WO2018040104A1 - 用于发送搜索请求的方法和装置 - Google Patents

用于发送搜索请求的方法和装置 Download PDF

Info

Publication number
WO2018040104A1
WO2018040104A1 PCT/CN2016/098114 CN2016098114W WO2018040104A1 WO 2018040104 A1 WO2018040104 A1 WO 2018040104A1 CN 2016098114 W CN2016098114 W CN 2016098114W WO 2018040104 A1 WO2018040104 A1 WO 2018040104A1
Authority
WO
WIPO (PCT)
Prior art keywords
search
search request
forged
time
request
Prior art date
Application number
PCT/CN2016/098114
Other languages
English (en)
French (fr)
Inventor
霍大伟
钱莉
蒋欣
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2016/098114 priority Critical patent/WO2018040104A1/zh
Priority to CN201680005833.4A priority patent/CN107223253B/zh
Publication of WO2018040104A1 publication Critical patent/WO2018040104A1/zh
Priority to US16/292,992 priority patent/US11080347B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9032Query formulation
    • G06F16/90332Natural language query formulation or dialogue systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9532Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9538Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Definitions

  • Embodiments of the present invention relate to the field of communications and, more particularly, to a method and apparatus for transmitting a search request.
  • the search engine server can record the user's search history content, and analyze the user's behavior habits and interest preferences through the data mining algorithm, thereby pushing relevant advertisement information to the user. From the user's point of view, in many cases, search terms are related to personal privacy. Users do not want their behavioral habits and interests to be mined by search engine servers and pushed to relevant harassment ads.
  • the user can set the search engine client to the privacy mode.
  • the search engine client enters the privacy mode
  • the search engine client does not record any search words input by the user.
  • the search term entered by the user is carried in the search request and sent to the search engine server, and the search engine server can record the user's input search term and analyze the user behavior and hobbies. That is to say, even if the user sets the privacy mode, the search engine server can analyze the user's behavior habits and interests according to the search words input by the user, thereby causing the user's private information to be leaked.
  • the purpose of the present application is to provide an improved method and apparatus for transmitting a search request to reduce the possibility that the search engine server analyzes user behavior habits and interest preferences according to search terms input by the user, thereby better protecting user privacy.
  • the present application provides a method for sending a search request, the method comprising: generating a forged search request in a process of running a search engine client, the fake search request carrying a forged search term;
  • the search engine server sends the forged search request.
  • the search engine server By sending a forged search request to the search engine server, the search engine server analyzes the interference factor of the user behavior according to the real search request, so as to prevent the search engine server from analyzing the user behavior according to the search term input by the user, thereby improving the user experience. Avoiding the prior art, the search engine server analyzes the user's behavior based on the search terms entered by the user.
  • the method further includes: receiving a search term input by a user; generating a real search request according to the search term input by the user, And sending the real search request to the search engine server; wherein a time difference between sending the forged search request and sending the real search request is within a predetermined interval.
  • the forgery search request is generated by the time period after the transmission of the real search request, so that the time at which the forgery search request is transmitted is near the time at which the real search request is transmitted So that sending a fake search request is closer to the user's act of sending a real search request.
  • the generating a forged search request during the running of the search engine client includes: determining to generate the Generating a generation delay of the search request; determining that the search engine client does not send the first search request during the first time period, the first search request is a forged search request or a real search request, the first The time period is a time period after the generation start time of the search engine client is the current time, and the generated time delay is generated; and the forged search request is generated at the end time of the first time period.
  • the fake search request is sent to the search engine server at the end time of the first time period, and the search engine server analyzes the user behavior according to the real search request.
  • the interference factor is to prevent the search engine server from analyzing user behavior based on the search terms entered by the user.
  • the sending the forged search request to the search engine server includes: The search engine server sends a second search request, the second search request is a forged search request or a real search request; the forged search request is sent to the search engine server at a second time, the first time and There is a time interval between the second times, and the second search request is a previous search request of the forged search request.
  • the time interval between the first two search requests is ensured by the time interval between the first time and the second time, so that the time for sending the forged search request is not sent and the previous search request is sent (the last search request can be It is the time overlap of the real search request or the fake search request), so that the sending of the fake search request is closer to the behavior of the user sending the real search request.
  • the time interval between the first time and the second time is determined by a Poisson process.
  • the time interval t is based on a probability density function Ok, among them, Estimating by maximum likelihood based on the time interval t i at which the real search request is sent OK, N indicates the number of times a real search request was sent.
  • the sending of the forged search request is closer to the behavior of the user transmitting the real search request.
  • the method further includes: receiving a search result sent by the search engine server, where the search result is The falsifying search request determines the search result; deleting the search result.
  • the search result is not presented to the user, so that the user does not receive a lot of irrelevant information, thereby improving the user experience.
  • the forged search term is a randomly determined search term.
  • the forged search term is a time-sensitive search selected from a search hot vocabulary of the search engine client word.
  • time-sensitive search words in the search hot list of search engine clients By selecting time-sensitive search words in the search hot list of search engine clients as forgery search words, the selection range of forged search words is wider and time-sensitive.
  • the difficulty of the search engine server in analyzing user behavior habits and interests is increased to prevent the search engine server from analyzing user behavior based on search terms input by the user.
  • the forged search term is a search term randomly determined from a search vocabulary, the search lexicon Regularly update from the network in a preset time period.
  • the wording is more diverse, increasing the difficulty of the search engine server in analyzing user behavior habits and interests, to prevent the search engine server from analyzing user behavior based on the search terms input by the user.
  • the application provides an apparatus for transmitting a search request, the apparatus comprising means for performing the method of the first aspect.
  • the present application provides an apparatus for transmitting a search request, the apparatus comprising: a memory, a processor, an input/output interface, a communication interface, and a bus system.
  • the memory, the processor, the input/output interface, and the communication interface are connected by a bus system for storing instructions for executing instructions stored by the memory, and when the instructions are executed, the processor passes The communication interface performs the method of the first aspect, and controls the input/output interface to receive input data and information, and output data such as an operation result.
  • the present application provides a computer readable storage medium for storing program code for transmitting a search request, the program code for executing the method instructions in the first aspect.
  • the search engine client may be a user interface of the search engine for receiving user input search content, displaying search results, providing a user relevance feedback mechanism, and the like.
  • FIG. 1 shows a schematic block diagram of a system architecture of a method for transmitting a search request in accordance with an embodiment of the present invention.
  • Fig. 2 is a schematic block diagram showing the hardware configuration of a mobile phone related to an embodiment of the present invention.
  • FIG. 3 shows a schematic flow diagram of a method for transmitting a search request in accordance with an implementation of the present invention.
  • FIG. 4 shows a schematic flow chart of a method of transmitting a forged search request according to an embodiment of the present invention.
  • FIG. 5 shows a schematic block diagram of an apparatus for transmitting a search request in accordance with an embodiment of the present invention.
  • FIG. 6 shows a schematic block diagram of an apparatus for transmitting a search request in accordance with an embodiment of the present invention.
  • the user equipment 110 shown in FIG. 1 includes a search engine client 120, a fake search engine client 130, and a communication interface 140.
  • the search engine client 120 and the forged search engine client 130 can transmit information to the search engine server 150 through the communication interface 140.
  • the search engine server 150 includes a searcher, an indexer, and a retriever.
  • the searcher is used to roam, discover and collect information in the Internet; the indexer is used to understand the information searched by the searcher, extracts the index item representation document, and generates an index table of the document library; the retriever is used in the index library according to the search request. Quickly check out the document, evaluate the relevance of the document to the search request, and sort the search results to be output by relevance.
  • the user equipment also referred to as a terminal device
  • FIG. 1 may include a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, and the like.
  • PDA Personal Digital Assistant
  • POS Point of Sales
  • the above-mentioned forged search engine client may be a plug-in of a system in the user equipment, or may be a program or an application running independently in the user equipment, and the user may be monitored by the forged search engine client for the operation of the search engine client.
  • the invention does not specifically limit the presentation form of the forgery search engine client.
  • FIG. 1 Taking the user equipment shown in FIG. 1 as a mobile phone as an example, in conjunction with the schematic block diagram of the hardware architecture of the mobile phone shown in FIG. 2, an application scenario of a method for transmitting a search request according to an implementation of the present invention is described in detail.
  • Fig. 2 is a schematic block diagram showing the hardware configuration of a mobile phone related to an embodiment of the present invention.
  • the mobile phone 200 shown in FIG. 2 includes: a radio frequency (RF) circuit 210, a memory 220, other input devices 230, a display screen 240, a sensor 250, an audio circuit 260, and input/output (I/O).
  • Subsystem 270, processor 280, and power supply 290 and the like It will be understood by those skilled in the art that the structure of the mobile phone shown in FIG. 2 does not constitute a limitation to the mobile phone, and may include more or less components than those illustrated, or combine some components, or split some components, or Different parts are arranged.
  • the display screen 240 belongs to the user interface. (UI, User Interface), and the handset 200 can include a user interface that is smaller than shown or less.
  • the components of the mobile phone 200 will be specifically described below with reference to FIG. 2:
  • the RF circuit 210 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the processor 280 processes the data. In addition, the uplink data is designed to be sent to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like.
  • RF circuitry 210 can also communicate with the network and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
  • the memory 220 can be used to store software programs and modules, and the processor 280 executes various functional applications and data processing of the mobile phone 200 by running software programs and modules stored in the memory 220.
  • the memory 220 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored. Data created according to the use of the mobile phone 200 (such as audio data, phone book, etc.) and the like.
  • memory 220 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • Other input devices 230 can be used to receive input numeric or character information, as well as generate key signal inputs related to user settings and function controls of the handset 200.
  • other input devices 130 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and light mice (the light mouse is not sensitive to display visual output).
  • function keys such as volume control buttons, switch buttons, etc.
  • trackballs mice, joysticks, and light mice (the light mouse is not sensitive to display visual output).
  • Other input devices 230 are coupled to other input device controllers 271 of I/O subsystem 270 for signal interaction with processor 280 under the control of other device input controllers 271.
  • the display screen 240 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone 200, and can also accept user input.
  • the specific display screen 240 may include a display panel 241 and a touch panel 242.
  • the display panel 241 can adopt an LCD (Liquid Crystal)
  • the display panel 241 is configured in the form of a display, a liquid crystal display, an OLED (Organic Light-Emitting Diode), or the like.
  • the touch panel 242, also referred to as a touch screen, a touch sensitive screen, etc., can collect contact or non-contact operations on or near the user (eg, the user uses any suitable object or accessory such as a finger, a stylus, etc. on the touch panel 242.
  • the operation in the vicinity of the touch panel 242 may also include a somatosensory operation; the operation includes a single point control operation, a multi-point control operation, and the like, and drives the corresponding connection device according to a preset program.
  • the touch panel 242 can include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation and posture of the user, and detects a signal brought by the touch operation, and transmits a signal to the touch controller; the touch controller receives the touch information from the touch detection device, and converts the signal into a processor. The processed information is sent to processor 280 and can receive commands from processor 280 and execute them.
  • the touch panel 242 can be implemented by using various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the touch panel 242 can also be implemented by any technology developed in the future.
  • the touch panel 242 can cover the display panel 241, and the user can display the content according to the display panel 241 (the display content includes, but is not limited to, a soft keyboard, a virtual mouse, a virtual button, an icon, etc.) on the display panel 241.
  • the touch panel 242 transmits to the processor 280 through the I/O subsystem 270 to determine user input, and then the processor 280 is based on the user
  • the input provides a corresponding visual output on display panel 241 via I/O subsystem 270.
  • the touch panel 242 and the display panel 241 are used as two separate components to implement the input and input functions of the mobile phone 200, in some embodiments, the touch panel 242 may be integrated with the display panel 241. The input and output functions of the mobile phone 200 are implemented.
  • the handset 200 can also include at least one type of sensor 250, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 241 according to the brightness of the ambient light, and the proximity sensor may close the display panel 241 when the mobile phone 200 moves to the ear. / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone 200 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here Let me repeat.
  • An audio circuit 260, a speaker 261, and a microphone 262 can provide an audio interface between the user and the handset 200.
  • the audio circuit 260 can transmit the converted signal of the received audio data to the speaker
  • the 261 is converted into a sound signal output by the speaker 261; on the other hand, the microphone 262 converts the collected sound signal into a signal, is received by the audio circuit 260, converted into audio data, and then output the audio data to the RF circuit 208 for transmission to For example, another mobile phone or audio data is output to the memory 220 for further processing.
  • the I/O subsystem 270 is used to control external devices for input and output, and may include other device input controllers 271, sensor controllers 272, and display controllers 273.
  • one or more other input control device controllers 271 receive signals from other input devices 230 and/or send signals to other input devices 230.
  • Other input devices 230 may include physical buttons (press buttons, rocker buttons, etc.) , dial, slide switch, joystick, click wheel, light mouse (light mouse is a touch-sensitive surface that does not display visual output, or an extension of a touch-sensitive surface formed by a touch screen). It is worth noting that other input control device controllers 271 can be connected to any one or more of the above devices.
  • Display controller 273 in I/O subsystem 270 receives signals from display screen 240 and/or transmits signals to display screen 240. After the display screen 240 detects the user input, the display controller 273 converts the detected user input into an interaction with the user interface object displayed on the display screen 240, ie, implements human-computer interaction.
  • Sensor controller 272 can receive signals from one or more sensors 250 and/or send signals to one or more sensors 250.
  • the processor 280 is the control center of the handset 200, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 220, and recalling data stored in the memory 220, The various functions and processing data of the mobile phone 200 are executed to perform overall monitoring of the mobile phone.
  • the processor 280 may include one or more processing units; preferably, the processor 280 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 280.
  • the handset 200 also includes a power source 290 (such as a battery) that supplies power to the various components.
  • a power source 290 such as a battery
  • the power source can be logically coupled to the processor 280 via a power management system to manage functions such as charging, discharging, and power consumption through the power management system.
  • the mobile phone 200 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • embodiments of the present invention are not limited to being implemented in the foregoing hardware architecture of FIG. 2, and may be used in other user terminal devices, such as personal computers, PADs, tablets, smart wearable devices, embedded system devices, and the like. Implemented in the terminal device of the engine. The hardware architecture of the above device will not be described here.
  • FIG. 3 shows a schematic flow diagram of a method for transmitting a search request, which may be performed by user equipment 110 shown in FIG. 1, in accordance with an implementation of the present invention.
  • FIG. 3 illustrates detailed steps or operations of a method for transmitting a search request, but these steps or operations are merely examples, and other operations may be performed by the embodiments of the present invention, or variations of the operations of FIG.
  • the various steps in FIG. 3 may be performed in a different order than that presented in FIG. 3, and it is possible that not all of the operations in FIG. 3 are to be performed.
  • the method steps shown in Figure 3 are described in detail below.
  • a forged search request is generated within a time period corresponding to a process run by the search engine client.
  • the time period corresponding to the running process of the above search engine client may refer to a period of time from when the user starts the search engine client to when the user exits the search engine client.
  • the forged search term may be a randomly determined search term.
  • the forged search term is a search term randomly determined from a search vocabulary, and the search vocabulary is periodically updated from the network in a preset time period.
  • search term database may be periodically updated from the network, or may be obtained from the network at a randomly determined time.
  • the update time of the search term database is not specifically limited by the present invention.
  • forged search terms may be general search terms or time-sensitive search words.
  • a general search term can refer to a search term that is not time-sensitive. The life cycle is relatively long and does not suddenly die or occur, for example, the name of the website, the title of the page, and the like.
  • Time-sensitive search words can refer to search words with strong timeliness, and the life cycle is relatively short.
  • hot search words such as Tianjin Port Explosion, 18th National Congress, Paris Terrorist Attack, etc., such search words can regularly search for hot words from search engines. The table is updated regularly.
  • the above-mentioned forged search words may be randomly obtained from the search term database in the forged search engine client.
  • the search term store has sufficient search words
  • the forged search request generated according to the randomly acquired search words has Sufficient randomness is not easy to be exploited by the search engine server.
  • the method for obtaining the search term is not specifically limited in the embodiment of the present invention.
  • the generating a forged search request during the running of the search engine client further includes: determining a generation delay of generating the forged search request; determining that the first time period is The search engine client does not send a first search request, the first search request is a forged search request or a real search request, and the first time period is the search engine
  • the running start time of the client is the current time, and the time period after the generation delay occurs; and the forged search request is generated at the end time of the first time period.
  • the time can be started. After the generation delay, if the first search request is not sent to the search engine server during the time period, the time may be ended at the end of the first time period. Generate a fake search request immediately.
  • the above generation delay may refer to a period of time required to generate a forged search request.
  • the timer can be started to start timing. After the time period corresponding to the generation delay, the first search request is not sent to the search engine server during the time period of the timer.
  • the first search request may be a forged search request or a real search request), and may be the time at which the counterfeit search request is sent at the time when the timer ends.
  • the above-mentioned forged search request and the real search request may be used as attributes of the first search request, wherein the forged search request may refer to a search request carrying a forged search word, and the real search request may refer to the user searching through A search request sent by the engine client to the search engine server.
  • the generation delay of the above-mentioned forged search request may be determined randomly or may be preset, and the present invention does not specifically limit this.
  • a fake search request is sent to the search engine server during the running of the search engine client.
  • the search request may be sent in accordance with a parameter format specified by the search engine. For example, for a Google search engine, you can use the following command to send a search request for the query "barack obama":
  • each search request (including a forged search request and a real search request) sent to the search engine server carries a connection ID (Session ID), and the system receives the search term carried by the search engine server according to the search request. After feedback of the search results, according to the connection ID will The search result is sent to the search engine client or the fake search engine client corresponding to the connection ID.
  • Session ID connection ID
  • the time for sending the forged search request may be determined by monitoring the operation performed by the search engine client.
  • the operations performed by the user through the search engine client may include the user launching the search engine client; the search engine client's search text box has the characters input by the user; the user clicks the "submit" button of the search engine client; the user closes the search engine client, etc. operating.
  • the fake search engine client may be started to run the generated fake search request process, and the fake search request is prepared to be sent; if the user is detected to input characters in the search text box, the fake search engine pauses to send. Forging a search request; if it detects that the user clicks the "submit" button through the search engine client, the forged search engine client continues to run the generated fake search request process (process) and sends a forged search request; if the user is detected to close the search engine client On the other hand, the fake search engine client ends up running.
  • the user can input characters in the search text box of the search engine client through an input device (for example, a keyboard) corresponding to the user equipment, and the user can also use the voice input device (for example, a microphone) of the user equipment in the search engine client.
  • searching for characters in the search text box the user can also input characters in the search text box of the search engine by clicking the hot search words on the webpage displayed by the search engine client, and the method for inputting characters in the search text box by the user in the embodiment of the present invention No specific limitation.
  • the time for sending the forged search request may be determined by monitoring the operation performed by the search engine client; and the search engine may be determined by monitoring whether the search engine server sends the search request. Whether the client sends a search request to the search engine server to determine the time for sending the forgery search request, which is not specifically limited by the present invention.
  • the method shown in FIG. 3 further includes:
  • the search term input by the user is received.
  • steps 310, 320, and 330 have no strict prioritization in time.
  • step 330 may be performed before step 320, that is, during the running of the search engine client, a forged search request is generated, and after receiving the search term input by the user, the user device sends a fake search to the search engine server. request.
  • the present invention does not specifically limit the order of time in step 310, step 320, and step 330.
  • the method shown in FIG. 3 further includes:
  • the time difference between the performing step 320 and the performing step 340 is within a predetermined interval, that is, the time difference between the sending time of the real search request and the sending time of the forged search request may be within a preset time interval, that is, may be in the user.
  • a counterfeit search request is sent within a time period near the time at which the real search request is sent.
  • the steps 320 and 340 are not sequential in time.
  • the user equipment may perform step 340 first.
  • the real search request is sent to the search engine server, and the fake search request is sent to the search engine server.
  • the time difference between the sending time of the real search request and the sending time of the fake search request is within a preset time interval.
  • step 320 further includes: sending, by the first time, a second search request to the search engine server, where the second search request is a forged search request or a real search request; The time is sent to the search engine server for the forged search request, and the first time and the second time have a time interval, and the second search request is a previous search request of the forged search request.
  • the foregoing first time and the second time may belong to a time period in a running process of the search engine client.
  • the above-mentioned forged search request and the real search request may be used as attributes of the second search request, wherein the forged search request may refer to a search request carrying a forged search word, and the real search request may refer to the user searching through A search request sent by the engine client to the search engine server.
  • the time interval between the first time and the second time is determined by a Poisson process.
  • time interval may also be generated by arbitrarily constructing a random number.
  • the time interval difference from the time when the user sends the search request through the search engine server may be large.
  • the forgery search request is only
  • the configuration of the generation time interval is not specifically limited.
  • the time interval t is based on a probability density function Ok, among them, Estimating by maximum likelihood based on the time interval t i at which the real search request is sent OK, N indicates the number of times a real search request was sent.
  • the two search requests may be simulated by the Poisson process, so that the time interval between the two adjacent search requests is in accordance with an exponential distribution, and the method for transmitting the forged search request is specifically described in conjunction with FIG. 4 .
  • FIG. 4 shows a schematic flow chart of a method of transmitting a forged search request according to an embodiment of the present invention.
  • the timer expires, that is, when the forgery search request is not sent at the time of sending the counterfeit search request set by the timer, the time t' of the user's most recent search is obtained.
  • the falsification search request is not sent at the time of sending the falsification search request set by the timer, it may be that the user inputs the character in the search text box and pauses the transmission of the falsified search request, and the present invention
  • the reason for the timer timeout is not specifically limited.
  • step 404 can be performed;
  • step 405 is performed.
  • the sending time of the forged search request is set to the current time t, and step 401 is performed.
  • the method shown in FIG. 3 further includes:
  • the search result sent by the search engine server is received, and the search result is a search result determined according to the forged search request.
  • search result page may refer to a result page that the search engine server feeds back to the forged search request.
  • the search result page usually includes a list of search results, and each search result generally includes: a title of the search result web page, a link of the search result web page, and a segment The text summary of the webpage matching the search keyword, the link of the search result page cache
  • search engine server sometimes provides other information according to the situation, such as: the date and time of the last crawl page, search The file size of the resulting page, other links to the same site as the search results, and other relevant information on the search results page, such as comments, ratings, and contact information.
  • the embodiment of the present invention does not specifically limit the presentation form of the search result.
  • the method shown in FIG. 3 further includes:
  • the search engine server By sending a forged search request to the search engine server, the search engine server analyzes the interference factor of the user behavior according to the real search request, so as to prevent the search engine server from analyzing the user behavior according to the search term input by the user, thereby improving the user experience. Avoiding the prior art, the search engine server analyzes the user's behavior based on the search terms entered by the user.
  • FIG. 5 and FIG. 6 the apparatus for transmitting a search request according to an embodiment of the present invention is described in detail. It should be understood that the apparatus shown in FIG. 5 and FIG. 6 can implement the various steps in FIG. 3. To avoid repetition, details are not described herein again.
  • FIG. 5 shows a schematic block diagram of an apparatus for transmitting a search request according to an embodiment of the present invention.
  • the apparatus 500 shown in FIG. 5 includes a first generation module 510 and a transmission module 520.
  • the first generating module 510 is configured to generate a forged search request, where the forged search request carries a forged search term, in a process of running the search engine client;
  • the sending module 520 is configured to send the forged search request generated by the generating module to the search engine server.
  • the search engine server By sending a forged search request to the search engine server, the search engine server analyzes the interference factor of the user behavior according to the real search request, so as to prevent the search engine server from analyzing the user behavior according to the search term input by the user, thereby improving the user experience. Avoiding the prior art, the search engine server analyzes the user's behavior based on the search terms entered by the user.
  • the device further includes: a first receiving module, configured to receive a search term input by the user; and a second generating module, configured to generate a real search request according to the search term input by the user, And transmitting the real search request to the search engine server, wherein a time difference between sending the forged search request and transmitting the real search request is within a predetermined interval.
  • the first generating module is specifically configured to: determine a generation delay of generating the forged search request; and determine that the search engine client does not send the first search in the first time period
  • the first search request is a forged search request or a real search request
  • the first time period is a time when the running start time of the search engine client is the current time, and the time after the generation delay a segment; generating the forged search request at an end time of the first time period.
  • the sending module is specifically configured to: send a second search request to the search engine server at a first time, where the second search request is a forged search request or a real search request; Sending the forged search request to the search engine server at a second time, the time interval between the first time and the second time, the second search request being the previous search of the forged search request request.
  • the time interval between the first time and the second time is determined by a Poisson process.
  • the time interval t is based on a probability density function Ok, among them, Estimating by maximum likelihood based on the time interval t i at which the real search request is sent OK, N indicates the number of times a real search request was sent.
  • the apparatus further includes: a second receiving module, configured to receive a search result sent by the search engine server, where the search result is a search result determined according to the forged search request; A module for deleting the search result.
  • the forged search term is a randomly determined search term.
  • the forged search term is a search term randomly determined from a search vocabulary, and the search vocabulary is periodically updated from the network in a preset time period.
  • the forged search term is a time-sensitive search term selected from a search hot vocabulary of the search engine client.
  • FIG. 6 shows a schematic block diagram of an apparatus for transmitting a search request in accordance with an embodiment of the present invention.
  • the apparatus 600 shown in FIG. 6 includes a memory 610, a processor 620, an input/output interface 630, a communication interface 640, and a bus system 650.
  • the memory 610, the processor 620, the input/output interface 630, and the communication interface 640 are connected by a bus system 650 for storing instructions for executing instructions stored in the memory 610 to control input/
  • the output interface 630 receives the input data and information, outputs data such as an operation result, and controls the communication interface 640 to transmit a signal.
  • the processor 620 is configured to generate a forged search request during the running of the search engine client, where the forged search request carries the forged search term;
  • the communication interface 640 is configured to send the forged search request to the search engine server.
  • the processor 620 may be a general-purpose central processing unit (CPU), a microprocessor, an application specific integrated circuit (ASIC), or one or more.
  • the integrated circuit is used to implement the related program to implement the technical solution provided by the embodiment of the present invention.
  • communication interface 640 enables communication between mobile terminal 600 and other devices or communication networks using transceivers such as, but not limited to, transceivers.
  • the memory 610 can include read only memory and random access memory and provides instructions and data to the processor 620.
  • a portion of the processor 620 can also include a non-volatile random access memory.
  • the processor 620 can also store information of the device type.
  • the bus system 650 may include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. However, for clarity of description, various buses are labeled as bus system 650 in the figure.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 620 or an instruction in a form of software.
  • the method for transmitting a search request disclosed in the embodiment of the present invention may be directly implemented as a hardware processor execution completion, or may be performed by a combination of hardware and software modules in a processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 610, and the processor 620 reads the information in the memory 610 and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the search engine server By sending a forged search request to the search engine server, the search engine server analyzes the interference factor of the user behavior according to the real search request, so as to prevent the search engine server from analyzing the user behavior according to the search term input by the user, thereby improving the user experience. Avoiding the prior art, the search engine server analyzes the user's behavior based on the search terms entered by the user.
  • B corresponding to A means that B is associated with A, and B can be determined according to A.
  • determining B from A does not mean that B is only determined based on A, and that B can also be determined based on A and/or other information.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the unit described as a separate component may or may not be physically separated, and the component displayed as a unit may or may not be a physical unit, that is, may be located in one place. Or it can be distributed to multiple network elements. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Algebra (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Probability & Statistics with Applications (AREA)
  • Operations Research (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种用于发送搜索请求的方法和装置,该方法包括:在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;向所述搜索引擎服务器发送所述伪造搜索请求。通过向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为,从而提高用户体验。避免了现有技术中,搜索引擎服务器根据用户输入的搜索词分析用户的行为。

Description

用于发送搜索请求的方法和装置 技术领域
本发明实施例涉及通信领域,并且更具体地,涉及一种用于发送搜索请求的方法和装置。
背景技术
搜索引擎服务器可以记录用户的搜索历史内容,并通过数据挖掘算法,分析出用户的行为习惯和兴趣偏好,据此来向用户推送相关的广告信息。从用户的角度,很多时候,搜索词同个人隐私相关,用户并不希望自己的行为习惯和兴趣爱好被搜索引擎服务器分析挖掘出来,并被推送相关的骚扰广告。
现有技术中,用户可以将搜索引擎客户端设置为隐私模式,当搜索引擎客户端进入隐私模式后,搜索引擎客户端便不会记录任何用户输入的搜索词。然而,用户输入的搜索词会被携带在搜索请求中,发送至搜索引擎服务器,搜索引擎服务器端可以记录用户的输入搜索词并分析用户行为和兴趣爱好。也就是说,即便用户设置隐私模式,搜索引擎服务器仍然能够根据用户输入的搜索词分析出用户行为习惯和兴趣爱好,从而导致用户的隐私信息泄露。
发明内容
本申请的目的是提供改进的用于发送搜索请求的方法和装置,以降低搜索引擎服务器根据用户输入的搜索词分析出用户行为习惯和兴趣偏好的可能性,更好地保护用户隐私。
第一方面,本申请提供一种用于发送搜索请求的方法,所述方法包括:在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;向所述搜索引擎服务器发送所述伪造搜索请求。
通过向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为,从而提高用户体验。避免了现有技术中,搜索引擎服务器根据用户输入的搜索词分析用户的行为。
结合第一方面,在第一方面的一种可能的实现方式中,所述方法还包括:接收用户输入的搜索词;根据所述用户输入的搜索词,生成真实搜索请求, 并向所述搜索引擎服务器发送所述真实搜索请求;其中,发送所述伪造搜索请求与发送所述真实搜索请求的时间差在预定区间内。
由于生成伪造搜索请求的时刻和发送伪造搜索请求的时刻比较接近,通过在发送真实搜索请求之后的时间段内,生成伪造搜索请求,使得发送伪造搜索请求的时刻在发送真实搜索请求的时刻的附近,从而使得发送伪造搜索请求更加接近用户发送真实搜索请求的行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述在搜索引擎客户端运行的过程中,生成伪造搜索请求,包括:确定生成所述伪造搜索请求的生成时延;确定在第一时间段内,所述搜索引擎客户端未发送第一搜索请求,所述第一搜索请求为伪造的搜索请求或真实的搜索请求,所述第一时间段为以所述搜索引擎客户端的运行起始时刻为当前时刻,经过所述生成时延后的时间段;在所述第一时间段的结束时刻,生成所述伪造搜索请求。
通过确定在第一时间段内搜索引擎客户端没有向搜索引擎服务器发送搜索请求,则在第一时间段的结束时刻向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述向所述搜索引擎服务器发送所述伪造搜索请求,包括:在第一时间向所述搜索引擎服务器发送第二搜索请求,所述第二搜索请求为伪造的搜索请求或真实的搜索请求;在第二时间向所述搜索引擎服务器发送所述伪造搜索请求,所述第一时间和所述第二时间之间具有时间间隔,所述第二搜索请求为所述伪造搜索请求的上一条搜索请求。
通过第一时间和第二时间之间的时间间隔,保证发送相邻两条搜索请求之间的时间间隔,使得发送伪造搜索请求的时刻不会和发送上一条搜索请求(该上一条搜索请求可以是真实搜索请求也可以是伪造搜索请求)的时刻重叠,从而使得发送伪造搜索请求更加接近用户发送真实搜索请求的行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述第一时间和所述第二时间之间的时间间隔通过泊松过程确定。
通过泊松过程确定第一时间和第二时间之间的时间间隔,使得第一时间 和第二时间的上发送搜索请求的事件更加接近随机事件,使得发送伪造搜索请求更加接近用户发送真实搜索请求的行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述时间间隔t基于概率密度函数
Figure PCTCN2016098114-appb-000001
确定,其中,
Figure PCTCN2016098114-appb-000002
基于发送所述真实搜索请求的时间间隔ti,通过极大似然估计
Figure PCTCN2016098114-appb-000003
确定,N表示发送真实搜索请求的次数。
通过基于发送所述真实搜索请求的时间间隔,构造发送伪造搜索请求和上一条搜索请求之间的时间间隔,使得发送伪造搜索请求更加接近用户发送真实搜索请求的行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述方法还包括:接收所述搜索引擎服务器发送的搜索结果,所述搜索结果为根据所述伪造搜索请求确定的搜索结果;删除所述搜索结果。
通过直接将伪造搜索请求对应的搜索结果删除,并不将该搜索结果呈现给用户,使得用户不会接收到很多不相关的信息,从而提高用户体验。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述伪造的搜索词为随机确定的搜索词。
通过随机确定伪造的搜索词,增加搜索引擎服务器分析用户行为习惯和兴趣爱好的难度,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述伪造的搜索词为从所述搜索引擎客户端的搜索热词表选择的时效性搜索词。
通过在搜索引擎客户端的搜索热词表中选择时效性的搜索词作为伪造搜索词,使得伪造搜索词的选择范围较广泛,时效性更强。增加了搜索引擎服务器分析用户行为习惯和兴趣爱好的难度,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为。
结合第一方面或上述任一种可能的实现方式,在第一方面的一种可能的实现方式中,所述伪造的搜索词为从搜索词库中随机确定的搜索词,所述搜索词库以预设的时间周期,定期从网络更新。
通过定期的从网络中获取搜索词,更新搜索词库的内容,使得伪造的搜 索词更加多样化,增加搜索引擎服务器分析用户行为习惯和兴趣爱好的难度,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为。
第二方面,本申请提供一种用于发送搜索请求的装置,所述装置包括用于执行第一方面中的方法的模块。
第三方面,本申请提供一种用于发送搜索请求的装置,所述装置包括:存储器、处理器、输入/输出接口、通信接口和总线系统。其中,存储器、处理器、输入/输出接口和通信接口通过总线系统相连,该存储器用于存储指令,该处理器用于执行该存储器存储的指令,当所述指令被执行时,所述处理器通过所述通信接口执行第一方面的方法,并控制输入/输出接口接收输入的数据和信息,输出操作结果等数据。
第四方面,本申请提供一种计算机可读存储介质,所述计算机可读存储介质用于存储发送搜索请求的方法的程序代码,所述程序代码用于执行第一方面中的方法指令。
在某些实现方式中,上述搜索引擎客户端可以是搜索引擎的用户接口,用于接收用户的输入搜索内容、显示搜索结果、提供用户相关性反馈机制等。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例中所需要使用的附图作简单地介绍,显而易见地,下面所描述的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1示出了根据本发明实施例的用于发送搜索请求的方法的系统架构的示意性框图。
图2示出了与本发明实施例相关的手机的硬件结构的示意性框图。
图3示出了根据本发明实施的用于发送搜索请求的方法的示意性流程图。
图4示出了根据本发明实施例的发送伪造搜索请求的方法的示意性流程图。
图5示出了根据本发明实施例的用于发送搜索请求的装置的示意性框图。
图6示出了根据本发明实施例的用于发送搜索请求的装置的示意性框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为了便于理解,现结合图1,简单介绍根据本发明实施例的用于发送搜索请求的方法的系统架构的示意性框图。在图1所示的用户设备110中包括搜索引擎客户端120,伪造搜索引擎客户端130,以及通信接口140。其中,搜索引擎客户端120和伪造搜索引擎客户端130,可以通过通信接口140与搜索引擎服务器150传输信息。
具体地,搜索引擎服务器150包括搜索器、索引器和检索器。搜索器用于在互联网中漫游,发现和搜集信息;索引器用于理解搜索器所搜索的信息,从中抽取出索引项表示文档,以及生成文档库的索引表;检索器用于根据搜索请求在索引库中快速检出文档,进行文档与搜索请求的相关度评价,并对将要输出的搜索结果按相关度进行排序。
应理解,图1所示的用户设备(也称终端设备),可以包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等。
还应理解,上述伪造搜索引擎客户端可以是用户设备中系统的插件,还可以是用户设备中独立运行的程序或者应用,可以通过该伪造搜索引擎客户端监控用户对搜索引擎客户端的操作,本发明对伪造搜索引擎客户端的呈现形式不作具体限定。
以图1所示的用户设备为手机为例,结合图2所示的手机的硬件架构的示意性框图,详细地描述根据本发明实施的用于发送搜索请求的方法的应用场景。
图2示出了与本发明实施例相关的手机的硬件结构的示意性框图。图2所示的手机200包括:射频(Radio Frequency,RF)电路210、存储器220、其他输入设备230、显示屏240、传感器250、音频电路260、输入/输出(Input/Output,I/O)子系统270、处理器280、以及电源290等部件。本领域技术人员可以理解,图2中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。本领领域技术人员可以理解显示屏240属于用户界面 (UI,User Interface),且手机200可以包括比图示或者更少的用户界面。
下面结合图2对手机200的各个构成部件进行具体的介绍:
RF电路210可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器280处理;另外,将设计上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,RF电路210还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器220可用于存储软件程序以及模块,处理器280通过运行存储在存储器220的软件程序以及模块,从而执行手机200的各种功能应用以及数据处理。存储器220可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图象播放功能等)等;存储数据区可存储根据手机200的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器220可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
其他输入设备230可用于接收输入的数字或字符信息,以及产生与手机200的用户设置以及功能控制有关的键信号输入。具体地,其他输入设备130可包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆、光鼠(光鼠是不显示可视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)等中的一种或多种。其他输入设备230与I/O子系统270的其他输入设备控制器271相连接,在其他设备输入控制器271的控制下与处理器280进行信号交互。
显示屏240可用于显示由用户输入的信息或提供给用户的信息以及手机200的各种菜单,还可以接受用户输入。具体的显示屏240可包括显示面板241,以及触控面板242。其中显示面板241可以采用LCD(Liquid Crystal  Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板241。触控面板242,也称为触摸屏、触敏屏等,可收集用户在其上或附近的接触或者非接触操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板242上或在触控面板242附近的操作,也可以包括体感操作;该操作包括单点控制操作、多点控制操作等操作类型。),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板242可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位、姿势,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成处理器能够处理的信息,再送给处理器280,并能接收处理器280发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板242,也可以采用未来发展的任何技术实现触控面板242。进一步的,触控面板242可覆盖显示面板241,用户可以根据显示面板241显示的内容(该显示内容包括但不限于,软键盘、虚拟鼠标、虚拟按键、图标等等),在显示面板241上覆盖的触控面板242上或者附近进行操作,触控面板242检测到在其上或附近的操作后,通过I/O子系统270传送给处理器280以确定用户输入,随后处理器280根据用户输入通过I/O子系统270在显示面板241上提供相应的视觉输出。虽然在图2中,触控面板242与显示面板241是作为两个独立的部件来实现手机200的输入和输入功能,但是在某些实施例中,可以将触控面板242与显示面板241集成而实现手机200的输入和输出功能。
手机200还可包括至少一种传感器250,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板241的亮度,接近传感器可在手机200移动到耳边时,关闭显示面板241和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机200还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路260、扬声器261,麦克风262可提供用户与手机200之间的音频接口。音频电路260可将接收到的音频数据转换后的信号,传输到扬声 器261,由扬声器261转换为声音信号输出;另一方面,麦克风262将收集的声音信号转换为信号,由音频电路260接收后转换为音频数据,再将音频数据输出至RF电路208以发送给比如另一手机,或者将音频数据输出至存储器220以便进一步处理。
I/O子系统270用来控制输入输出的外部设备,可以包括其他设备输入控制器271、传感器控制器272、显示控制器273。可选的,一个或多个其他输入控制设备控制器271从其他输入设备230接收信号和/或者向其他输入设备230发送信号,其他输入设备230可以包括物理按钮(按压按钮、摇臂按钮等)、拨号盘、滑动开关、操纵杆、点击滚轮、光鼠(光鼠是不显示可视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)。值得说明的是,其他输入控制设备控制器271可以与任一个或者多个上述设备连接。所述I/O子系统270中的显示控制器273从显示屏240接收信号和/或者向显示屏240发送信号。显示屏240检测到用户输入后,显示控制器273将检测到的用户输入转换为与显示在显示屏240上的用户界面对象的交互,即实现人机交互。传感器控制器272可以从一个或者多个传感器250接收信号和/或者向一个或者多个传感器250发送信号。
处理器280是手机200的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器220内的软件程序和/或模块,以及调用存储在存储器220内的数据,执行手机200的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器280可包括一个或多个处理单元;优选的,处理器280可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器280中。
手机200还包括给各个部件供电的电源290(比如电池),优选的,电源可以通过电源管理系统与处理器280逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗等功能。
尽管未示出,手机200还可以包括摄像头、蓝牙模块等,在此不再赘述。
应当理解的,本发明实施例并不局限于在前述图2的硬件架构中实施,在其他的用户终端设备,例如个人电脑、PAD、平板电脑、智能穿戴设备、嵌入式系统设备等可以使用搜索引擎的终端设备中实施。在此对上述设备的硬件架构不再赘述。
在图1和图2所示的硬件架构的基础上,下面结合图3,详细地描述根据本发明实施的用于发送搜索请求的方法。
图3示出了根据本发明实施的用于发送搜索请求的方法的示意性流程图,该方法可以由图1所示的用户设备110执行。应理解,图3示出了用于发送搜索请求的方法的详细的步骤或操作,但这些步骤或操作仅是示例,本发明实施例还可以执行其他操作,或者图3中各操作的变形。此外,图3中的各个步骤可以按照与图3呈现的不同顺序来执行,并且有可能并非要执行图3中的全部操作。下面具体描述图3所示的方法步骤。
310,在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词。
具体地,在搜索引擎客户端运行的过程所对应的时间段内,生成伪造搜索请求。上述搜索引擎客户端的运行过程所对应的时间段可以指从用户启动搜索引擎客户端为开始到该用户退出搜索引擎客户端为止的一段时间。
可选地,作为一个实施例,所述伪造的搜索词可以是随机确定的搜索词。
可选地,作为一个实施例,所述伪造的搜索词为从搜索词库中随机确定的搜索词,所述搜索词库以预设的时间周期,定期从网络更新。
应理解,上述搜索词库可以定期的从网络更新,也可以以随机确定的时间从网络获取,本发明对搜索词库的更新时间不作具体限定。
还应理解,上述伪造的搜索词可以为一般性搜索词或者时效性搜索词。一般性搜索词可以指不具有时效性的搜索词,生命周期比较长,不会突然的消亡或产生,例如,网站的名称、页面的标题等。时效性搜索词可以指时效性较强的搜索词,生命周期比较短,例如,天津港爆炸、十八大、巴黎恐怖袭击等热搜词,该类搜索词可以定期从搜索引擎的搜索热词表定期更新。
还应理解,上述伪造的搜索词可以从伪造搜索引擎客户端中的搜索词库中随机获取,当该搜索词库存储的搜索词足够多时,根据随机获取的搜索词生成的伪造搜索请求就具有足够的随机性,不易被搜索引擎服务器挖掘出规律性,本发明实施例对搜索词的获取方式不作具体限定。
可选地,作为一个实施例,所述在搜索引擎客户端运行的过程中,生成伪造搜索请求,还包括:确定生成所述伪造搜索请求的生成时延;确定在第一时间段内,所述搜索引擎客户端未发送第一搜索请求,所述第一搜索请求为伪造的搜索请求或真实的搜索请求,所述第一时间段为以所述搜索引擎客 户端的运行起始时刻为当前时刻,经过所述生成时延后的时间段;在所述第一时间段的结束时刻,生成所述伪造搜索请求。
具体地,用户启动搜索引擎服务器的同时可以开始计时,经过上述生成时延后,如果在该时间段内没有向搜索引擎服务器发送第一搜索请求,则可以在该第一时间段结束的时刻,立即生成伪造搜索请求。
上述生成时延可以指生成伪造搜索请求所需要等待的时间段。
例如,用户在启动搜索引擎服务器的同时可以启动定时器开始计时,经过生成时延所对应的时间段之后,在定时器计时的时间段内,都没有向搜索引擎服务器发送第一搜索请求(该第一搜索请求可以是伪造的搜索请求或真实的搜索请求),可以在定时器结束计时的时刻,作为发送伪造搜索请求的时刻。
需要说明的是,上述伪造的搜索请求和真实的搜索请求可以作为第一搜索请求的属性,其中,伪造的搜索请求可以指携带伪造的搜索词的搜索请求,真实的搜索请求可以指用户通过搜索引擎客户端向搜索引擎服务器发送的搜索请求。
应理解,上述伪造搜索请求的生成时延可以随机确定,也可以是预设的,本发明对此不作具体限定。
320,向搜索引擎服务器发送所述伪造搜索请求。
具体地,在搜索引擎客户端的运行过程中,向搜索引擎服务器发送伪造搜索请求。
发送伪造搜索请求时可以依照搜索引擎规定的参数格式发送搜索请求。例如对于谷歌(Google)搜索引擎,可以用如下命令发送查询“barack obama”的搜索请求:
curl-b"<cookie_name>=<cookie_value>"
--header"X_GSA_USER:<user_name>"
--header"X_GSA_CREDENTIAL_GROUP:<credential_group_name>"
http://www.mycompany.com/search?q=barack+obama&access=a
需要说明的是,向搜索引擎服务器发送的每个搜索请求(包括伪造搜索请求和真实搜索请求)中携带连接ID(Session ID),系统在接收到搜索引擎服务器根据该搜索请求中携带的搜索词反馈的搜索结果后,根据连接ID将 搜索结果发送给连接ID对应的搜索引擎客户端或伪造搜索引擎客户端。
可选地,在搜索引擎客户端的运行过程中,可以通过监控用户通过搜索引擎客户端进行的操作,确定发送伪造搜索请求的时间。用户通过搜索引擎客户端进行的操作可以包括用户启动搜索引擎客户端;搜索引擎客户端的搜索文本框中有用户输入的字符;用户点击搜索引擎客户端的“提交”按钮;用户关闭搜索引擎客户端等操作。
若检测到用户启动搜索引擎客户端,则可以启动伪造搜索引擎客户端运行生成伪造搜索请求进程,并准备发送伪造搜索请求;若检测到用户在搜索文本框中输入字符,则伪造搜索引擎暂停发送伪造搜索请求;若检测到用户通过搜索引擎客户端点击“提交”按钮,则伪造搜索引擎客户端继续运行生成伪造搜索请求进程(过程),并发送伪造搜索请求;若检测到用户关闭搜索引擎客户端,则伪造搜索引擎客户端结束运行。
应理解,用户可以通过用户设备对应的输入装置(例如,键盘)在搜索引擎客户端的搜索文本框中输入的字符,用户还可以通过用户设备的语音输入装置(例如,话筒)在搜索引擎客户端的搜索文本框中输入字符,用户还可以通过点击搜索引擎客户端显示的网页上的热搜词,在搜索引擎的搜索文本框中输入字符,本发明实施例对用户在搜索文本框输入字符的方式不作具体限定。
还应理解,在搜索引擎客户端的运行过程中,可以通过监控用户通过搜索引擎客户端进行的操作,确定发送伪造搜索请求的时间;还可以通过监听搜索引擎服务器是否发送了搜索请求,确定搜索引擎客户端是否向该搜索引擎服务器发送了搜索请求,进而确定发送伪造搜索请求的时间,本发明对此不作具体限定。
可选地,图3所示的方法还包括:
330,接收用户输入的搜索词。
具体地,在搜索引擎客户端的运行过程中,接收用户输入的搜索词。
应理解,步骤310、步骤320和步骤330在时间上没有严格的先后顺序。例如,步骤330可以步骤320之前进行,也就是说,在搜索引擎客户端运行的过程中,生成了伪造搜索请求,并且在接收了用户输入的搜索词之后,用户设备向搜索引擎服务器发送伪造搜索请求。本发明对于步骤310、步骤320和步骤330在时间的顺序不做具体限定。
可选地,图3所示的方法还包括:
340,根据所述用户输入的搜索词,生成真实搜索请求,并向所述搜索引擎服务器发送所述真实搜索请求;其中,发送所述伪造搜索请求与发送所述真实搜索请求的时间差在预定区间内。
具体地,执行步骤320和执行步骤340的时间差在预定区间内,也就是说,真实搜索请求的发送时间和伪造搜索请求的发送时间的时间差,可以在预设的时间区间内,即可以在用户发送真实搜索请求的时刻的附近的时间段内,发送伪造搜索请求。
应理解,步骤320和步骤340在时间上没有先后顺序,例如,用户设备可以先执行步骤340,在执行步骤320,即先向搜索引擎服务器发送真实搜索请求,再向搜索引擎服务器发送伪造搜索请求,使得真实搜索请求的发送时间和伪造搜索请求的发送时间的时间差,在预设的时间区间内。
可选地,作为一个实施例,步骤320还包括:在第一时间向所述搜索引擎服务器发送第二搜索请求,所述第二搜索请求为伪造的搜索请求或真实的搜索请求;在第二时间向所述搜索引擎服务器发送所述伪造搜索请求,所述第一时间和所述第二时间之间具有时间间隔,所述第二搜索请求为所述伪造搜索请求的上一条搜索请求。
具体地,上述第一时间和第二时间可以属于搜索引擎客户端的运行过程中的时间段。
需要说明的是,上述伪造的搜索请求和真实的搜索请求可以作为第二搜索请求的属性,其中,伪造的搜索请求可以指携带伪造的搜索词的搜索请求,真实的搜索请求可以指用户通过搜索引擎客户端向搜索引擎服务器发送的搜索请求。
可选地,作为一个实施例,所述第一时间和所述第二时间之间的时间间隔通过泊松过程确定的。
应理解,上述时间间隔还可以通过任意构造随机数生成,当时间间隔根据任意构造随机数生成时,与用户通过搜索引擎服务器发送搜索请求的时间间隔差异可能很大,此时,伪造搜索请求仅仅对搜索引擎服务器对用户兴趣域的分析起干扰作用,本发明实施例对生成时间间隔的构造方式不作具体限定。
可选地,作为一个实施例,所述时间间隔t基于概率密度函数
Figure PCTCN2016098114-appb-000004
确定,其中,
Figure PCTCN2016098114-appb-000005
基于发送所述真实搜索请求的时间间隔ti,通过极大似然估计
Figure PCTCN2016098114-appb-000006
确定,N表示发送真实搜索请求的次数。
具体地,可以通过泊松过程模拟相邻两次搜索请求,使得该相邻两次搜索请求之间的时间间隔为符合指数分布,结合图4具体描述伪造搜索请求的发送方法。图4示出了根据本发明实施例的发送伪造搜索请求的方法的示意性流程图。
401,设置t为当前时间,确定上述发送相邻两次搜索请求的时间间隔Ti,定时器开始计时。
402,当定时器超时,获取用户最近一次发送真实搜索请求的时间t'。
具体地,定时器超时,也就是说,当到达定时器设置的发送伪造搜索请求的时间,未发送伪造搜索请求,则获取用户最近一次搜索的时间t'。
需要说明的是,上述当到达定时器设置的发送伪造搜索请求的时间,未发送伪造搜索请求,可以是检测到用户在搜索文本框中输入了字符,而暂停发送伪造搜索请求引起的,本发明对计时器超时的原因不作具体限定。
403,确定当前时间t与用户最近一次发送伪造搜索请求的时间t'的时间先后顺序。
若t≥t',说明在时间间隔Ti内(即计时器计时的时间段内),用户没有发送真实搜索请求,此时,可以执行步骤404;
如果t<t',说明在在时间间隔Ti内(即计时器计时的时段内),用户发送了真实搜索请求,执行步骤405。
404,生成并发送搜索请求。
具体地,在发送伪造搜索请求之后,设置该伪造搜索请求的发送时间为当前时间t,执行步骤401。
405,重新设置计时器。
具体地,由于用户在定时器记时的时间段内,发送了真实搜索请求,为保证任意两次搜索请求之间的时间间隔满足上述确定的时间间隔,确定用户发送真实搜索请求的时间t'为计时器的计时起点,设置Ti′=t′-t为发送下一条伪造搜索请求的时间间隔。
需要说明的是,因为距离t′已经过去了Ti-(t′-t)的时间,所以调整计时器从用户发送真实搜索请求的时间t'起间隔Ti′=t′-t后发送伪造搜索请 求。执行步骤402。
可选地,图3所示的方法还包括:
350,接收所述搜索引擎服务器发送的搜索结果,所述搜索结果为根据所述伪造搜索请求确定的搜索结果。
具体地,接收所述搜索引擎服务器发送的搜索结果,所述搜索结果为根据所述伪造搜索请求确定的搜索结果。
应理解,上述搜索结果可以通过搜索结果页(Search engine results page,SERP)的形式呈现给用户。搜索结果页可以指搜索引擎服务器对该伪造搜索请求反馈的结果页面,通常搜索结果页包含搜索结果的列表,每个搜索结果一般都包含了:搜索结果网页的标题,搜索结果网页的链接,一段与搜索关键字相匹配的关于网页的文字摘要,搜索结果页缓存的链接除了以上的基本信息,搜索引擎服务器有时还会根据情况提供其他一些信息,比如:最后抓取页面的日期和时间,搜索结果页的文件大小,和搜索结果相关的同网站的其他链接,搜索结果页上的其他相关信息,比如:评论、打分和联系信息等。本发明实施例对搜索结果的呈现形式不作具体限定。
可选地,图3所示的方法还包括:
360,删除所述搜索结果。
通过向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为,从而提高用户体验。避免了现有技术中,搜索引擎服务器根据用户输入的搜索词分析用户的行为。
上文结合图1至图4详细的说明了描述了本发明实施例的用于发送搜索请求的方法,下面结合图5和图6,详细描述本发明实施例的用于发送搜索请求的装置。应理解,图5和图6所示的装置能够实现图3中的各个步骤,为避免重复,在此不再详细赘述。
图5示出了根据本发明实施例的用于发送搜索请求的装置的示意性框图,图5所示的装置500包括:第一生成模块510和发送模块520。
第一生成模块510用于在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;
发送模块520,用于向所述搜索引擎服务器发送所述生成模块生成的所述伪造搜索请求。
通过向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为,从而提高用户体验。避免了现有技术中,搜索引擎服务器根据用户输入的搜索词分析用户的行为。
可选地,作为一个实施例,所述装置还包括:第一接收模块,用于接收用户输入的搜索词;第二生成模块,用于根据所述用户输入的搜索词,生成真实搜索请求,并向所述搜索引擎服务器发送所述真实搜索请求,其中,发送所述伪造搜索请求与发送所述真实搜索请求的时间差在预定区间内。
可选地,作为一个实施例,所述第一生成模块具体用于:确定生成所述伪造搜索请求的生成时延;确定在第一时间段内,所述搜索引擎客户端未发送第一搜索请求,所述第一搜索请求为伪造的搜索请求或真实的搜索请求,所述第一时间段为以所述搜索引擎客户端的运行起始时刻为当前时刻,经过所述生成时延后的时间段;在所述第一时间段的结束时刻,生成所述伪造搜索请求。
可选地,作为一个实施例,所述发送模块具体用于:在第一时间向所述搜索引擎服务器发送第二搜索请求,所述第二搜索请求为伪造的搜索请求或真实的搜索请求;在第二时间向所述搜索引擎服务器发送所述伪造搜索请求,所述第一时间和所述第二时间之间具有时间间隔,所述第二搜索请求为所述伪造搜索请求的上一条搜索请求。
可选地,作为一个实施例,所述第一时间和所述第二时间之间的时间间隔通过泊松过程确定。
可选地,作为一个实施例,所述时间间隔t基于概率密度函数
Figure PCTCN2016098114-appb-000007
确定,其中,
Figure PCTCN2016098114-appb-000008
基于发送所述真实搜索请求的时间间隔ti,通过极大似然估计
Figure PCTCN2016098114-appb-000009
确定,N表示发送真实搜索请求的次数。
可选地,作为一个实施例,所述装置还包括:第二接收模块,用于接收所述搜索引擎服务器发送的搜索结果,所述搜索结果为根据所述伪造搜索请求确定的搜索结果;删除模块,用于删除所述搜索结果。
可选地,作为一个实施例,所述伪造的搜索词为随机确定的搜索词。
可选地,作为一个实施例,所述伪造的搜索词为从搜索词库中随机确定的搜索词,所述搜索词库以预设的时间周期,定期从网络更新。
可选地,作为一个实施例,所述伪造的搜索词为从所述搜索引擎客户端的搜索热词表选择的时效性搜索词。
图6示出了根据本发明实施例的用于发送搜索请求的装置的示意性框图。图6所示的装置600包括:存储器610、处理器620、输入/输出接口630、通信接口640和总线系统650。其中,存储器610、处理器620、输入/输出接口630和通信接口640通过总线系统650相连,该存储器610用于存储指令,该处理器620用于执行该存储器610存储的指令,以控制输入/输出接口630接收输入的数据和信息,输出操作结果等数据,并控制通信接口640发送信号。
处理器620,用于在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;
通信接口640,用于向所述搜索引擎服务器发送所述伪造搜索请求。
应理解,在本发明实施例中,该处理器620可以采用通用的中央处理器(Central Processing Unit,CPU),微处理器,应用专用集成电路(Application Specific Integrated Circuit,ASIC),或者一个或多个集成电路,用于执行相关程序,以实现本发明实施例所提供的技术方案。
还应理解,通信接口640使用例如但不限于收发器一类的收发装置,来实现移动终端600与其他设备或通信网络之间的通信。
该存储器610可以包括只读存储器和随机存取存储器,并向处理器620提供指令和数据。处理器620的一部分还可以包括非易失性随机存取存储器。例如,处理器620还可以存储设备类型的信息。
该总线系统650除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线系统650。
在实现过程中,上述方法的各步骤可以通过处理器620中的硬件的集成逻辑电路或者软件形式的指令完成。结合本发明实施例所公开的用于发送搜索请求的方法可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器610,处理器620读取存储器610中的信息,结合其硬件完成上述方法的步骤。为避免重复,这里不再详细描述。
通过向搜索引擎服务器发送伪造搜索请求,作为搜索引擎服务器根据真实搜索请求分析用户行为的干扰因素,以防止搜索引擎服务器根据用户输入的搜索词分析用户行为,从而提高用户体验。避免了现有技术中,搜索引擎服务器根据用户输入的搜索词分析用户的行为。
应理解,在本发明实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
应理解,在本发明的各种实施例中,上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方, 或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种用于发送搜索请求的方法,其特征在于,包括:
    在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;
    向所述搜索引擎服务器发送所述伪造搜索请求。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    接收用户输入的搜索词;
    根据所述用户输入的搜索词,生成真实搜索请求,并向所述搜索引擎服务器发送所述真实搜索请求;其中,发送所述伪造搜索请求与发送所述真实搜索请求的时间差在预定区间内。
  3. 如权利要求1或2所述的方法,其特征在于,所述在搜索引擎客户端运行的过程中,生成伪造搜索请求,包括:
    确定生成所述伪造搜索请求的生成时延;
    确定在第一时间段内,所述搜索引擎客户端未发送第一搜索请求,所述第一搜索请求为伪造的搜索请求或真实的搜索请求,所述第一时间段为以所述搜索引擎客户端的运行起始时刻为当前时刻,经过所述生成时延后的时间段;
    在所述第一时间段的结束时刻,生成所述伪造搜索请求。
  4. 如权利要求1所述的方法,其特征在于,所述在搜索引擎客户端运行的过程中,向所述搜索引擎服务器发送所述伪造搜索请求,包括:
    在第一时间向所述搜索引擎服务器发送第二搜索请求,所述第二搜索请求为伪造的搜索请求或真实的搜索请求;
    在第二时间向所述搜索引擎服务器发送所述伪造搜索请求,所述第一时间和所述第二时间之间具有时间间隔,所述第二搜索请求为所述伪造搜索请求的上一条搜索请求。
  5. 如权利要求4所述的方法,其特征在于,所述第一时间和所述第二时间之间的时间间隔通过泊松过程确定。
  6. 如权利要求5所述的方法,其特征在于,所述时间间隔t基于概率密度函数
    Figure PCTCN2016098114-appb-100001
    确定,
    其中,
    Figure PCTCN2016098114-appb-100002
    基于发送所述真实搜索请求的时间间隔ti,通过极大似然估计
    Figure PCTCN2016098114-appb-100003
    确定,N表示发送真实搜索请求的次数。
  7. 如权利要求1-6中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述搜索引擎服务器发送的与所述伪造搜索请求对应的搜索结果;
    删除所述搜索结果。
  8. 如权利要求1-7中任一项所述的方法,其特征在于,所述伪造的搜索词为随机确定的搜索词。
  9. 一种用于发送搜索请求的装置,其特征在于,包括:
    第一生成模块,用于在搜索引擎客户端运行的过程中,生成伪造搜索请求,所述伪造搜索请求携带伪造的搜索词;
    发送模块,用于向所述搜索引擎服务器发送所述生成模块生成的所述伪造搜索请求。
  10. 如权利要求9所述的装置,其特征在于,所述装置还包括:
    第一接收模块,用于接收用户输入的搜索词;
    第二生成模块,用于根据所述用户输入的搜索词,生成真实搜索请求,并向所述搜索引擎服务器发送所述真实搜索请求,其中,发送所述伪造搜索请求与发送所述真实搜索请求的时间差在预定区间内。
  11. 如权利要求9或10所述的装置,其特征在于,所述第一生成模块具体用于:
    确定生成所述伪造搜索请求的生成时延;
    确定在第一时间段内,所述搜索引擎客户端未发送第一搜索请求,所述第一搜索请求为伪造的搜索请求或真实的搜索请求,所述第一时间段为以所述搜索引擎客户端的运行起始时刻为当前时刻,经过所述生成时延后的时间段;
    在所述第一时间段的结束时刻,生成所述伪造搜索请求。
  12. 如权利要求11所述的装置,其特征在于,所述发送模块具体用于:
    在第一时间向所述搜索引擎服务器发送第二搜索请求,所述第二搜索请求为伪造的搜索请求或真实的搜索请求;
    在第二时间向所述搜索引擎服务器发送所述伪造搜索请求,所述第一时间和所述第二时间之间具有时间间隔,所述第二搜索请求为所述伪造搜索请 求的上一条搜索请求。
  13. 如权利要求12所述的装置,其特征在于,所述第一时间和所述第二时间之间的时间间隔通过泊松过程确定。
  14. 如权利要求13所述的装置,其特征在于,所述时间间隔t基于概率密度函数
    Figure PCTCN2016098114-appb-100004
    确定,
    其中,
    Figure PCTCN2016098114-appb-100005
    基于发送所述真实搜索请求的时间间隔ti,通过极大似然估计
    Figure PCTCN2016098114-appb-100006
    确定,N表示发送真实搜索请求的次数。
  15. 如权利要求9-14中任一项所述的装置,其特征在于,所述装置还包括:
    第二接收模块,用于接收所述搜索引擎服务器发送的搜索结果,所述搜索结果为根据所述伪造搜索请求确定的搜索结果;
    删除模块,用于删除所述搜索结果。
  16. 如权利要求9-15中任一项所述的装置,其特征在于,所述伪造的搜索词为随机确定的搜索词。
PCT/CN2016/098114 2016-09-05 2016-09-05 用于发送搜索请求的方法和装置 WO2018040104A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/CN2016/098114 WO2018040104A1 (zh) 2016-09-05 2016-09-05 用于发送搜索请求的方法和装置
CN201680005833.4A CN107223253B (zh) 2016-09-05 2016-09-05 用于发送搜索请求的方法和装置
US16/292,992 US11080347B2 (en) 2016-09-05 2019-03-05 Method and apparatus for sending search request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/098114 WO2018040104A1 (zh) 2016-09-05 2016-09-05 用于发送搜索请求的方法和装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/292,992 Continuation US11080347B2 (en) 2016-09-05 2019-03-05 Method and apparatus for sending search request

Publications (1)

Publication Number Publication Date
WO2018040104A1 true WO2018040104A1 (zh) 2018-03-08

Family

ID=59928245

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/098114 WO2018040104A1 (zh) 2016-09-05 2016-09-05 用于发送搜索请求的方法和装置

Country Status (3)

Country Link
US (1) US11080347B2 (zh)
CN (1) CN107223253B (zh)
WO (1) WO2018040104A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537055B (zh) * 2018-03-06 2022-04-05 南京邮电大学 一种数据查询隐私保护的隐私预算分配和数据发布方法及其系统
CN109388967B (zh) * 2018-10-11 2022-04-22 努比亚技术有限公司 一种数据处理方法、终端及计算机可读存储介质
CN111241379B (zh) * 2018-11-28 2023-04-25 阿里巴巴集团控股有限公司 搜索结果的处理方法、装置、电子设备及计算机可读介质
CN109871478A (zh) * 2018-12-24 2019-06-11 阿里巴巴集团控股有限公司 网络搜索方法及装置
CN109871713A (zh) * 2019-02-12 2019-06-11 重庆邮电大学 一种基于网页机器人的隐私保护方法
CN110287731A (zh) * 2019-06-28 2019-09-27 维沃移动通信有限公司 一种应用程序的控制方法及终端设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169293A1 (en) * 2008-12-30 2010-07-01 International Business Machines Corporation Search engine service utilizing hash algorithms
CN102170432A (zh) * 2011-03-25 2011-08-31 东南大学 一种用户可控的保护位置隐私k近邻查询方法
CN104184742A (zh) * 2014-09-09 2014-12-03 西安电子科技大学 基于位置服务隐私保护的个性化双重隐身方法
CN104507048A (zh) * 2014-12-24 2015-04-08 福建师范大学 一种基于l-查询的位置隐私保护方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007050244A2 (en) * 2005-10-27 2007-05-03 Georgia Tech Research Corporation Method and system for detecting and responding to attacking networks
US20090112805A1 (en) * 2007-10-31 2009-04-30 Zachary Adam Garbow Method, system, and computer program product for implementing search query privacy
US9081858B2 (en) * 2012-04-24 2015-07-14 Xerox Corporation Method and system for processing search queries
CN103577464B (zh) * 2012-08-02 2018-07-10 百度在线网络技术(北京)有限公司 一种搜索引擎坏例的挖掘方法和装置
US9037598B1 (en) * 2013-01-25 2015-05-19 Google Inc. Variable query generation
US9965649B2 (en) * 2015-05-19 2018-05-08 Rujing Tang System and method for protecting internet user data privacy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169293A1 (en) * 2008-12-30 2010-07-01 International Business Machines Corporation Search engine service utilizing hash algorithms
CN102170432A (zh) * 2011-03-25 2011-08-31 东南大学 一种用户可控的保护位置隐私k近邻查询方法
CN104184742A (zh) * 2014-09-09 2014-12-03 西安电子科技大学 基于位置服务隐私保护的个性化双重隐身方法
CN104507048A (zh) * 2014-12-24 2015-04-08 福建师范大学 一种基于l-查询的位置隐私保护方法

Also Published As

Publication number Publication date
CN107223253A (zh) 2017-09-29
CN107223253B (zh) 2020-04-28
US11080347B2 (en) 2021-08-03
US20190205348A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
WO2018040104A1 (zh) 用于发送搜索请求的方法和装置
US10182101B2 (en) Method, apparatus and system for sharing webpage
WO2016019925A1 (zh) 搜索方法、服务器及客户端
WO2016197758A1 (zh) 信息推荐系统、方法及装置
WO2017041664A1 (zh) 一种征信评分确定方法、装置及存储介质
WO2015058616A1 (zh) 恶意网站的识别方法和装置
WO2018153207A1 (zh) 数据处理方法、服务器、终端及系统
WO2015081801A1 (en) Method, server, and system for information push
CN108156508B (zh) 弹幕信息处理的方法、装置、移动终端、服务器及系统
WO2017161994A1 (zh) 一种显示页面的方法及装置、计算机存储介质
WO2018027551A1 (zh) 一种消息显示方法、用户终端及图形用户接口
WO2017193496A1 (zh) 应用数据的处理方法、装置和终端设备
WO2016015471A1 (zh) 一种预测用户离网的方法及装置
WO2019001348A1 (zh) 对象拦截方法、终端、服务器和存储介质
WO2019041280A1 (zh) 应用资源推荐方法及相关设备
WO2018233388A1 (en) METHOD OF PROCESSING INFORMATION AND RELATED PRODUCTS
WO2019085533A1 (zh) 用于终端设备的应用处理的方法和终端设备
US20160364495A1 (en) Url error-correcting method, server, terminal and system
CN110633438B (zh) 一种新闻事件处理的方法、终端、服务器及存储介质
JP6915074B2 (ja) メッセージ通知方法及び端末
WO2018233490A1 (zh) 日程管理方法及相关产品
CN106020945B (zh) 快捷项添加方法及装置
CN108737618B (zh) 信息处理方法和装置、电子设备、计算机可读存储介质
CN107577933B (zh) 应用登录方法和装置、计算机设备、计算机可读存储介质
CN106339402B (zh) 一种推荐内容推送的方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16914669

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16914669

Country of ref document: EP

Kind code of ref document: A1