WO2018032573A1 - 数据处理方法、装置、服务器及终端 - Google Patents

数据处理方法、装置、服务器及终端 Download PDF

Info

Publication number
WO2018032573A1
WO2018032573A1 PCT/CN2016/099755 CN2016099755W WO2018032573A1 WO 2018032573 A1 WO2018032573 A1 WO 2018032573A1 CN 2016099755 W CN2016099755 W CN 2016099755W WO 2018032573 A1 WO2018032573 A1 WO 2018032573A1
Authority
WO
WIPO (PCT)
Prior art keywords
download
data
terminal
link
server
Prior art date
Application number
PCT/CN2016/099755
Other languages
English (en)
French (fr)
Inventor
王超
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018032573A1 publication Critical patent/WO2018032573A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • the present invention relates to the field of communications, and in particular to a data processing method, apparatus, server, and terminal.
  • the status of terminals for example, mobile terminals: mobile phones, tablets, etc.
  • Users can download the required data through the browser, such as: applications, games, and so on.
  • the application of the terminal carries more and more user data.
  • the application may be maliciously tampered with during the process of downloading and installing, which brings a great risk to the user.
  • the download request is generally submitted through the terminal.
  • the DNS server parses the domain name address of the download request and associates it with the IP address, thereby obtaining an exact download address. Since some operators (for example, mobile operators) may provide applications and game promotion services with other service providers, the user's download address is falsified in the process of DNS server resolution, thereby realizing that the user wants to download the downloaded address.
  • the data is replaced with the promoted data. For example, the user downloads the official version of the online banking through the browser, and after the address is resolved by the operator's DNS server, the address is changed, and the downloaded application becomes an unofficial online banking provided by another service provider.
  • the embodiment of the invention provides a data processing method, device, server and terminal, To solve at least the problem that the download link is tampered with in the related art, causing the terminal to have a security risk.
  • a data processing method including: receiving a download link sent by a terminal, and first verification data corresponding to the first download data downloaded by the terminal according to the download link; Determining, by the terminal, the download link that is sent by the terminal, downloading the second download data; determining whether the second check data corresponding to the second download data is the same as the first check data; and if the determination result is yes, Sending, by the terminal, a first response message indicating that the download link has not been tampered with; and/or, if the determination result is no, sending, to the terminal, a second, indicating that the download link is tampered with Response message.
  • the downloading the second download data according to the download link sent by the terminal if the first download data is part of content of the download content corresponding to the download link, receiving the The size information and/or location information sent by the terminal for identifying the size of the partial content; and downloading the second download data according to the size information and/or the location information.
  • the first check data includes at least one of the following: first download data, and encrypted information obtained by encrypting the first download data.
  • a data processing method including: downloading first download data by using a download link; and sending the download link and the first check data corresponding to the first download data to a server, wherein the download link is used by the server to download second download data according to the download link, and the first check data is used by the server to determine second check data corresponding to the second download data. Whether it is the same as the first verification data; determining whether the download link has been tampered with according to the judgment result returned by the server.
  • the sending the download link and the first verification data corresponding to the first download data to the server include: the first download data is a download content corresponding to the download link
  • the download link and the first check data corresponding to the first download data are sent to the server, where the first check data includes a part for identifying the part Size information size and/or Location information, the size information and/or location information is used by the server to download the second download data.
  • the first check data includes at least one of the following: first download data, and encrypted information obtained by encrypting the first download data.
  • a data processing apparatus including: a receiving module, configured to receive a download link sent by a terminal, and a first corresponding to the first download data downloaded by the terminal according to the download link
  • the first downloading module is configured to download the second download data according to the download link sent by the terminal
  • the determining module is configured to determine the second check data corresponding to the second download data and the Whether the first verification data is the same
  • the first sending module is configured to send, to the terminal, a first response message indicating that the download link has not been tampered with, if the determination result is yes; and/or If the determination result is no, a second response message indicating that the download link has been tampered with is sent to the terminal.
  • the first downloading module includes: a receiving unit, configured to receive, when the first download data is part of content of the downloaded content corresponding to the download link, The size information and/or the location information of the partial content size; the downloading unit is configured to download the second download data according to the size information and/or the location information.
  • a server comprising the apparatus of any of the preceding items.
  • a data processing apparatus including: a second downloading module configured to download first download data through a download link; a second sending module configured to connect the download link, and Transmitting, by the download link, the first verification data corresponding to the first download data to the server, where the download link is used by the server to download second download data according to the download link, where the first check data is used by the server Determining whether the second verification data corresponding to the second download data is the same as the first verification data; and the determining module is configured to determine, according to the determination result returned by the server, whether the download link is tampered with.
  • the second sending module includes: a sending unit, configured to: when the first download data is part of content of the download content corresponding to the download link, the download link, and the The first verification data corresponding to the download data is sent to the server, where the first verification data includes size information and/or location information for identifying the size of the partial content, the size information and / or location information for the server to download the second download data.
  • a sending unit configured to: when the first download data is part of content of the download content corresponding to the download link, the download link, and the The first verification data corresponding to the download data is sent to the server, where the first verification data includes size information and/or location information for identifying the size of the partial content, the size information and / or location information for the server to download the second download data.
  • a terminal comprising the apparatus of any of the preceding items.
  • a storage medium is also provided.
  • the storage medium is configured to store program code for performing the following steps: receiving a download link sent by the terminal, and first verification data corresponding to the first download data downloaded by the terminal according to the download link; sending according to the terminal Downloading the second download data; determining whether the second verification data corresponding to the second download data is the same as the first verification data; and if the determination result is yes, the terminal is Transmitting a first response message for indicating that the download link has not been tampered with; and/or, if the determination result is no, transmitting a second response message for indicating that the download link has been tampered with.
  • the storage medium is further configured to store program code for performing the following steps: downloading the second download data according to the download link sent by the terminal, comprising: downloading, in the first download data, the downloading When the partial content of the corresponding downloaded content is linked, the size information and/or the location information sent by the terminal for identifying the size of the partial content is received; and the content is downloaded according to the size information and/or the location information. Second download data.
  • the storage medium is further configured to store program code for performing the following steps: the first verification data comprises at least one of: first download data, encryption obtained after encrypting the first download data information.
  • a storage medium is also provided.
  • the storage medium is configured to store program code for performing the following steps: downloading the first download data through a download link, and transmitting the download link and the first check data corresponding to the first download data to a server, where The download link is used by the server according to the next And downloading, by the link, the second download data, where the first check data is used by the server to determine whether the second check data corresponding to the second download data is the same as the first check data; As a result of the determination, it is determined whether the download link has been tampered with.
  • the storage medium is further configured to store program code for performing the following steps: transmitting the download link, and the first verification data corresponding to the first download data to the server, including: When the first download data is part of the content of the download content corresponding to the download link, the download link and the first check data corresponding to the first download data are sent to the server, where The first verification data includes size information and/or location information for identifying the size of the partial content, and the size information and/or location information is used by the server to download the second download data.
  • the storage medium is further configured to store program code for performing the following steps: the first verification data comprises at least one of: first download data, encryption obtained after encrypting the first download data information.
  • the terminal sends the first verification data corresponding to the first download data downloaded by the download link to the server, and the first verification data is corresponding to the second download data corresponding to the download of the download link by the server.
  • the second verification data is compared to determine whether the download link has been tampered with.
  • the security factor of the server (especially the carrier server, for example, the mobile operator server, the Unicom carrier server, etc.) is high, the data downloaded by the terminal is judged according to the data downloaded by the server, and it is determined whether the download link has been tampered with, thereby avoiding Due to the risk caused by the tampering of the download link, it is possible to solve the problem that the download link is falsified and the terminal has a security risk in the related art, thereby achieving the effect of ensuring the security of the terminal data.
  • the server especially the carrier server, for example, the mobile operator server, the Unicom carrier server, etc.
  • FIG. 1 is a block diagram showing the hardware structure of an operator server of a data processing method according to an embodiment of the present invention
  • FIG. 2 is a flowchart 1 of a data processing method according to an embodiment of the present invention.
  • FIG. 3 is a block diagram showing the hardware structure of a terminal of a data processing method according to an embodiment of the present invention.
  • FIG. 4 is a second flowchart of a data processing method according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a data processing apparatus according to a preferred embodiment of the present invention.
  • FIG. 6 is a flow chart of a data processing method in accordance with a preferred embodiment of the present invention.
  • FIG. 7 is a structural block diagram 1 of a data processing apparatus according to an embodiment of the present invention.
  • FIG. 8 is a structural block diagram of a first downloading module 74 of the data processing apparatus according to an embodiment of the present invention.
  • FIG. 9 is a structural block diagram 2 of a data processing apparatus according to an embodiment of the present invention.
  • FIG. 10 is a structural block diagram of a second transmitting module 94 of a data processing apparatus according to an embodiment of the present invention.
  • FIG. 11 is a structural block diagram of a server according to an embodiment of the present invention.
  • FIG. 12 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • FIG. 1 is a hardware structural block diagram of a carrier server of a data processing method according to an embodiment of the present invention.
  • the operator server 1 may include one or more (only one shown in the figure) a processor 12 (the first processor 12 may include, but is not limited to, a processing device such as a micro first processor MCU or a programmable logic device FPGA), a first memory 14 for storing data, and a communication function A transmission device 16.
  • the structure shown in FIG. 1 is merely illustrative and does not limit the structure of the above electronic device.
  • the operator server 1 may also include more or less components than those shown in FIG. 1, or have a different configuration than that shown in FIG.
  • the first memory 14 can be used to store software programs and modules of the application software, such as program instructions/modules corresponding to the data processing method in the embodiment of the present invention, and the first processor 12 runs the software program stored in the first memory 14 and The module, thus performing various functional applications and data processing, implements the above method.
  • the first memory 14 can include a high speed random access memory and can also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • the first memory 14 can further include memory remotely located relative to the first processor 12, which can be connected to the carrier server 1 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the first transmission device 16 is arranged to receive or transmit data via a network.
  • the above-described network specific example may include a wireless network provided by a communication provider of the operator server 1.
  • the first transmission device 16 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the first transmission device 16 can be a Radio Frequency (RF) module for communicating with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 2 is a flowchart 1 of a data processing method according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 receiving a download link sent by the terminal, and first verification data corresponding to the first download data downloaded by the terminal according to the download link;
  • Step S204 downloading the second download data according to the download link sent by the terminal
  • Step S206 determining whether the second verification data corresponding to the second download data is the same as the first verification data
  • Step S208 if the determination result is yes, send a first response message indicating that the download link has not been tampered with to the terminal; and/or, if the determination result is no, send the terminal to indicate the download link.
  • the second response message that was tampered with.
  • the data downloaded by the terminal through the download link is judged to determine whether the download link has been tampered with, and the problem that the download link is tampered with the security risk of the terminal in the related technology is solved, and the problem is ensured. Terminal data security.
  • the second download data may be downloaded according to the download link sent by the terminal in multiple manners.
  • the download content corresponding to the download link may be directly downloaded according to the download link, and for example, at the first
  • the downloading data is part of the content of the downloading content corresponding to the downloading link
  • the size information and/or the location information sent by the terminal for identifying the partial content size may be received; and the second download is downloaded according to the size information and/or the location information. data.
  • the method of downloading part of the content can reduce the amount of data that needs to be transmitted in the network and improve the data transmission efficiency.
  • the size information and/or the location information sent by the terminal for identifying the partial content size is received;
  • the size information and/or the above location information download the second download data, which reduces the amount of data that needs to be transmitted in the network, and improves the data transmission efficiency.
  • the first verification data may be in multiple forms, for example, may be the first download data, and may be, for example, encrypted information obtained by encrypting the first download data.
  • the first verification data is in the form of encrypted information encrypted by the first download data, which reduces the amount of data that needs to be transmitted in the network, and improves the security of data transmission.
  • the first verification data is in the form of encrypted information after the first download data is encrypted, and the data that needs to be transmitted in the network is reduced. Quantity, while improving the security of data transmission.
  • FIG. 3 is a hardware structural block diagram of a terminal of a data processing method according to an embodiment of the present invention.
  • the terminal 3 may include one or more (only one shown in the figure) second processor 32 (the processor 32 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. ) a second memory 34 for storing data, and a second transmission device 36 for communication functions.
  • the transport terminal 3 may also include more or less components than those shown in FIG. 3, or have a different configuration than that shown in FIG.
  • the second memory 34 may be configured as a software program and a module for storing application software, such as program instructions/modules corresponding to the data processing method in the embodiment of the present invention, and the second processor 32 runs the software program stored in the second memory 34. And the module, thereby performing various functional applications and data processing, that is, implementing the above method.
  • the second memory 34 can include a high speed random access memory and can also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • the second memory 34 can further include memory remotely located relative to the second processor 32, which can be connected to the terminal 3 via a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the second transmission device 36 is arranged to receive or transmit data via a network.
  • the above specific network example may include a wireless network provided by a communication provider of the terminal 3.
  • the second transmission device 36 includes a Network Interface Controller (NIC) that can be connected to other network devices through the base station to communicate with the Internet.
  • the second transmission device 36 can be a Radio Frequency (RF) module for communicating with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 4 is a second flowchart of a data processing method according to an embodiment of the present invention. As shown in FIG. 4, the process includes the following steps:
  • Step S402 downloading the first download data by using a download link
  • Step S404 the download link and the first verification data corresponding to the first download data are sent to the server, wherein the download link is used by the server to download the second download data according to the download link, and the first check data is used by the server to determine the second Whether the second verification data corresponding to the download data is the same as the first verification data;
  • Step S406 determining whether the download link has been tampered with according to the judgment result returned by the operator server.
  • the data downloaded by the terminal through the download link is judged to determine whether the download link has been tampered with, and the problem that the download link is tampered with the security risk of the terminal in the related technology is solved, and the problem is ensured. Terminal data security.
  • the first check data sent by the terminal to the server may include: the download content corresponding to the download link
  • the size information and/or location information of the partial content size, the size information and/or the location information is used by the server to download the second download data. Relative to the way to download the entire content.
  • the first check data sent by the terminal to the server includes: the download content corresponding to the download link.
  • the first verification data may be in multiple forms, for example, may be the first download data, and may be, for example, encrypted information obtained by encrypting the first download data.
  • the first verification data is in the form of encrypted information encrypted by the first download data, which reduces the amount of data that needs to be transmitted in the network, and improves the security of data transmission.
  • the first verification data is in the form of encrypted information after the first download data is encrypted, which reduces the amount of data that needs to be transmitted in the network, and improves the security of data transmission.
  • a data processing method is provided that can operate in a data processing apparatus as described in FIG.
  • the device includes: a monitoring module 52, a verification module 54, and a processing module 56.
  • the device will be described below.
  • the monitoring module 52 is configured to monitor the data downloading process of the hypertext transfer protocol (HTTP) of the mobile terminal, and set the file format such as apk and exe to a file format that needs to be verified.
  • HTTP hypertext transfer protocol
  • the format of the currently downloaded file is obtained by analyzing the suffix of the downloaded file or the mime type. If the downloaded file format needs to be verified, the MD5 value of the downloaded partial data content is calculated, and the part of the data is calculated.
  • the verification module is sent by the MD5 value, the download link, and the location and size of the part of the data. Usually, the front part of the downloaded data is taken, so that when the download hijacking occurs, the user is promptly reminded to end the download process to save traffic.
  • the monitoring module 52 sends the MD5 value of the downloaded first 8K data to the verification module 54, so that the verification module 54 can only download the first 8K data because the random download mode is not adopted.
  • the MD5 values are compared to determine whether they are consistent. Generally, the size of the downloaded content should not be too small or too large. If it is too large, the verification module 54 needs to consume too much traffic. If it is too small, the MD5 value may coincide when the download hijacking occurs. Taking the first piece of data from the beginning of the download simplifies the entire download process.
  • the verification module 54 is configured to, after receiving the data pushed by the monitoring module 52, download the data of the same position and size using the pushed link, and calculate the MD5 value of the downloaded partial data. Then, the MD5 value calculated by the verification module 54 and the MD5 value sent by the monitoring module 52 to the verification module 54 are compared. If the MD5 values are inconsistent, there is download hijacking, and the verification module 54 sends a message to the processing module 56 to notify the processing. Module 56 has a download hijack.
  • the verification module 54 receives the partial data content, the link, and the location and size of the pushed download data of the monitoring module 52, and then performs data verification.
  • data verification use the push download link to download the data of the same position and size as the data pushed by the monitor module, calculate the MD5 value of the part of the data, and then compare the MD5 values. If they are inconsistent, it can be judged that download hijacking has occurred.
  • the processing module 56 is configured to perform corresponding intervention on the download process of the mobile terminal after determining that the download is hijacked, and the intervention manner includes, but is not limited to, using a prompt box, a prompt, and the like to remind the user that the current download has a hijacking risk and switch to HTTPS. Ways to download data, stop the download process directly, and more.
  • the above-mentioned monitoring module 52 and processing module 56 may be located in the terminal, and the verification module 54 may employ a remote data server, such as a low-risk, downloaded hijacked carrier ISP room server.
  • a remote data server such as a low-risk, downloaded hijacked carrier ISP room server.
  • FIG. 6 is a flow chart of a data processing method in accordance with a preferred embodiment of the present invention. As shown in Figure 6, the process includes the following steps:
  • Step S602 the listening module listens to the HTTP download process and obtains the format of the downloaded data.
  • the listening module 52 monitors the HTTP data downloading process of the mobile terminal, and when the downloading process starts, the format of the currently downloaded file is learned by analyzing the suffix of the downloaded file or the mime type.
  • the data package contains mime type information, and the mime type can be used to obtain the format of the currently downloaded file.
  • step S604 the monitoring module determines whether the current format needs to be verified.
  • the listening module 52 determines whether the currently downloaded file format needs to be verified. For example, you can set the apk, exe, and so-so formats in the mobile terminal to be verified. Setting to the specified file format requires verification, which not only avoids the waste of resources for verifying the less important format, but also saves data traffic.
  • the specified file format can be stored in the mobile terminal in the form of xml. When verification is required, the process proceeds to step S606.
  • Step 606 The monitoring module pushes the MD5 value, the link, and the position and size of the partial data of the downloaded data to the verification module.
  • the listening module 52 uses the partial data content of the downloaded data as the check content, and calculates the MD5 value of the partial data content. Thereafter, the MD5 value of the partial data content, the download link, and the position and size of the partial data are pushed to the verification module 54.
  • the first 6 Kbytes of downloaded data is defined as parity data, and the 6K data is calculated.
  • MD5 value, first check the first 6K bytes of data, the location and size of the data is easier to determine, and because of the comparison in the form of MD5 values, the data content to be transmitted is also less.
  • step S608 the verification module downloads data of the same position and size and calculates an MD5 value.
  • the verification module 54 receives the MD5 value, the link, and the location and size of the data content after the listening module 52 pushes the data, and then downloads the data of the same size and location using the received link. After downloading the data of the same size and position, calculate the MD5 value of the part of the data.
  • Step S610 the verification module compares whether the MD5 value of the downloaded data and the MD5 value of the monitoring module push data are consistent.
  • the verification module 54 compares whether the MD5 value of the downloaded partial data is consistent with the MD5 value of the data content pushed by the monitoring module 52. If not, there is a possibility of downloading hijacking, and the process proceeds to step S612.
  • Step S612 the verification module notifies the processing module that a download hijacking occurs.
  • the verification module 54 pushes a message to the processing module 56 to notify the processing module 56 that there is a download hijack during the download of the data.
  • Step S614 the processing module performs corresponding processing on the downloading process.
  • the processing module 56 processes the downloading process, and the processing manner includes, but is not limited to, prompting the user to download the hijacked or switching to HTTPS in the manner of a prompt box or a prompt.
  • the data processing method of the preferred embodiment implements the judgment of the download hijacking by comparing the MD5 value of the partial data downloaded by the browser, and compares only the MD5 value of the partial data by the server, for example, by comparing the MD5 of the downloaded first 8K data.
  • the value is used to determine whether the data has been tampered with, and the data can be compared and the cost is relatively low.
  • the data processing method of the preferred embodiment has strong applicability, and can not only remind the user in the case of DNS hijacking, but also can be hijacked in the data channel of the mobile terminal. Under the reminder.
  • the data processing method of the preferred embodiment can completely adopt the software method, and can be used not only in the browser but also in the bottom layer of the mobile terminal.
  • the data downloading part of the framework layer can be used.
  • the method monitors the mime type of the downloaded data. When the mime type of the downloaded data belongs to a format that needs to be verified, it is verified. If tampering occurs, a prompt box is given by the framework layer, indicating that the downloaded content may be tampered with.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic).
  • the disc, the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • a data device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 7 is a structural block diagram 1 of a data processing apparatus according to an embodiment of the present invention. As shown in FIG. 7, the apparatus (acting with the foregoing verification module 54) includes:
  • the receiving module 72 is configured to receive a download link sent by the terminal, and first verification data corresponding to the first download data that is downloaded by the terminal according to the download link;
  • the first downloading module 74 is connected to the receiving module 72, and is configured to download the second downloading data according to the download link sent by the terminal;
  • the determining module 76 is connected to the first downloading module 74, and is configured to determine whether the second verification data corresponding to the second download data is the same as the first verification data.
  • the first sending module 78 is connected to the determining module 76, and is configured to send, to the terminal, a first response message for indicating that the download link has not been tampered with, if the determination result is yes; and/or, if the determination result is no In the case, a second response message indicating that the download link has been tampered with is sent to the terminal.
  • FIG. 8 is a structural block diagram of a first downloading module 74 of the data processing apparatus according to an embodiment of the present invention. As shown in FIG. 8, the first downloading module 74 includes:
  • the receiving unit 82 is configured to: when the first download data is part of the content of the download content corresponding to the download link, receive size information and/or location information sent by the terminal for identifying a partial content size;
  • the download unit 84 is connected to the receiving unit 82 and configured to download the second download data according to the size information and/or the location information.
  • the first verification data includes at least one of the following: the first download data, and the encrypted information obtained by encrypting the first download data.
  • FIG. 9 is a block diagram showing the structure of a data processing apparatus according to an embodiment of the present invention. As shown in FIG. 9, the apparatus (acting with the foregoing monitoring module 52) includes:
  • the second downloading module 92 is configured to download the first download data by using a download link
  • the second sending module 94 is connected to the second downloading module 92, and is configured to send the download link and the first check data corresponding to the first download data to the server, where the download link is used by the server to download the second according to the download link. Downloading data, the first verification data is used by the server to determine whether the second verification data corresponding to the second download data is the same as the first verification data;
  • the determining module 96 is connected to the second sending module 94, and is configured to determine whether the download link has been tampered with according to the judgment result returned by the server.
  • FIG. 10 is a structural block diagram of a second sending module 94 of a data processing apparatus according to an embodiment of the present invention. As shown in FIG. 10, the second sending module 94 includes:
  • the sending unit 102 is configured to: when the first download data is part of the downloaded content corresponding to the download link, the download link and the first corresponding to the first download data
  • the verification data is sent to the server, wherein the first verification data includes size information and/or location information for identifying a partial content size, and the size information and/or the location information is used by the server to download the second download data.
  • FIG. 11 is a structural block diagram of a server according to an embodiment of the present invention. As shown in FIG. 11, the server includes the first data processing device 112 of FIG. 7 or FIG.
  • FIG. 12 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • the server includes the second data processing device 122 of FIG. 9 or FIG. 10 described above.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
  • the forms are located in different processors.
  • a data device is also provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 9 is a block diagram showing the structure of a data processing apparatus according to an embodiment of the present invention. As shown in FIG. 9, the apparatus (acting with the foregoing monitoring module 52) includes:
  • the second downloading module 92 is configured to download the first download data by using a download link
  • the second sending module 94 is connected to the second downloading module 92, and is configured to send the download link and the first check data corresponding to the first download data to the server, where the download link is used by the server to download the second according to the download link. Downloading data, the first verification data is used by the server to determine whether the second verification data corresponding to the second download data is the same as the first verification data;
  • the determining module 96 is connected to the second sending module 94, and is set to be based on the server.
  • the returned judgment result determines whether the download link has been tampered with.
  • FIG. 10 is a structural block diagram of a second sending module 94 of a data processing apparatus according to an embodiment of the present invention. As shown in FIG. 10, the second sending module 94 includes:
  • the sending unit 102 is configured to send the download link and the first verification data corresponding to the first download data to the server, where the first download data is the partial content of the download content corresponding to the download link, where the first school
  • the test data includes size information and/or location information for identifying a portion of the content size, and the size information and/or location information is used by the server to download the second download data.
  • the first verification data includes at least one of the following: the first download data, and the encrypted information obtained by encrypting the first download data.
  • FIG. 11 is a structural block diagram of a server according to an embodiment of the present invention. As shown in FIG. 11, the server includes the first data processing device 112 of FIG. 7 or FIG.
  • FIG. 12 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • the server includes the second data processing device 122 of FIG. 9 or FIG. 10 described above.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
  • the forms are located in different processors.
  • FIG. 11 is a structural block diagram of a server according to an embodiment of the present invention. As shown in FIG. 11, the server includes the first data processing device 112 of FIG. 7 or FIG.
  • FIG. 12 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • the server includes the foregoing FIG. 9 or FIG. Two data processing devices 122.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the storage medium is further arranged to store program code for performing the following steps:
  • downloading the second download data includes:
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor executes, according to the stored program code in the storage medium, the download link sent by the receiving terminal, and the first check data corresponding to the first download data that is downloaded by the terminal according to the download link; a download link sent by the terminal, downloading the second download data; determining second check data corresponding to the second download data and the first check data Whether the same is the same; if the judgment result is yes, the first response message for indicating that the download link has not been tampered with is sent to the terminal; and/or, if the determination result is no, the terminal is sent to indicate the download link The second response message that was tampered with.
  • the processor is executed according to the stored program code in the storage medium: downloading the second download data according to the download link sent by the terminal, where the first download data is the download content corresponding to the download link.
  • the size information and/or location information sent by the terminal for identifying the partial content size is received; and the second download data is downloaded according to the size information and/or the location information.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the download link and the first verification data corresponding to the first download data are sent to the server, where the download link is used by the server to download the second download data according to the download link, and the first check data is used by the server to determine the second download. Whether the second verification data corresponding to the data is the same as the first verification data;
  • the storage medium is further arranged to store program code for performing the following steps:
  • Sending the download link and the first verification data corresponding to the first download data to the server includes:
  • the download link and the first check data corresponding to the first download data are sent to the server, where the first check data includes The size information and/or location information of the partial content size, the size information and/or the location information are used by the server to download the second download data.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor executes, according to the stored program code in the storage medium, downloading the first download data by using a download link, and sending the download link and the first check data corresponding to the first download data to a server, wherein the download link is used by the server to download the second download data according to the download link, where the first check data is used by the server to determine whether the second check data corresponding to the second download data is the same as the first check data; The result of the judgment determines whether the download link has been tampered with.
  • the processor is executed according to the stored program code in the storage medium: sending the download link and the first verification data corresponding to the first download data to the server, where: the first download data is And downloading the download link and the first check data corresponding to the first download data to the server, where the first check data includes size information for identifying a part of the content size. And/or location information, size information and/or location information for the server to download the second download data.
  • modules or steps of the embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed in multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
  • the above-mentioned embodiments and the preferred embodiments avoid the risk caused by the tampering of the download link. Therefore, the problem that the download link is falsified and the terminal has a security risk may be solved in the related art, thereby ensuring the security of the terminal data. Effect.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明提供了一种数据处理方法、装置、服务器及终端,其中,该方法包括:接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;根据所述终端发送的所述下载链接,下载第二下载数据;判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。通过本发明,解决了相关技术中存在下载链接被篡改导致终端存在安全风险的问题,达到了保证终端数据安全性的效果。

Description

数据处理方法、装置、服务器及终端 技术领域
本发明涉及通信领域,具体而言,涉及一种数据处理方法、装置、服务器及终端。
背景技术
随着互联网(例如,移动互联网)的发展和内容的增加,终端(例如,移动终端:手机、平板等)在生活中的地位越来越重要。用户可以通过浏览器下载所需要的数据,比如:应用程序、游戏等。目前,终端的应用程序承载了越来越多的用户数据,然而应用程序可能在下载、安装的过程中存在被恶意篡改的可能,这样给用户带来了较大的风险。
在终端通过浏览器下载应用程序时,一般都是通过终端提交下载请求,DNS服务器在接收到下载请求后,解析下载请求的域名地址,将其与IP地址进行对应,从而得到确切的下载地址。而由于某些运营商(例如,移动运营商)可能与其他服务商提供应用、游戏推广的业务,将用户的下载地址在DNS服务器解析的过程中,进行篡改,从而,实现将用户所要下载的数据替换为推广的数据。例如:用户通过浏览器下载官方版的网银,经过运营商的DNS服务器解析地址后,进行了地址的跳变,下载的应用变为其他服务商提供的非官方网银。一般而言,非官方版本的应用会被混淆进广告插件、病毒程序等。在此种情况下,用户下载的内容被篡改,用户可能安装存在安全风险的应用,给用户的数据安全带来风险。
因此,相关技术中存在下载链接被篡改导致终端存在安全风险的问题。
发明内容
本发明实施例提供了一种数据处理方法、装置、服务器及终端, 以至少解决相关技术中存在下载链接被篡改导致终端存在安全风险的问题。
根据本发明的一个实施例,提供了一种数据处理方法,包括:接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;根据所述终端发送的所述下载链接,下载第二下载数据;判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。
可选地,根据所述终端发送的所述下载链接,下载所述第二下载数据包括:在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,接收所述终端发送的用于标识所述部分内容大小的大小信息和/或位置信息;根据所述大小信息和/或所述位置信息下载所述第二下载数据。
可选地,所述第一校验数据包括以下至少之一:第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
根据本发明的另一个实施例,提供了一种数据处理方法,包括:通过下载链接下载第一下载数据;将所述下载链接,以及所述第一下载数据对应的第一校验数据发送给服务器,其中,所述下载链接用于所述服务器根据所述下载链接下载第二下载数据,所述第一校验数据用于所述服务器判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;根据所述服务器返回的判断结果,确定所述下载链接是否被篡改。
可选地,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器包括:在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器,其中,所述第一校验数据包括用于标识所述部分内容大小的大小信息和/或 位置信息,所述大小信息和/或位置信息用于所述服务器下载所述第二下载数据。
可选地,所述第一校验数据包括以下至少之一:第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
根据本发明的又一个实施例,提供了一种数据处理装置,包括:接收模块,设置为接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;第一下载模块,设置为根据所述终端发送的所述下载链接,下载第二下载数据;判断模块,设置为判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;第一发送模块,设置为在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。
可选地,所述第一下载模块包括:接收单元,设置为在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,接收所述终端发送的用于标识所述部分内容大小的大小信息和/或位置信息;下载单元,设置为根据所述大小信息和/或所述位置信息下载所述第二下载数据。
根据本发明的又一个实施例,提供了一种服务器,该服务器包括前述任一项中的装置。
根据本发明的又一个实施例,提供了一种数据处理装置,包括:第二下载模块,设置为通过下载链接下载第一下载数据;第二发送模块,设置为将所述下载链接,以及所述第一下载数据对应的第一校验数据发送给服务器,其中,所述下载链接用于所述服务器根据所述下载链接下载第二下载数据,所述第一校验数据用于所述服务器判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;确定模块,设置为根据所述服务器返回的判断结果,确定所述下载链接是否被篡改。
可选地,所述第二发送模块包括:发送单元,设置为在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器,其中,所述第一校验数据包括用于标识所述部分内容大小的大小信息和/或位置信息,所述大小信息和/或位置信息用于所述服务器下载所述第二下载数据。
根据本发明的又一个实施例,提供了一种终端,该终端包括前述任一项中的装置。
根据本发明的又一个实施例,还提供了一种存储介质。该存储介质设置为存储用于执行以下步骤的程序代码:接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;根据所述终端发送的所述下载链接,下载第二下载数据;判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:根据所述终端发送的所述下载链接,下载所述第二下载数据包括:在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,接收所述终端发送的用于标识所述部分内容大小的大小信息和/或位置信息;根据所述大小信息和/或所述位置信息下载所述第二下载数据。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:所述第一校验数据包括以下至少之一:第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
根据本发明的又一个实施例,还提供了一种存储介质。该存储介质设置为存储用于执行以下步骤的程序代码:通过下载链接下载第一下载数据;将所述下载链接,以及所述第一下载数据对应的第一校验数据发送给服务器,其中,所述下载链接用于所述服务器根据所述下 载链接下载第二下载数据,所述第一校验数据用于所述服务器判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;根据所述服务器返回的判断结果,确定所述下载链接是否被篡改。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器包括:在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器,其中,所述第一校验数据包括用于标识所述部分内容大小的大小信息和/或位置信息,所述大小信息和/或位置信息用于所述服务器下载所述第二下载数据。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:所述第一校验数据包括以下至少之一:第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
通过本发明实施例,终端将下载链接、根据下载链接下载的第一下载数据对应的第一校验数据发送给服务器,将第一校验数据与服务器根据下载链接下载对应的第二下载数据对应的第二校验数据进行比较,判断下载链接是否被篡改。由于服务器(尤其是运营商服务器,例如,移动运营商服务器、联通运营商服务器等)的安全系数较高,根据服务器下载的数据对终端下载的数据进行判断,确定下载链接是否被篡改,避免了由于下载链接被篡改导致的风险,因此,可以解决相关技术中存在下载链接被篡改导致终端存在安全风险的问题,达到保证终端数据安全性的效果。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是本发明实施例的一种数据处理方法的运营商服务器的硬件结构框图;
图2是根据本发明实施例的数据处理方法的流程图一;
图3是本发明实施例的一种数据处理方法的终端的硬件结构框图;
图4是根据本发明实施例的数据处理方法的流程图二;
图5是根据本发明优选实施例的数据处理装置的结构示意图;
图6是根据本发明优选实施例的数据处理方法的流程图;
图7是根据本发明实施例的数据处理装置的结构框图一;
图8是根据本发明实施例的数据处理装置的第一下载模块74的结构框图;
图9是根据本发明实施例的数据处理装置的结构框图二;
图10是根据本发明实施例的数据处理装置的第二发送模块94的结构框图;
图11是根据本发明实施例的服务器的结构框图;
图12是根据本发明实施例的终端的结构框图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
实施例1
本申请实施例1所提供的方法实施例可以在运营商服务器或者类似的运算装置中执行。以运行在运营商服务器上为例,图1是本发明实施例的一种数据处理方法的运营商服务器的硬件结构框图。如图1所示,运营商服务器1可以包括一个或多个(图中仅示出一个)第 一处理器12(第一处理器12可以包括但不限于微第一处理器MCU或可编程逻辑器件FPGA等的处理装置)、用于存储数据的第一存储器14、以及用于通信功能的第一传输装置16。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,运营商服务器1还可包括比图1中所示更多或者更少的组件,或者具有与图1所示不同的配置。
第一存储器14可用于存储应用软件的软件程序以及模块,如本发明实施例中的数据处理方法对应的程序指令/模块,第一处理器12通过运行存储在第一存储器14内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的方法。第一存储器14可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,第一存储器14可进一步包括相对于第一处理器12远程设置的存储器,这些远程存储器可以通过网络连接至运营商服务器1。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
第一传输装置16设置为经由一个网络接收或者发送数据。上述的网络具体实例可包括运营商服务器1的通信供应商提供的无线网络。在一个实例中,第一传输装置16包括一个网络适配器(Network Interface Controller,NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,第一传输装置16可以为射频(Radio Frequency,RF)模块,其用于通过无线方式与互联网进行通讯。
在本实施例中提供了一种运行于运营商服务器的数据处理方法,图2是根据本发明实施例的数据处理方法的流程图一,如图2所示,该流程包括如下步骤:
步骤S202,接收终端发送的下载链接,以及终端根据下载链接下载的第一下载数据对应的第一校验数据;
步骤S204,根据终端发送的下载链接,下载第二下载数据;
步骤S206,判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
步骤S208,在判断结果为是的情况下,向终端发送用于指示下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向终端发送用于指示下载链接被篡改的第二响应消息。
通过上述步骤,根据服务器通过下载链接下载的数据对终端通过下载链接下载的数据进行判断,确定下载链接是否被篡改,解决了相关技术中存在下载链接被篡改导致终端存在安全风险的问题,保证了终端数据的安全性。
可选地,在步骤S204中,可以采用多种方式根据终端发送的下载链接,下载第二下载数据,例如,可以直接根据下载链接,下载该下载链接对应的下载内容,又例如,在第一下载数据为下载链接对应的下载内容的部分内容的情况下,可以接收终端发送的用于标识部分内容大小的大小信息和/或位置信息;根据上述大小信息和/或上述位置信息下载第二下载数据。相对于下载全部内容的方式,下载部分内容的方式可以减少需要在网络中传输的数据量,提高数据的传输效率。
通过本发明实施例的上述技术方案,在第一下载数据为下载链接对应的下载内容的部分内容的情况下,接收终端发送的用于标识部分内容大小的大小信息和/或位置信息;根据上述大小信息和/或上述位置信息下载第二下载数据,减少了需要在网络中传输的数据量,提高了数据的传输效率。
可选地,第一校验数据可以为多种形式,例如,可以为第一下载数据,又例如,还可以为对第一下载数据进行加密后获得的加密信息。第一校验数据为第一下载数据进行加密后的加密信息的形式,减少了需要在网络中传输的数据量,同时提高了数据传输的安全性。
通过本发明实施例的上述技术方案,第一校验数据为第一下载数据进行加密后的加密信息的形式,减少了需要在网络中传输的数据 量,同时提高了数据传输的安全性。
本申请实施例1所提供的方法实施例还可以在终端或者类似的运算装置中执行。以运行在终端上为例,图3是本发明实施例的一种数据处理方法的终端的硬件结构框图。如图3所示,终端3可以包括一个或多个(图中仅示出一个)第二处理器32(处理器32可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)、用于存储数据的第二存储器34、以及用于通信功能的第二传输装置36。本领域普通技术人员可以理解,图3所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,运终端3还可包括比图3中所示更多或者更少的组件,或者具有与图3所示不同的配置。
第二存储器34可设置为存储应用软件的软件程序以及模块,如本发明实施例中的数据处理方法对应的程序指令/模块,第二处理器32通过运行存储在第二存储器34内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的方法。第二存储器34可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,第二存储器34可进一步包括相对于第二处理器32远程设置的存储器,这些远程存储器可以通过网络连接至终端3。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
第二传输装置36设置为经由一个网络接收或者发送数据。上述的网络具体实例可包括终端3的通信供应商提供的无线网络。在一个实例中,第二传输装置36包括一个网络适配器(Network Interface Controller,NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,第二传输装置36可以为射频(Radio Frequency,RF)模块,其用于通过无线方式与互联网进行通讯。
在本实施例中提供了一种运行于终端的数据处理方法,图4是根据本发明实施例的数据处理方法的流程图二,如图4所示,该流程包括如下步骤:
步骤S402,通过下载链接下载第一下载数据;
步骤S404,将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,下载链接用于服务器根据下载链接下载第二下载数据,第一校验数据用于服务器判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
步骤S406,根据运营商服务器返回的判断结果,确定下载链接是否被篡改。
通过上述步骤,根据服务器通过下载链接下载的数据对终端通过下载链接下载的数据进行判断,确定下载链接是否被篡改,解决了相关技术中存在下载链接被篡改导致终端存在安全风险的问题,保证了终端数据的安全性。
可选地,在步骤S404中,在第一下载数据为下载链接对应的下载内容的部分内容的情况下,终端向服务器发送的第一校验数据可以包括:用于标识下载链接对应的下载内容的部分内容大小的大小信息和/或位置信息,上述大小信息和/或位置信息用于服务器下载第二下载数据。相对于下载全部内容的方式。
通过本发明实施例的上述技术方案,在第一下载数据为下载链接对应的下载内容的部分内容的情况下,终端向服务器发送的第一校验数据包括:用于标识下载链接对应的下载内容的部分内容大小的大小信息和/或位置信息,减少了需要在网络中传输的数据量,提高了数据的传输效率。
可选地,第一校验数据可以为多种形式,例如,可以为第一下载数据,又例如,还可以为对第一下载数据进行加密后获得的加密信息。第一校验数据为第一下载数据进行加密后的加密信息的形式,减少了需要在网络中传输的数据量,提高了数据传输的安全性。
通过本发明实施例的上述技术方案,第一校验数据为第一下载数据进行加密后的加密信息的形式,减少了需要在网络中传输的数据量,提高了数据传输的安全性。
基于上述实施例及可选实施方式,为说明方案的整个流程交互, 在本优选实施例中,提供了一种数据处理方法,该数据处理方法可以运行于如图5所述的数据处理装置中。如图5所示,该装置包括:监听模块52,校验模块54,处理模块56。下面对该装置进行说明。
监听模块52,设置为监听移动终端的超文本传输协议(Hypertext Transfer Protocol,简称为HTTP)数据下载流程,可以将apk、exe等文件格式设置为需要进行校验的文件格式。当下载流程开始时,通过分析下载文件的后缀或mime type获知当前下载的文件的格式,如果下载的文件格式需要进行校验,则计算下载的部分数据内容的MD5值,并将该部分数据的MD5值、下载链接以及该部分数据的位置以及大小等发送校验模块。通常情况下,取下载数据的前段,以便于当发生下载劫持时,及时提醒用户结束下载流程以节省流量。
例如:监听模块52在下载流程开始后,将下载的前8K数据的MD5值发送给校验模块54,这样,由于不是采用随机下载的模式,校验模块54可以只需要下载前8K的数据的MD5值进行比较,即可判断是否一致。通常,下载内容的大小一般不宜过小亦不宜过大,过大则在校验模块54需要消耗过多的流量,过小则可能在出现下载劫持时,出现MD5值偶然一致的情况,而采用取下载最开始的前段数据则可以简化整个下载流程。
校验模块54,设置为接收到监听模块52推送的数据后,使用推送的链接下载同样位置和大小的数据,并计算下载后的部分数据的MD5值。之后将校验模块54计算所得的MD5值和监听模块52推送给校验模块54的MD5值进行比较,如果MD5值不一致,则存在下载劫持,校验模块54向处理模块56发送消息,通知处理模块56发生了下载劫持。
校验模块54接收到监听模块52的推送的下载数据的部分数据内容、链接以及该部分数据的位置以及大小后,进行数据校验。进行数据校验时,使用推送的下载链接下载与监听模块推送的数据相同位置和大小的数据,计算该部分数据的MD5值后,再将MD5值进行比较。如果不一致,则可判断发生了下载劫持。
处理模块56,设置为在判断为下载劫持后,对移动终端下载流程进行相应的干预,干预的方式包括但不仅限于使用提示框、提示语等形式提醒用户当前的下载存在劫持风险、切换到HTTPS的方式下载数据、直接停止下载流程等。
上述监听模块52和处理模块56可以位于终端中,校验模块54可以采用远程的数据服务器,例如:低风险的被下载劫持的运营商ISP机房服务器。
图6是根据本发明优选实施例的数据处理方法的流程图。如图6所示,该流程包括以下步骤:
步骤S602,监听模块监听HTTP下载流程,获取下载数据的格式。
监听模块52监听到移动终端的HTTP数据下载流程,当下载流程开始时,通过分析下载文件的后缀或mime type获悉当前下载的文件的格式。通常,在HTTP下载时,数据包中带有mime type信息,通过mime type即可获取当前下载文件的格式。
步骤S604,监听模块判断当前格式是否需要进行校验。
监听模块52判断当前下载的文件格式是否需要进行校验。例如:可以在移动终端中设置apk、exe、so等格式需要进行校验。设置为指定的文件格式需要校验,不仅可以避免对重要性较低的格式进行校验对资源的浪费,亦可以节约数据流量。指定文件格式可以以xml的形式在移动终端中进行存储。当需要进行校验时,则进入步骤S606。
步骤606,监听模块将下载的数据的部分数据内容的MD5值、链接以及该部分数据的位置以及大小等推送给校验模块。
监听模块52使用下载的数据的部分数据内容作为校验内容,计算该部分数据内容的MD5值。之后,将该部分数据内容的MD5值、下载链接以及该部分数据的位置以及大小等推送给校验模块54。例如:将下载的首6K字节的数据定义为校验数据,计算该6K数据的 MD5值,首先对首6K字节数据进行校验,数据的位置和大小较易确定,并且由于以MD5值的形式进行比较,所需要传输的数据内容也较少。
步骤S608,校验模块下载相同位置和大小的数据并计算MD5值。
校验模块54接收监听模块52推送数据内容的MD5值、链接以及该数据内容的位置以及大小后,使用接收到的链接下载相同大小和位置的数据。在下载完相同大小和位置的数据后,计算该部分数据的MD5值。
步骤S610,校验模块比较下载的数据的MD5值和监听模块推送数据的MD5值是否一致。
校验模块54比较其下载的部分数据的MD5值是否与监听模块52推送的数据内容的MD5值是否一致,如果不一致,则存在下载劫持的可能,进入步骤S612。
步骤S612,校验模块通知处理模块发生下载劫持。
检验模块54向处理模块56推送消息,通知处理模块56此次下载数据过程中存在下载劫持。
步骤S614,处理模块对下载流程进行相应的处理。
处理模块56对下载流程进行处理,处理的方式包括但不仅限于以提示框、提示语的方式提醒用户此次下载被劫持或切换到HTTPS的方式进行下载等。
本优选实施例的数据处理方法通过比较浏览器下载的部分数据的MD5值实现对下载劫持的判断,只在服务器对部分数据的MD5值进行比较,例如:可以通过比较下载的前8K数据的MD5值来判断数据是否已经被篡改,可以对较少的数据进行比较,在成本上较为低廉。
本优选实施例的数据处理方法适用性强,不仅可以在DNS劫持的情况下对用户进行提醒,亦可以在移动终端数据通道被劫持的情况 下进行提醒。本优选实施例的数据处理方法可以完全采用软件的方法,不仅可以使用在浏览器上,亦可以在移动终端的底层使用,例如:在android智能手机上,可以在框架层的数据下载部分使用本方法,监听下载数据的mime type,当所下载数据的mime type属于需要校验的格式时,对其进行校验,如果出现篡改,则由框架层给出提示框,提示下载的内容可能发生篡改。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
实施例2
在本实施例中还提供了一种数据装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图7是根据本发明实施例的数据处理装置的结构框图一,如图7所示,该装置(作用同前述校验模块54)包括:
接收模块72,设置为接收终端发送的下载链接,以及终端根据下载链接下载的第一下载数据对应的第一校验数据;
第一下载模块74,与上述接收模块72相连,设置为根据终端发送的下载链接,下载第二下载数据;
判断模块76,与上述第一下载模块74相连,设置为判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
第一发送模块78,与上述判断模块76相连,设置为在判断结果为是的情况下,向终端发送用于指示下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向终端发送用于指示下载链接被篡改的第二响应消息。
图8是根据本发明实施例的数据处理装置的第一下载模块74的结构框图,如图8所示,第一下载模块74包括:
接收单元82,设置为在第一下载数据为下载链接对应的下载内容的部分内容的情况下,接收终端发送的用于标识部分内容大小的大小信息和/或位置信息;
下载单元84,与上述接收单元82相连,设置为根据大小信息和/或位置信息下载第二下载数据。
可选地,上述第一校验数据包括以下至少之一:第一下载数据,对第一下载数据进行加密后获得的加密信息。
图9是根据本发明实施例的数据处理装置的结构框图二,如图9所示,该装置(作用同前述监听模块52)包括:
第二下载模块92,设置为通过下载链接下载第一下载数据;
第二发送模块94,与上述第二下载模块92相连,设置为将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,下载链接用于服务器根据下载链接下载第二下载数据,第一校验数据用于服务器判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
确定模块96,与上述第二发送模块94相连,设置为根据服务器返回的判断结果,确定下载链接是否被篡改。
图10是根据本发明实施例的数据处理装置的第二发送模块94的结构框图,如图10所示,该第二发送模块94包括:
发送单元102,设置为在第一下载数据为下载链接对应的下载内容的部分内容的情况下,将下载链接,以及第一下载数据对应的第一 校验数据发送给服务器,其中,第一校验数据包括用于标识部分内容大小的大小信息和/或位置信息,大小信息和/或位置信息用于服务器下载第二下载数据。
在本实施例中还提供了一种服务器,图11是根据本发明实施例的服务器的结构框图,如图11所示,该服务器包括上述图7或图6的第一数据处理装置112。
在本实施例中还提供了一种终端,图12是根据本发明实施例的终端的结构框图,如图12所示,该服务器包括上述图9或图10的第二数据处理装置122。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
实施例3
在本实施例中还提供了一种数据装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图9是根据本发明实施例的数据处理装置的结构框图二,如图9所示,该装置(作用同前述监听模块52)包括:
第二下载模块92,设置为通过下载链接下载第一下载数据;
第二发送模块94,与上述第二下载模块92相连,设置为将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,下载链接用于服务器根据下载链接下载第二下载数据,第一校验数据用于服务器判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
确定模块96,与上述第二发送模块94相连,设置为根据服务器 返回的判断结果,确定下载链接是否被篡改。
图10是根据本发明实施例的数据处理装置的第二发送模块94的结构框图,如图10所示,该第二发送模块94包括:
发送单元102,设置为在第一下载数据为下载链接对应的下载内容的部分内容的情况下,将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,第一校验数据包括用于标识部分内容大小的大小信息和/或位置信息,大小信息和/或位置信息用于服务器下载第二下载数据。
可选地,上述第一校验数据包括以下至少之一:第一下载数据,对第一下载数据进行加密后获得的加密信息。
在本实施例中还提供了一种服务器,图11是根据本发明实施例的服务器的结构框图,如图11所示,该服务器包括上述图7或图6的第一数据处理装置112。
在本实施例中还提供了一种终端,图12是根据本发明实施例的终端的结构框图,如图12所示,该服务器包括上述图9或图10的第二数据处理装置122。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
实施例4
在本实施例中还提供了一种服务器,图11是根据本发明实施例的服务器的结构框图,如图11所示,该服务器包括上述图7或图6的第一数据处理装置112。
实施例5
在本实施例中还提供了一种终端,图12是根据本发明实施例的终端的结构框图,如图12所示,该服务器包括上述图9或图10的第 二数据处理装置122。
实施例6
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,接收终端发送的下载链接,以及终端根据下载链接下载的第一下载数据对应的第一校验数据;
S2,根据终端发送的下载链接,下载第二下载数据;
S3,判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
S4,在判断结果为是的情况下,向终端发送用于指示下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向终端发送用于指示下载链接被篡改的第二响应消息。
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:
根据终端发送的下载链接,下载第二下载数据包括:
S1,在第一下载数据为下载链接对应的下载内容的部分内容的情况下,接收终端发送的用于标识部分内容大小的大小信息和/或位置信息;
S2,根据大小信息和/或位置信息下载第二下载数据。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:接收终端发送的下载链接,以及终端根据下载链接下载的第一下载数据对应的第一校验数据;根据终端发送的下载链接,下载第二下载数据;判断第二下载数据对应的第二校验数据与第一校验数据 是否相同;在判断结果为是的情况下,向终端发送用于指示下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向终端发送用于指示下载链接被篡改的第二响应消息。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:根据终端发送的下载链接,下载第二下载数据包括:在第一下载数据为下载链接对应的下载内容的部分内容的情况下,接收终端发送的用于标识部分内容大小的大小信息和/或位置信息;根据大小信息和/或位置信息下载第二下载数据。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
实施例7
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,通过下载链接下载第一下载数据;
S2,将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,下载链接用于服务器根据下载链接下载第二下载数据,第一校验数据用于服务器判断第二下载数据对应的第二校验数据与第一校验数据是否相同;
S3,根据服务器返回的判断结果,确定下载链接是否被篡改。
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:
将下载链接,以及第一下载数据对应的第一校验数据发送给服务器包括:
在第一下载数据为下载链接对应的下载内容的部分内容的情况下,将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,第一校验数据包括用于标识部分内容大小的大小信息和/或位置信息,大小信息和/或位置信息用于服务器下载第二下载数据。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:通过下载链接下载第一下载数据;将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,下载链接用于服务器根据下载链接下载第二下载数据,第一校验数据用于服务器判断第二下载数据对应的第二校验数据与第一校验数据是否相同;根据服务器返回的判断结果,确定下载链接是否被篡改。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:将下载链接,以及第一下载数据对应的第一校验数据发送给服务器包括:在第一下载数据为下载链接对应的下载内容的部分内容的情况下,将下载链接,以及第一下载数据对应的第一校验数据发送给服务器,其中,第一校验数据包括用于标识部分内容大小的大小信息和/或位置信息,大小信息和/或位置信息用于服务器下载第二下载数据。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本发明实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本 发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
如上所述,通过上述实施例及优选实施方式,避免了由于下载链接被篡改导致的风险,因此,可以解决相关技术中存在下载链接被篡改导致终端存在安全风险的问题,达到保证终端数据安全性的效果。

Claims (12)

  1. 一种数据处理方法,包括:
    接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;
    根据所述终端发送的所述下载链接,下载第二下载数据;
    判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;
    在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。
  2. 根据权利要求1所述的方法,其中,根据所述终端发送的所述下载链接,下载所述第二下载数据包括:
    在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,接收所述终端发送的用于标识所述部分内容大小的大小信息和/或位置信息;
    根据所述大小信息和/或所述位置信息下载所述第二下载数据。
  3. 根据权利要求1或2所述的方法,其中,所述第一校验数据包括以下至少之一:
    第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
  4. 一种数据处理方法,包括:
    通过下载链接下载第一下载数据;
    将所述下载链接,以及所述第一下载数据对应的第一校验数据发送给服务器,其中,所述下载链接用于所述服务器根据所述 下载链接下载第二下载数据,所述第一校验数据用于所述服务器判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;
    根据所述服务器返回的判断结果,确定所述下载链接是否被篡改。
  5. 根据权利要求4所述的方法,其中,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器包括:
    在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器,其中,所述第一校验数据包括用于标识所述部分内容大小的大小信息和/或位置信息,所述大小信息和/或位置信息用于所述服务器下载所述第二下载数据。
  6. 根据权利要求4或5所述的方法,其中,所述第一校验数据包括以下至少之一:
    第一下载数据,对所述第一下载数据进行加密后获得的加密信息。
  7. 一种数据处理装置,包括:
    接收模块,设置为接收终端发送的下载链接,以及所述终端根据所述下载链接下载的第一下载数据对应的第一校验数据;
    第一下载模块,设置为根据所述终端发送的所述下载链接,下载第二下载数据;
    判断模块,设置为判断所述第二下载数据对应的第二校验数 据与所述第一校验数据是否相同;
    第一发送模块,设置为在判断结果为是的情况下,向所述终端发送用于指示所述下载链接没有被篡改的第一响应消息;和/或,在判断结果为否的情况下,向所述终端发送用于指示所述下载链接被篡改的第二响应消息。
  8. 根据权利要求7所述的装置,其中,所述第一下载模块包括:
    接收单元,设置为在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,接收所述终端发送的用于标识所述部分内容大小的大小信息和/或位置信息;
    下载单元,设置为根据所述大小信息和/或所述位置信息下载所述第二下载数据。
  9. 一种服务器,包括权利要求7或8所述的装置。
  10. 一种数据处理装置,包括:
    第二下载模块,设置为通过下载链接下载第一下载数据;
    第二发送模块,设置为将所述下载链接,以及所述第一下载数据对应的第一校验数据发送给服务器,其中,所述下载链接用于所述服务器根据所述下载链接下载第二下载数据,所述第一校验数据用于所述服务器判断所述第二下载数据对应的第二校验数据与所述第一校验数据是否相同;
    确定模块,设置为根据所述服务器返回的判断结果,确定所述下载链接是否被篡改。
  11. 根据权利要求10所述的装置,其中,所述第二发送模 块包括:
    发送单元,设置为在所述第一下载数据为所述下载链接对应的下载内容的部分内容的情况下,将所述下载链接,以及所述第一下载数据对应的所述第一校验数据发送给所述服务器,其中,所述第一校验数据包括用于标识所述部分内容大小的大小信息和/或位置信息,所述大小信息和/或位置信息用于所述服务器下载所述第二下载数据。
  12. 一种终端,包括权利要求10或11所述的装置。
PCT/CN2016/099755 2016-08-18 2016-09-22 数据处理方法、装置、服务器及终端 WO2018032573A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610685575.0 2016-08-18
CN201610685575.0A CN107770213A (zh) 2016-08-18 2016-08-18 数据处理方法、装置、服务器及终端

Publications (1)

Publication Number Publication Date
WO2018032573A1 true WO2018032573A1 (zh) 2018-02-22

Family

ID=61196252

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/099755 WO2018032573A1 (zh) 2016-08-18 2016-09-22 数据处理方法、装置、服务器及终端

Country Status (2)

Country Link
CN (1) CN107770213A (zh)
WO (1) WO2018032573A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917555A (zh) * 2020-07-13 2020-11-10 上海明略人工智能(集团)有限公司 数据处理方法及装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889143B (zh) * 2018-09-07 2023-05-30 阿里巴巴集团控股有限公司 文件校验方法及装置
CN112163412B (zh) * 2020-09-30 2024-02-09 善恒展创(深圳)发展合伙企业(有限合伙) 数据校验方法、装置、电子设备及存储介质
CN113114740B (zh) * 2021-03-29 2023-05-26 深圳云里物里科技股份有限公司 一种网关的数据传输方法、装置、网关和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082784A (zh) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 一种软件在线升级方法
CN104205865A (zh) * 2012-03-29 2014-12-10 阿尔卡特朗讯公司 用于认证视频内容的方法和装置
CN105337975A (zh) * 2015-11-02 2016-02-17 汉柏科技有限公司 病毒扫描方法及系统
CN105516246A (zh) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 一种防应用程序下载劫持的方法及服务器

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102419808B (zh) * 2011-09-28 2015-07-01 奇智软件(北京)有限公司 一种下载链接安全性检测方法、装置及系统
CN104079673B (zh) * 2014-07-30 2018-12-07 北京奇虎科技有限公司 一种应用下载中防止dns劫持的方法、装置和系统
CN104735086B (zh) * 2015-04-14 2018-01-16 广东欧珀移动通信有限公司 一种文件的安全下载方法和装置
CN106060046A (zh) * 2016-05-30 2016-10-26 努比亚技术有限公司 一种防止下载劫持的装置、移动终端和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082784A (zh) * 2010-11-11 2011-06-01 广东欧珀电子工业有限公司 一种软件在线升级方法
CN104205865A (zh) * 2012-03-29 2014-12-10 阿尔卡特朗讯公司 用于认证视频内容的方法和装置
CN105337975A (zh) * 2015-11-02 2016-02-17 汉柏科技有限公司 病毒扫描方法及系统
CN105516246A (zh) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 一种防应用程序下载劫持的方法及服务器

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111917555A (zh) * 2020-07-13 2020-11-10 上海明略人工智能(集团)有限公司 数据处理方法及装置
CN111917555B (zh) * 2020-07-13 2024-03-15 上海明略人工智能(集团)有限公司 数据处理方法及装置

Also Published As

Publication number Publication date
CN107770213A (zh) 2018-03-06

Similar Documents

Publication Publication Date Title
US8649768B1 (en) Method of device authentication and application registration in a push communication framework
CN103037312B (zh) 消息推送方法及装置
US20060200658A1 (en) Agent framework for mobile devices
CN107211232B (zh) 轻量级机器对机器协议与装置管理协议的互工作
US10110538B2 (en) Method and apparatus for message transmission
US9906969B2 (en) Remote diagnostics for mobile devices
CA2700174C (en) Apparatus and methods for network identification of open market wireless devices
WO2018032573A1 (zh) 数据处理方法、装置、服务器及终端
WO2015078407A1 (zh) 终端间应用共享的方法和终端
WO2019128530A1 (zh) 语音播报方法、装置、系统以及智能播报设备
KR102391408B1 (ko) 장치 부트스트랩 방법, 단말, 및 서버
US20130191544A1 (en) Method and system to align network data access
CN105100021B (zh) 一种设备管理会话的触发方法、设备及系统
CN105103497A (zh) 应用业务配对
US20140123124A1 (en) Cloud-based firmware distribution service
WO2017071207A1 (zh) 一种应用安装方法、相关装置及应用安装系统
US20100298011A1 (en) Method and Appartus for Remote Software Installation and Execution on a Mobile Device
JP2013534377A (ja) 無線でのファームウェア配信技術に基づいてファームウェアを処理する方法、装置及びシステム
WO2013004059A1 (zh) 版本升级方法、终端及版本升级系统
US9992065B2 (en) Selective wi-fi calling router updates
WO2022142153A1 (zh) 电表升级方法、系统、智能电表及存储介质
WO2012022072A1 (zh) 终端操作的触发方法、装置及系统
JP6793667B2 (ja) アプリケーションダウンロード方法及び装置
CN116743839A (zh) 用于在通信系统中管理事件的方法和装置
CN105786511A (zh) 终端设备Web应用管理的实现方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16913328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16913328

Country of ref document: EP

Kind code of ref document: A1