N is a natural number greater than or equal to 1.
  • the processor 1301 may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the processor 1301 may also check the N links in real time.
  • the security determines the corresponding security level information of the N links according to the security of the detected N links.
  • the manner in which the processor 1301 determines the corresponding security level information for the N links is various and will not be described here.
  • the sending, by the processor 1301, the script corresponding to the path information to the user terminal may include: the processor 1301 sending a script corresponding to the path information to the site server, and sending, by using the site server, the path information corresponding to the user terminal Or the processor 1301 sends the script corresponding to the path information to the user terminal in a cross-domain communication manner.
  • the sending, by the processor 1301, the security level information corresponding to the N links to the user terminal may include: the processor 1301 sending the security level information corresponding to the N links to the site server, and The security level information corresponding to the N links is sent to the user terminal by using the site server; or the processor 1301 sends the security level information corresponding to the N links to the user terminal in a cross-domain communication manner.
  • the above-mentioned script invokes the access control packet of the N links based on the security level described by the security level information corresponding to the N links. Included: in the page corresponding to the source code of the above page, the display effect of the display content of each of the N links in the above page is rendered into the security level information corresponding to each link. The corresponding level of security level is shown.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, which is not used herein.
  • the user terminal obtains the page source code from the site server, and the secure cloud server sends a script corresponding to the path information to the user terminal, where the script tag embedded in the page source code includes the path information;
  • the security cloud server receives, by the server, the security level information corresponding to the N links, the security cloud server sends the security level information corresponding to the N links to the user terminal, so that the user terminal invokes the foregoing
  • the script invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • FIG. 14 illustrates a structure of a site server 1400 according to an embodiment of the present invention.
  • the site server 1400 includes: at least one processor 1401, such as a CPU, at least one network interface 1404 or other user interface 1403, and a memory 1405, at least one communication.
  • Bus 1402. Communication bus 1402 is used to implement connection communication between these components.
  • the site server 1400 optionally includes a user interface 1403, including a display, a keyboard, or a pointing device (eg, a mouse, a trackball, a touchpad, or a touch sensitive display).
  • Memory 1405 may include high speed RAM memory and may also include non-volatile memory, such as at least one disk memory.
  • the memory 1405 can optionally include at least one storage device located remotely from the aforementioned processor 1401.
  • memory 1405 stores the following elements, executable modules or data structures, or a subset thereof, or their extension set:
  • the operating system 14051 which contains various system programs for implementing various basic services and handling hardware-based tasks;
  • the application module 14052 includes various applications for implementing various application services.
  • the application module 14052 includes, but is not limited to, a first transmitting unit 1110, a script obtaining unit 1120, a second transmitting unit 1130, a receiving unit 1140, and a third transmitting unit 1150.
  • each module in the application module 14052 refers to the corresponding module in the embodiment shown in FIG. 11, and details are not described herein.
  • the processor 1401 may be configured to send a page source code to the user terminal; based on the path information included in the script tag embedded in the page source code, from the second security
  • the cloud server obtains a corresponding script; sends the script to the user terminal; receives the N links included in the page source code sent by the user terminal by using the script; and sends the N links to the first secure cloud server, and receives the After the security level information corresponding to the N links of the first secure cloud server, the security level information corresponding to the N links is sent to the user terminal, so that the user terminal receives the N links corresponding to the script.
  • N is a natural number greater than or equal to 1.
  • the processor 1401 obtains the corresponding script from the second secure cloud server based on the path information included in the script tag embedded in the page source code, and may include: receiving the sending by the user terminal. After the path information included in the script tag embedded in the page source code, the corresponding script is obtained from the second secure cloud server based on the path information included in the script tag embedded in the page source code; or, may be from the above page After obtaining the path information in the script tag embedded in the source code, the corresponding script is obtained from the second secure cloud server based on the path information.
  • the above-mentioned script invokes the access control packet of the N links based on the security level described by the security level information corresponding to the N links. Included: in the page corresponding to the source code of the above page, the display effect of the display content of each of the N links in the above page is rendered into the security level information corresponding to each link. The corresponding level of security level is shown.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, which is not used herein.
  • the user terminal obtains a script corresponding to the page source code and the path information from the site server, where the script tag embedded in the page source code includes the path information; and the site server receives the script sent by the user terminal.
  • the above page source code includes N links; the site server sends the N links to the first secure cloud server, and after receiving the security level information corresponding to the N links from the first secure cloud server, the user is sent to the user The terminal sends the security level information corresponding to the N links, to After the user terminal is instructed to receive the security level information corresponding to the N links, the user terminal invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, where The first secure cloud server and the second secure cloud server are the same or different.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which helps to eliminate the crisis caused by the failure of anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • the embodiment of the present invention further provides a mobile communication terminal 1500, wherein the mobile communication terminal 1500 can be used to implement some or all of the functions of the user terminal in the foregoing embodiment.
  • the mobile communication terminal 1500 can be used to implement some or all of the functions of the user terminal in the foregoing embodiment.
  • FIG. 15 for convenience of explanation, only some parts that may be related to the embodiments of the present invention are shown. For some of the specific technical details, the method part of the embodiment of the present invention is referred to.
  • the mobile communication terminal 1500 includes a radio frequency (RF) circuit 1510, a memory 1520, an input unit 1530, a wireless fidelity (WiFi) module 1570, a display unit 1540, a sensor 1550, an audio circuit 1560, and processing.
  • RF radio frequency
  • WiFi wireless fidelity
  • Device 1580 and power supply 1590 and other components.
  • the structure of the mobile communication terminal 1500 shown in FIG. 15 does not constitute a limitation on the mobile phone, and may include more or less components than those illustrated, or combine some components, or different. Assembly of parts.
  • the RF circuit 1510 can be used for receiving and transmitting signals during transmission and reception of information or during a call. Specifically, after the downlink information of the base station is received, it is processed by the processor 1580; in addition, the designed uplink data is transmitted to the base station.
  • the RF circuit may include, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 1510 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and Code Division Multiple Access (Code Division). Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), Short Messaging Service (SMS), e-mail, etc.
  • GSM Global System of Mobile communication
  • the memory 1520 can be used to store software programs and modules.
  • the processor 1580 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1520.
  • the memory 1520 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • the memory 1520 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1530 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile communication terminal 1500.
  • the input unit 1530 may include a touch panel 1531 and other input devices 1532.
  • the touch panel 1531 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1531 or near the touch panel 1531. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1531 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1580 is provided and can receive commands from the processor 1580 and execute them.
  • the touch panel 1531 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1530 may also include other input devices 1532.
  • other input devices 1532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1540 can be used to display information input by the user or information provided to the user and various menus of the mobile phone.
  • the display unit 1540 may include a display panel 1541.
  • the display panel 1541 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1531 can cover the display panel 1541. After the touch panel 1531 detects a touch operation on or near the touch panel 1531, the touch panel 1531 transmits to the processor 1580 to determine the type of the touch event, and then the processor 1580 according to the touch event. The type provides a corresponding visual output on display panel 1541.
  • touch panel 1531 and the display panel 1541 are used as two independent components to implement the input and input functions of the mobile phone in FIG. 15, in some embodiments, the touch panel 1531 and the display panel 1541 may be integrated. Realize the input and output functions of the phone.
  • the mobile communication terminal 1500 may further include at least one type of sensor 1550, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1541 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1541 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the acceleration of all directions (usually three axes), and the magnitude and square of gravity can be detected at rest.
  • applications that can be used to identify the gesture of a mobile phone such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as well as gyroscopes and barometers that can be configured on mobile phones
  • Other sensors such as hygrometers, thermometers, and infrared sensors are not described here.
  • An audio circuit 1560, a speaker 1561, and a microphone 1562 provide an audio interface between the user and the handset.
  • the audio circuit 1560 can transmit the converted electrical data of the received audio data to the speaker 1561, and convert it into a sound signal output by the speaker 1561.
  • the microphone 1562 converts the collected sound signal into an electrical signal, and the audio circuit 1560. After receiving, it is converted into audio data, and then processed by the audio data output processor 1580, sent to the other mobile phone via the RF circuit 1510, or the audio data is output to the memory 1520 for further processing.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone through the WiFi module 1570 can help users to send and receive e-mail, browse web pages and access streaming media, etc. It provides users with wireless broadband Internet access.
  • FIG. 15 shows the WiFi module 1570, it can be understood that it does not belong to the essential configuration of the mobile communication terminal 1500, and can be omitted as needed within the scope of not changing the essence of the invention.
  • the processor 1580 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1520, and by invoking data stored in the memory 1520.
  • the processor 1580 may include one or more processing units.
  • the processor 1580 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications.
  • the mobile communication terminal 1500 also includes a power source 1590 (such as a battery) that supplies power to various components.
  • the power source can be logically connected to the processor 1580 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile communication terminal 1500 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • the processor 1580 is configured to obtain the page source code from the site server, and obtain a script corresponding to the path information, where the script tag embedded in the page source code includes the path information; and the script is invoked to send the foregoing to the first secure cloud server.
  • the above N links perform access control.
  • the page source code may be, for example, a news page or a posting page of a discuz forum or a page source code of other pages.
  • the path information included in the script tag embedded in the page source code points to a script stored in the second secure cloud server, that is, the path of the script is described by the path information included in the script tag embedded in the page source code. path.
  • the path information mentioned in the embodiments of the present invention may be a URL or other information for describing a path.
  • the obtaining, by the processor 1580, the script corresponding to the path information may include: obtaining a script corresponding to the path information from the second secure cloud server based on the path information (eg, the processor 1580 may be in a cross-domain communication manner, based on The path information is obtained from the second secure cloud server, and the processor 1580 may send the path information to the site server to instruct the site server to obtain the path information corresponding to the path information from the second secure cloud server based on the path information.
  • the site server forwards the script corresponding to the path information to the mobile communication terminal 1500); or the processor 1580 receives a script corresponding to the path information sent by the site server, where the site server is based on the path information
  • the second secure cloud server obtains a script corresponding to the path information.
  • the processor 1580 can also obtain the script corresponding to the path information stored in the second secure cloud server by using other methods.
  • the first secure cloud server and the second secure cloud server are the same or different.
  • the processor 1580 invoking the script to send the N links included in the page source code to the first secure cloud server may include: calling the script to send the page source code to the site server. N links, and send the N links included in the above page source code to the first secure cloud server through the above site server.
  • the processor 1580 invoking the script to send the N links included in the page source code to the first secure cloud server may include: calling the script to cross-domain communication mode (first secure cloud)
  • the server and mobile communication terminal 1500 are typically in different domains) send the N links included in the above page source code to the first secure cloud server.
  • the N source links sent by the mobile communication terminal include N links to the first secure cloud server without the above-mentioned site server.
  • the first secure cloud server may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also be in real time.
  • the security of the N links is checked, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first security cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the processor 1580 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the effect of displaying the displayed content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect of the security level described by the security level information corresponding to each of the links.
  • the processor 1580 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the processor 1580 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the processor 1580 invokes the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, including: a page corresponding to the page source code of the displayed page.
  • the mobile communication terminal can also access the above-mentioned N links by using the above-mentioned script to call the above-mentioned script based on the security level described by the security level information corresponding to the above N links, and no longer, for example.
  • the mobile communication terminal invokes the public library used by the script to invoke the closed call method; or the script is a javascript script, where the javascript script is registered as a prototype member to the corresponding javascript.
  • the extension object can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict. For example, the javascript script does not have the concept of java package or c++. The concept of the namespace is c#.
  • the javascript script can be registered as a prototype member to the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not match the function in the original page. Variables and the like conflict with each other. Or, because the script may need to call the third-party library, and may also conflict with some naming manners of the page source code, in the embodiment of the present invention, the above script is invoked (eg, The public library used by the javascript script is called in the form of a closure call. Thus, all code logic inside the closure can still use the variables declared by the original library without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the mobile communication terminal obtains the page source code from the site server, and the mobile communication terminal acquires the script corresponding to the path information, where the script tag embedded in the page source code includes the path information; a secure cloud server sends the N links included in the source code of the page; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the script is invoked based on the security level corresponding to the N links.
  • the security level described in the information controls access to the above N links.
  • the script Since the mobile communication terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the call is made.
  • the script controls access to the N links based on the security level described by the security level information corresponding to the N links. Based on the mechanism, the mobile communication terminal can implement the malicious link included in the protection page source code without installing the anti-virus software in advance.
  • the source code is a correspondence, and the pertinence and reliability are strong, which is beneficial to further enhance the flexibility and reliability of the mobile communication terminal for malicious link defense.
  • an embodiment of the present invention further provides a communication system, which may include: a user terminal 1610, a site server 1620, and a first secure cloud server 1630.
  • the site server 1620 is configured to send a page source code to the user terminal 1610.
  • the user terminal 1610 is configured to obtain the page source code from the site server 1620.
  • the script corresponding to the path information is obtained, and the script tag embedded in the page source code includes The above road
  • the above-mentioned script is sent to the first secure cloud server 1630 to send the N links included in the page source code; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server 1630, and the script is invoked.
  • the access control is performed on the N links based on the security level described by the security level information corresponding to the N links.
  • N is a natural number greater than or equal to 1.
  • the site server 1620 is configured to: send the script to the user terminal 1610; receive the N links included in the page source code sent by the user terminal 1610 by using the script; send the N links to the first secure cloud server 1630, and After receiving the security level information corresponding to the N links from the first secure cloud server, sending the security level information corresponding to the N links to the user terminal, so that the user terminal receives the N links by calling the script.
  • the above-mentioned script is invoked to perform access control on the N links based on the security level described by the security level information corresponding to the N links, where the first secure cloud server and the second secure cloud server are the same or different. .
  • the path information included in the script tag embedded in the page source code points to a script stored in the second secure cloud server, that is, the path of the script is described by the path information included in the script tag embedded in the page source code. path.
  • the path information mentioned in the embodiments of the present invention may be a URL or other information for describing a path.
  • the obtaining, by the user terminal 1610, the script corresponding to the path information may include: obtaining a script corresponding to the path information from the second secure cloud server based on the path information (eg, the user terminal 1610 may be in a cross-domain communication manner, based on the path.
  • the information is obtained from the second secure cloud server, and the user terminal 1610 may send the path information to the site server to instruct the site server 1620 to obtain the path information corresponding to the path information from the second secure cloud server based on the path information.
  • the site server 1620 forwards the script corresponding to the path information to the user terminal 1610); or the user terminal 1610 receives the above The script corresponding to the path information sent by the site server, wherein the site server 1620 obtains the script corresponding to the path information from the second secure cloud server based on the path information.
  • the user terminal may obtain the script corresponding to the path information stored in the second secure cloud server by using other methods.
  • the first secure cloud server 1630 may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server may also The security of the N links is checked in real time, and the corresponding security level information of the N links is determined according to the security of the checked N links.
  • the manner in which the first secure cloud server determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also use the other method to invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • the user terminal 1610 invokes the public library used by the script to invoke the closed call method; or the script is a javascript script, where the javascript script is registered as a prototype member to the corresponding javascript.
  • the extension object can also be scripts in other formats. Understandably, since the script will be embedded in the source code of the web server of different site servers, there may be situations where the script and the internal logic of the site server conflict. For example, the javascript script does not have the concept of a java package, or c++. The concept of the namespace is c#.
  • the javascript script can be registered as a prototype member to the extended object of the corresponding javascript, which is beneficial to ensure that the loaded javascript script does not match the function in the original page.
  • Variables and the like conflict with each other. Or, because the script may need to call the third-party library, and may also conflict with some naming manners of the page source code, in the embodiment of the present invention, all the code logic that calls the above script in the closure can still be declared by using the original library. Variables, without affecting the logic outside the closure. The above processing methods can better solve the conflict problem after the introduction of the script.
  • the user terminal 1610 of this embodiment may be used to implement some or all of the functions of any one of the foregoing user terminals.
  • the site server 1620 of the embodiment may be used to implement some or all of the functions of any one of the foregoing site servers.
  • the first secure cloud server 1630 can be used to implement some or all of the functions of any of the secure cloud servers described above.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the above page.
  • the source code includes N links; the script is invoked to receive the security level information corresponding to the N links from the first secure cloud server, and the above script is invoked based on the security level described by the security level information corresponding to the N links. N links for access control. Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • an embodiment of the present invention further provides a communication system, which may include: a site server 1710, a first secure cloud server 1720, and a second secure cloud server 1730.
  • the site server 1710 is configured to send a page source code to the user terminal, and send the page source code to the user terminal.
  • the corresponding script is obtained from the second secure cloud server 1730 based on the path information included in the script tag embedded in the page source code. Sending the script to the user terminal; receiving, by the user terminal, the N links included in the page source code sent by the script; sending the N links to the first secure cloud server 1720, and receiving the first secure cloud server After the security level information corresponding to the N links of the 1720, the security level information corresponding to the N links is sent to the user terminal, so that after the user terminal invokes the script to receive the security level information corresponding to the N links, Calling the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, where the first secure cloud server 1720 is the same as or different from the second secure cloud server 1730.
  • the path information included in the script tag embedded in the page source code points to a script stored in the second secure cloud server, that is, the path of the script is described by the path information included in the script tag embedded in the page source code. path.
  • the path information mentioned in the embodiments of the present invention may be a URL or other information for describing a path.
  • the user terminal is configured to obtain the foregoing page source code from the site server 1710.
  • the script corresponding to the path information is obtained, where the script tag embedded in the page source code includes the path information; and the script is invoked to send the foregoing to the first secure cloud server 1730.
  • the obtaining, by the user terminal, the script corresponding to the path information may include: obtaining, by the user terminal, the script corresponding to the path information from the second secure cloud server 1730 based on the path information (eg, the user terminal may cross-domain communication manner, based on the path The information is obtained from the second secure cloud server 1730.
  • the user terminal may send the path information to the site server 1710 to instruct the site server 1710 to obtain the path information from the second secure cloud server 1730 based on the path information.
  • the site server 1710 forwards the script corresponding to the path information to the user terminal); or the user terminal receives the script corresponding to the path information sent by the site server 1710, wherein the site server 1710 is based on the path information from the second security
  • the cloud server obtains a script corresponding to the path information.
  • the user terminal may obtain the script corresponding to the path information stored in the second secure cloud server 1730 by using other methods.
  • the first secure cloud server 1720 may query the link security record in the secure cloud database, and determine corresponding security level information of the N links according to the query result; or the first secure cloud server 1720 also Check the security of N links in real time In essence, the corresponding security level information of the N links is determined according to the security of the detected N links.
  • the manner in which the first security cloud server 1720 determines the corresponding security level information of the N links is various, and details are not described herein again.
  • the accessing the above-mentioned script to access the N links based on the security level described by the security level information corresponding to the N links includes: displaying, in the page corresponding to the page source code of the page, The display effect of the display content of each of the above N links in the above-mentioned page is rendered into a corresponding display effect corresponding to the security level described by the security level information corresponding to each link.
  • the invoking the script to perform access control on the N links based on the security level described by the security level information corresponding to the N links including: a page corresponding to the source code of the page displayed And displaying a corresponding risk prompt of the security level described by the security level information corresponding to the first link when the mouse is hovering to the display position of the display content of the first link among the N links.
  • the invoking the above-mentioned script to perform access control on the N links based on the security level described by the security level information corresponding to the N links includes: displaying a page corresponding to the page source code of the foregoing page When the user selects the display content of the second link among the N links, if the security level described by the security level information corresponding to the second link meets the set blocked access condition, access to the second link is blocked.
  • the user terminal may also invoke the above script to perform access control on the N links based on the security level described by the security level information corresponding to the N links, which is not used herein.
  • the user terminal obtains the page source code from the site server, and the user terminal acquires a script corresponding to the path information, where the script tag embedded in the page source code includes the path information;
  • the cloud server sends the N links included in the source code of the above page; the script is invoked to receive the first secure cloud server.
  • the security level information corresponding to the N links is described, and the above script is invoked to perform access control on the N links based on the security level described by the security level information corresponding to the N links.
  • the script Since the user terminal is a script corresponding to the path information in the page source code and the page source code, the script is called to request the first secure cloud server to determine the security level of the N links included in the source code of the page, and the script is invoked.
  • the access control of the N links is performed based on the security level described by the security level information corresponding to the N links.
  • the user terminal can implement the malicious link included in the source code of the protection page without pre-installing the anti-virus software. It is beneficial to improve the defense ability, which is beneficial to eliminate the risk caused by the failure of the anti-virus software in the user terminal, which greatly enhances the flexibility and reliability of the user terminal for malicious link defense; and between the script and the page source code. Corresponding relationship helps to further enhance the flexibility and reliability of the user terminal against malicious link defense.
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium can store a program, and the program includes some or all of the steps of the page access control method described in the foregoing method embodiment.
  • the disclosed apparatus may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division, and the actual implementation may have another
  • the manner of division, such as multiple units or components, may be combined or integrated into another system, or some features may be omitted or not performed.
  • the mutual coupling or direct connection or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be electrical or otherwise.
  • the components displayed as the unit may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un procédé de contrôle d'accès à une page. Le procédé comporte les étapes consistant à : acquérir, par un terminal utilisateur, un code source de page d'un serveur de station ; à partir d'informations de chemin contenues dans une étiquette de script intégrée dans le code source de page, acquérir un script correspondant aux informations de chemin ; appeler le script pour envoyer N liens contenus dans le code source de page à un premier serveur de sécurité en nuage ; appeler le script pour recevoir des informations de niveau de sécurité correspondant aux N liens à partir du premier serveur de sécurité en nuage ; et appeler le script pour effectuer un contrôle d'accès sur les N liens en fonction des niveaux de sécurité décrits par les informations de niveau de sécurité correspondant aux N liens, N étant un nombre entier naturel qui est supérieur ou égal à 1.
PCT/CN2014/083842 2013-10-31 2014-08-07 Procédé, dispositif et système de contrôle d'accès à une page WO2015062326A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310557723.7 2013-10-31
CN201310557723.7A CN103532988A (zh) 2013-10-31 2013-10-31 页面访问控制方法和相关装置及系统

Publications (1)

Publication Number Publication Date
WO2015062326A1 true WO2015062326A1 (fr) 2015-05-07

Family

ID=49934667

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/083842 WO2015062326A1 (fr) 2013-10-31 2014-08-07 Procédé, dispositif et système de contrôle d'accès à une page

Country Status (2)

Country Link
CN (1) CN103532988A (fr)
WO (1) WO2015062326A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532988A (zh) * 2013-10-31 2014-01-22 腾讯科技(深圳)有限公司 页面访问控制方法和相关装置及系统
CN105787750A (zh) * 2014-12-25 2016-07-20 杭州迪普科技有限公司 信息推送方法及装置
CN108416214A (zh) * 2018-03-16 2018-08-17 北京奇虎科技有限公司 网页挖矿防护方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656710A (zh) * 2008-08-21 2010-02-24 中联绿盟信息技术(北京)有限公司 主动审计系统及方法
CN102467633A (zh) * 2010-11-19 2012-05-23 奇智软件(北京)有限公司 一种安全浏览网页的方法及其系统
CN102651856A (zh) * 2011-02-23 2012-08-29 腾讯科技(深圳)有限公司 一种提高终端上网安全性的方法、系统和装置
CN103532988A (zh) * 2013-10-31 2014-01-22 腾讯科技(深圳)有限公司 页面访问控制方法和相关装置及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546576B (zh) * 2010-12-31 2015-11-18 北京启明星辰信息技术股份有限公司 一种网页挂马检测和防护方法、系统及相应代码提取方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656710A (zh) * 2008-08-21 2010-02-24 中联绿盟信息技术(北京)有限公司 主动审计系统及方法
CN102467633A (zh) * 2010-11-19 2012-05-23 奇智软件(北京)有限公司 一种安全浏览网页的方法及其系统
CN102651856A (zh) * 2011-02-23 2012-08-29 腾讯科技(深圳)有限公司 一种提高终端上网安全性的方法、系统和装置
CN103532988A (zh) * 2013-10-31 2014-01-22 腾讯科技(深圳)有限公司 页面访问控制方法和相关装置及系统

Also Published As

Publication number Publication date
CN103532988A (zh) 2014-01-22

Similar Documents

Publication Publication Date Title
WO2018219076A1 (fr) Procédé de traitement permettant d'empêcher un détournement de page web, client et serveur
US20160241589A1 (en) Method and apparatus for identifying malicious website
WO2019184053A1 (fr) Procédé et terminal de parcours d'une page d'une application
CN110198301B (zh) 一种服务数据获取方法、装置及设备
US9754113B2 (en) Method, apparatus, terminal and media for detecting document object model-based cross-site scripting attack vulnerability
WO2015158300A1 (fr) Procédés et terminaux de génération et de lecture de code à barres 2d et serveurs
WO2014180123A1 (fr) Procédé de protection d'accès contre des adresses web malveillantes et appareil s'y rapportant
CN109905380B (zh) 一种分布式系统中的节点控制方法和相关装置
CN110224920B (zh) 一种分享方法及终端设备
CN110336805B (zh) 网络访问管理方法和移动终端
US11063962B2 (en) Malicious URL detection method and apparatus, terminal, and computer storage medium
WO2014000652A1 (fr) Terminal, dispositif et procédé d'installation d'un module complémentaire de navigateur
WO2016192511A1 (fr) Procédé et appareil permettant de supprimer à distance des informations
US10298590B2 (en) Application-based service providing method, apparatus, and system
CN109271779A (zh) 一种安装包检测方法、终端设备及服务器
WO2015062234A1 (fr) Procédé, dispositif et appareil de traitement de ressource de terminal mobile
EP2869229B1 (fr) Méthode, appareil et équipement pour installer une application
WO2015062326A1 (fr) Procédé, dispositif et système de contrôle d'accès à une page
CN106203015A (zh) 应用程序的配置方法、装置及终端设备
CN111209031B (zh) 一种数据获取方法、装置、终端设备及存储介质
WO2015062241A1 (fr) Procédé, dispositif et terminal de protection d'un programme d'application
CN108737341B (zh) 业务处理方法、终端及服务器
CN105791253B (zh) 一种获取网站的认证信息的方法和装置
CN104700031B (zh) 防止应用操作中远程代码被执行的方法、装置及系统
WO2019084783A1 (fr) Appareil et procédé de planification de services, dispositif informatique et support de stockage lisible par ordinateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14857989

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27.09.2016)

122 Ep: pct application non-entry in european phase

Ref document number: 14857989

Country of ref document: EP

Kind code of ref document: A1