WO2022252882A1 - 浏览器网页防劫持的方法、装置、电子设备及存储介质 - Google Patents

浏览器网页防劫持的方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2022252882A1
WO2022252882A1 PCT/CN2022/089299 CN2022089299W WO2022252882A1 WO 2022252882 A1 WO2022252882 A1 WO 2022252882A1 CN 2022089299 W CN2022089299 W CN 2022089299W WO 2022252882 A1 WO2022252882 A1 WO 2022252882A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
browser
network request
response data
link address
Prior art date
Application number
PCT/CN2022/089299
Other languages
English (en)
French (fr)
Inventor
赵剑萍
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2022252882A1 publication Critical patent/WO2022252882A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Definitions

  • the present application relates to the Internet field, and in particular to a browser webpage anti-hijacking method, device, electronic equipment and computer-readable storage medium.
  • Web hijacking sometimes occurs when a user visits a web page using a browser. Web hijacking can change the content of web pages and cause problems such as consuming large amounts of data traffic.
  • the anti-hijacking in data transmission is carried out by deploying Hyper Text Transfer Protocol over Secure Socket Layer (https) on the server side.
  • https Secure Socket Layer
  • the embodiment of the present application provides a browser webpage anti-hijacking method, device, electronic equipment and computer-readable storage medium, which can effectively prevent network hijacking, greatly improve the security of browser access to webpages, and improve user experience.
  • the present application provides a method for anti-hijacking of browser web pages, the method is applied to electronic equipment, and the method may include:
  • the present application provides a browser webpage anti-hijacking device, which may include:
  • a transceiver module configured to receive first response data from the server to a first network request, the first network request being sent by the electronic device through a browser and used to request access to web page data;
  • a processing module configured to suspend the network state machine of the browser and disconnect the network link of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data .
  • an electronic device which may include:
  • the transceiver and the processor invoke the executable program code stored in the memory to execute the method as described in the first aspect of the present application.
  • the present application provides a computer-readable storage medium, including instructions, which, when run on a processor, cause the processor to execute the method described in the first aspect of the present application.
  • the present application also provides a computer program product, which causes the computer to execute the method described in the first aspect of the present application when the computer program product is run on a computer.
  • the present application also provides an application publishing platform, the application publishing platform is used for publishing computer program products, wherein, when the computer program products run on a computer, the computer is made to execute the method described in the first aspect of the present application .
  • FIG. 1 it is a schematic diagram of an embodiment of the method for browser webpage anti-hijacking in the embodiment of the present application
  • Fig. 2 is the schematic diagram of another embodiment of the method for browser webpage anti-hijacking in the embodiment of the present application
  • Fig. 3 is the schematic diagram of another embodiment of the method for anti-hijacking of browser webpage in the embodiment of the present application;
  • Fig. 4 is the schematic diagram of another embodiment of the method for anti-hijacking of browser webpage in the embodiment of the present application.
  • Fig. 5 is a schematic diagram of an embodiment of a device for preventing hijacking of browser web pages in the embodiment of the present application
  • FIG. 6A is a schematic diagram of an embodiment of the electronic device in the embodiment of the present application.
  • FIG. 6B is a schematic diagram of another embodiment of the electronic device in the embodiment of the present application.
  • the embodiment of the present application provides a browser webpage anti-hijacking method, device, electronic equipment and computer-readable storage medium, which can effectively prevent network hijacking, greatly improve the security of browser access to webpages, and improve user experience .
  • Web hijacking sometimes occurs when a user visits a web page using a browser. Web hijacking can change the content of web pages and cause problems such as users consuming large amounts of data traffic when visiting web pages. For example, when a user visits some novel webpages, he may stay on the novel webpage for a long time. If the content of the novel webpage is hijacked, the user will continue to download a certain game in the background while reading the novel, or some unnecessary content will be added to the webpage due to the hijacking. web page elements, which will cause a lot of traffic loss, resulting in economic losses in scenarios where users are unknown, and damage the interests of users.
  • the solution to network hijacking is to deploy the HTTPS security protocol on the server to prevent hijacking in data transmission, but after the browser accesses the web page data, there is no specific implementation method for this aspect of anti-hijacking .
  • the existing technology completely relies on network protocols, and data encryption is used to prevent hijacking during data transmission.
  • this method can prevent tampering to a certain extent, it may also be tampered with by deceiving the transit server. Can't avoid hijacking very well.
  • many users will not deliberately add the https security protocol when entering the webpage address, causing the browser to actively add the http non-secure protocol, which will also increase the risk of webpage hijacking.
  • the webpage data has been tampered with, for example, the webpage element is a link to a picture, but after the link is hijacked, the first response data returned is the data of an application apk, which will cause the user to access the webpage data.
  • the electronic device may be a mobile phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiver function, a virtual reality (Virtual Reality, VR) terminal device, an augmented reality (Augmented Reality, AR) terminal Equipment, wireless terminal equipment in industrial control, wireless terminal equipment in self driving, wireless terminal equipment in remote medical, wireless terminal equipment in smart grid , wireless terminal equipment in transportation safety, wireless terminal equipment in smart city, or wireless terminal equipment in smart home.
  • a virtual reality (Virtual Reality, VR) terminal device an augmented reality (Augmented Reality, AR) terminal Equipment
  • wireless terminal equipment in industrial control wireless terminal equipment in self driving
  • wireless terminal equipment in remote medical wireless terminal equipment in smart grid
  • wireless terminal equipment in transportation safety wireless terminal equipment in smart city, or wireless terminal equipment in smart home.
  • the terminal device may also be a wearable device.
  • Wearable devices can also be called wearable smart devices, which is a general term for the application of wearable technology to intelligently design daily wear and develop wearable devices, such as glasses, gloves, watches, clothing and shoes.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets and smart jewelry for physical sign monitoring.
  • the present application provides a browser web page anti-hijacking method, the method is applied to an electronic device, and the method includes: receiving first response data from a server to a first network request, and the first network request is sent by the electronic device Send through the browser and use to request access to web page data; if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspend the network state machine of the browser, and disconnect all web link for the browser mentioned above.
  • the method before receiving the first response data from the server to the first network request, the method further includes: obtaining a link address for accessing a web page; if the link address uses a security protocol, creating and submitting The server sends a first network request, and the first network request includes a link address using the security protocol; if the link address uses a non-secure protocol, convert the link address using the non-secure protocol to use A link address of a security protocol, creating and sending a first network request to the server, where the first network request includes a link address converted to use the security protocol.
  • the acquiring the link address for accessing the webpage includes: responding to the operation of inputting the link address by the user, acquiring the link address for accessing the webpage, and determining whether the link address uses a security protocol.
  • the obtaining the link address for accessing the webpage includes: responding to the user’s operation of inputting the link address, obtaining the link address for accessing the webpage; judging whether the link address is a valid input address, and if it is a valid input address, it is judged whether the link address uses a security protocol; if it is not a valid input address, an error is reported.
  • the method further includes: if the first response data is not received, then judging whether the first network request includes a link address using a security protocol; if so, suspending the network status of the browser machine, and disconnect the network link of the browser, convert the link address using the security protocol to the link address using the non-secure protocol, create and send a second network request to the server, and the second network request includes the converted For using the link address of the non-secure protocol, the second network request is used to request access to webpage data.
  • the method further includes: if the first network request does not include a link address using a security protocol and the first network request is a network request for a main resource, reporting a network error code to the server; if If the first network request does not include a link address using a security protocol and the first network request is a sub-resource network request, then the first network request is ignored.
  • judging whether the first network request includes a link address using a security protocol includes: if the server does not receive the If the first response data is the first response data, it is judged whether the first network request includes the link address using the security protocol.
  • the server if it includes, suspend the network state machine of the browser, disconnect the network link of the browser, convert the link address using the security protocol to the link address using the non-safety protocol, create and Sending the second network request to the server, including: if included, suspending the network state machine of the browser, disconnecting the network link of the browser, and converting the link address using the security protocol to using a non-security protocol
  • the link address of the browser is used to create the second network request, restore the network state machine of the browser, rebuild the network link of the browser, and send the second network request to the server.
  • the method further includes: saving the resource type corresponding to the second network request.
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspend the network state machine of the browser, and disconnect the network of the browser Linking, including: if the first response data is response data of a sub-resource, then determining the resource type corresponding to the first response data; if the resource type corresponding to the first network request corresponds to the first response data resource types are inconsistent, suspend the network state machine of the browser, and disconnect the network link of the browser.
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data
  • suspend the network state machine of the browser and disconnect the network of the browser Linking, including: if the first response data is the response data of the main resource, then determine the resource type corresponding to the first response data; if the resource type corresponding to the first network request corresponds to the first response data resource types are inconsistent, then suspend the network state machine of the browser, disconnect the network connection of the browser, and display an error page.
  • the method further includes: if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, parsing the first response data and displaying network content.
  • the web content is typed web content.
  • the link address used by the first network request is used for the server to perform data statistics and background optimization, suspend the network state machine of the browser, and disconnect the network link of the browser; or,
  • the first response data is sent to the server as hijacked data, and the first response data is used for
  • the server performs data statistics and background optimization, suspends the network state machine of the browser, and disconnects the network link of the browser; or,
  • the first response data is regarded as hijacked data, and the link address used by the first network request is sent to the The first response data and the link address used by the first network request are used for the server to perform data statistics and background optimization, suspend the network state machine of the browser, and disconnect the browser’s Internet connection.
  • the first response data corresponds to the response data of the main resource; if the first network request is a network request of a sub-resource, then The first response data corresponds to the response data of the sub-resource.
  • the resource types corresponding to the first network request include: pictures, audio, video, cascading style sheets, JavaScript, and binary data;
  • the resource types corresponding to the first response data include: pictures, audio, video, cascading style sheets, JavaScript, and binary data.
  • the method further includes: saving the resource type corresponding to the first network request.
  • a browser web page anti-hijacking method is proposed, which largely prevents the user's traffic from being maliciously consumed and damages the user's interests, and greatly improves the user's experience.
  • FIG. 1 it is a schematic diagram of an embodiment of a method for preventing hijacking of browser webpages in the embodiment of the present application.
  • the method embodiment is applied to electronic equipment, and the method embodiment may include:
  • the electronic device before receiving the first response data from the server to the first network request, the electronic device needs to create and send the first network request to the server, and the first network request is used for the electronic device to request Access web data.
  • the resource type corresponding to the first network request may include: pictures, audio, video, css (Cascading Style Sheets, Cascading Style Sheets), js (JavaScript), binary data, and the like.
  • the resource type corresponding to the first response data may include: pictures, audio, video, css, js, binary data, and the like.
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, for example: the resource type corresponding to the first network request is a picture, the resource corresponding to the first response data type is binary data; or, the resource type corresponding to the first network request is js (JavaScript), and the resource type corresponding to the first response data is css (Cascading Style Sheets, Cascading Style Sheets), then suspend the browser's The network state machine, and disconnect the network connection of the browser.
  • the resource type corresponding to the first network request is a picture
  • the resource corresponding to the first response data type is binary data
  • the resource type corresponding to the first network request is js (JavaScript)
  • the resource type corresponding to the first response data is css (Cascading Style Sheets, Cascading Style Sheets)
  • the first network request is sent by the electronic device through the browser and used to request access to webpage data; if the first network request corresponds to If the resource type of the resource is inconsistent with the resource type corresponding to the first response data, the network state machine of the browser is suspended, and the network link of the browser is disconnected. If the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, it is considered that the accessed webpage data has been hijacked, so the electronic device can suspend the network state machine of the browser and disconnect the browser.
  • the network link of the server ensures the security of data access. That is, it can effectively prevent network hijacking, greatly improve the security of browsers accessing web pages, and improve user experience.
  • FIG. 2 it is a schematic diagram of an embodiment of a method for preventing hijacking of browser webpages in the embodiment of the present application.
  • the method embodiment is applied to electronic equipment, and the method embodiment may include:
  • obtaining the link address for accessing the webpage by the electronic device may include: the electronic device responds to the operation of inputting the link address by the user, acquires the link address for accessing the webpage, and determines whether the link address uses a security protocol.
  • obtaining the link address for accessing the webpage by the electronic device may include: obtaining the link address for accessing the webpage by the electronic device in response to the operation of the user inputting the link address; judging whether the link address is a valid input address, if If the input address is valid, it is judged whether the link address uses a security protocol; if it is not a valid input address, an error is reported.
  • the electronic device when the electronic device detects that the user starts the browser and enters the link address to open the webpage, the electronic device responds to the user's operation of inputting the link address, and judges whether the link address is a valid input address, and if it is a valid input address, then judges Whether the link address uses the security protocol; if it is not a valid input address, an error will be reported.
  • the electronic device sends a first network request to the server.
  • the electronic device saves the resource type corresponding to the first network request.
  • the electronic device creates a first network request according to the link address, and sends the first network request to the server, which may include:
  • link address uses a security protocol
  • creating and sending a first network request to the server where the first network request includes the link address using the security protocol.
  • the electronic device creates a first network request, wherein the first network request includes a link address using the https security protocol, and sends the first network request to the server ; It is also possible to save the resource type requested by the first network for subsequent use when the server returns the first response data, and then start waiting for the server to send the first response data.
  • link address uses a non-secure protocol
  • convert the link address using the non-secure protocol to a link address using a secure protocol create and send a first network request to the server, and the first The web request includes a link address converted to use the secure protocol.
  • the link address using the http non-secure protocol is converted into a link address using the https security protocol through a correction method, and then the first network request is created and sent to the server, wherein, the first network request includes a link address converted to use the https security protocol.
  • the resource type requested by the first network may also be saved for subsequent use when the server returns the first response data, and then waits for the server to send the first response data.
  • the first network request is a network request of the main resource
  • the first response data also corresponds to the response data of the main resource
  • the first network request is a network request of the sub-resource
  • the first The response data also corresponds to the response data of the subresource.
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspend the network state machine of the browser, and disconnect the network of the browser Links, which can include:
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, use the first response data as the hijacked data, and the link used by the first network request
  • the address is sent to the server, the first response data and the link address used by the first network request are used for the server to perform data statistics and background optimization, suspend the network state machine of the browser, and disconnect the Browser's web link.
  • the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, suspend the network state machine of the browser, and disconnect the network of the browser Links, which can include:
  • the electronic device determines the resource type corresponding to the first response data; if the resource type corresponding to the first network request is the same as the first response data If the corresponding resource types are inconsistent, the electronic device suspends the network state machine of the browser, and disconnects the network link of the browser.
  • the electronic device determines the resource type corresponding to the first response data; if the resource type corresponding to the first network request is the same as the first response data If the corresponding resource types are inconsistent, the electronic device suspends the network state machine of the browser, and disconnects the network connection of the browser; the server stops sending web page data to the electronic device.
  • the electronic device determines the resource type corresponding to the first response data; if the resource type corresponding to the first network request is the same as the first response data If the corresponding resource types are inconsistent, the electronic device suspends the network state machine of the browser, disconnects the network connection of the browser, and displays an error page.
  • the electronic device determines the resource type corresponding to the first response data; if the resource type corresponding to the first network request is the same as the first response data If the corresponding resource types are inconsistent, the electronic device suspends the network state machine of the browser, disconnects the network link of the browser, and displays an error page; the server stops sending webpage data to the electronic device.
  • the resource type corresponding to the first response data (such as picture, css, js, binary data, etc.) is acquired.
  • the resource type of the first response data may be acquired by parsing the header of the first response data. If the resource type corresponding to the first response data is obtained successfully, then compare it with the resource type corresponding to the first network request.
  • the resource types are inconsistent, it is determined that the web page data accessed by the first network request is hijacked, and the hijacked web page data and the link address used by the first network request can be reported to the server for subsequent data statistics and background optimization, Then suspend the network state machine of the browser, disconnect the network link of the browser, and the server stops sending web page data to the electronic device, so as to avoid unnecessary traffic waste.
  • the resource type corresponding to the first response data is not successfully obtained, that is, the header of the first response data is not successfully parsed, and the resource type of the first response data is not obtained, then read the first response data For the first N bytes, the resource type of the first response data is acquired through a resource type conversion method, where N is an integer greater than 0.
  • the electronic device may pre-save a mapping relationship table between different bytes and resource types.
  • the resource type conversion is successful, that is, the converted resource type of the first response data is successfully obtained, then it is judged whether the converted resource type is consistent with the resource type corresponding to the network request, and the subsequent steps are similar to the above description, and will not be repeated here Repeat; if the resource type conversion is unsuccessful, the first response data is normal server response data by default, that is, the resource type corresponding to the first response data is consistent with the resource type corresponding to the first network request, and the first response data corresponds to the resource type corresponding to the first network request. A response data is analyzed to display the web page content after typesetting; and then wait for the server to return the response data corresponding to other network requests.
  • the electronic device can automatically switch from the link address using the non-secure protocol to the link address using the secure protocol.
  • the electronic device will record the resource type of each network request, then send the network request, wait for the server to send the response data, compare the resource type corresponding to the returned response data with the resource type corresponding to the network request, and if it finds a mismatch, it will be considered as web page data
  • the network request can be cut off, and the return of webpage data can be terminated, which solves the error data return caused by the hijacking of webpage data in the entire webpage; through this scheme, safe transmission is carried out in data transmission, and the hijacking of webpage data is also possible. It can be monitored and terminated, which greatly improves the security of the browser, avoids excessive hijacking that damages the interests of users, causes unnecessary economic losses, and improves user experience.
  • the web content is typed web content.
  • the first response data is parsed to display network content.
  • the electronic device parses the first response data to obtain network content, and finally uses a graphics processor to (graphics processing unit, GPU) displayed on electronic equipment.
  • graphics processor graphics processing unit
  • the electronic device acquires a link address for accessing a web page; creates a first network request according to the link address; the electronic device sends the first network request to the server; and receives the server's first response to the first network request Data, the first network request is sent by the electronic device through the browser and used to request access to web page data; if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data, then suspend The network state machine of the browser, and disconnect the network link of the browser; if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, then the first Response data is parsed to display network content.
  • the network state machine disconnects the network link of the browser; thus, the resource hijacking of accessing webpage data can be monitored and terminated, and the webpage data is hijacked to avoid traffic consumption in a timely manner, greatly improving the stability and security of the browser performance and, in turn, improve user experience. Furthermore, after using this solution, users can largely use the HTTPS security protocol when accessing webpage data, effectively avoiding tampering with the access protocol when accessing webpage data midway, and improving the security of accessing webpage data. If the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data, the first response data is analyzed to display the network content, which does not affect the user's normal access to web page data.
  • FIG. 3 it is a schematic diagram of an embodiment of a method for preventing hijacking of browser webpages in the embodiment of the present application.
  • the method embodiment is applied to electronic equipment, and the method embodiment may include:
  • the electronic device sends a first network request to the server.
  • steps 301-303 in the embodiment of the present application reference may be made to the description of steps 201-203 in the embodiment shown in FIG. 2 , which will not be repeated here.
  • judging whether the first network request includes a link address using a security protocol may include: if the first response data sent by the server is not received within a preset time period. Response data, then determine whether the first network request includes a link address using the security protocol.
  • suspend the network state machine of the browser disconnect the network link of the browser, convert the link address using a security protocol to a link address using a non-secure protocol, and create a second network request,
  • the second network request includes a link address converted to use the non-secure protocol, and the second network request is used for accessing web page data.
  • the first network request includes a link address using a security protocol
  • suspend the browser's network state machine and disconnect the browser's network link
  • use the link address of the security protocol Converting to a link address using a non-secure protocol
  • creating a second network request restoring the browser's network state machine, and rebuilding the browser's network link
  • the second network request includes converting to using the non-secure protocol
  • the link address of the second network request is used to access the webpage data again.
  • the electronic device sends the second network request to the server.
  • the electronic device saves the resource type corresponding to the second network request.
  • the electronic device waits for the server to send the first response data, and if the server does not receive the first response data sent by the server, then judge whether the first network request uses the link address of the security protocol , if the first network request uses the link address of the https security protocol, suspend the network state machine of the browser, disconnect the network link of the browser, and convert the https security protocol to the http non-secure protocol , and then restore the browser's network state machine, rebuild the browser's network link, recreate the second network request, and send the second network request to the server, wherein the second network request uses the http non-secure protocol link address.
  • the resource type requested by the second network will be saved, waiting for the server to send the second response data. It should be noted that the processing flow after sending the second network request is similar to the flow of returning the first response data in the embodiments shown in FIG. 1 and FIG. 2 , and reference may be made to the above description, and details are not repeated here.
  • the electronic device After the electronic device sends the first network request to the server, if the first response data sent by the server is not received, the electronic device can then judge whether the first network request sent at the beginning used the link address of the security protocol or not.
  • the terminal device may not support the webpage data access of the protocol. In order to give priority to ensuring the user's access to the webpage data, the security of the webpage data access may not be considered for the time being.
  • the link address using the secure protocol may be converted to the link address using the non-secure protocol, and a second network request is recreated and sent to the server, where the second network request includes the link address using the converted non-secure protocol. This ensures that users can normally access web page data and improves user experience.
  • the electronic device performs corresponding processing.
  • the electronic device performs corresponding processing, which may include:
  • the first network request does not include the link address using the security protocol, and the first network request is a network request for the main resource, report a network error code to the server;
  • the network request does not include the link address using the security protocol, and the network request is a sub-resource network request, then ignore the network request.
  • the electronic device waits for the server to send the first response data; Whether the request uses the link address of the security protocol or the link address of the non-secure protocol. If the link address of the http non-secure protocol is used, and the first network request is a network request of the main resource, the network error code will be reported to The server is used for subsequent background statistics and data optimization. Optionally, the electronic device displays an error page, prompting the user to fail to access the webpage. If the first network request is a sub-resource network request, then ignore the network request.
  • the electronic device obtains a link address for accessing a web page; creates a first network request according to the link address; the electronic device sends the first network request to the server; if the first response data is not received, Then judge whether the first network request includes the link address using the security protocol; if so, suspend the network state machine of the browser, and disconnect the network link of the browser, and convert the link address using the security protocol Create a second network request for a link address using a non-secure protocol, the second network request includes conversion to a link address using the non-secure protocol, and the second network request is used to access web page data; if the second network request If a network request does not include the link address using the security protocol, the electronic device performs corresponding processing.
  • users can largely use the https security protocol when accessing webpage data, effectively avoiding tampering with the access protocol when accessing webpage data midway, and improving the security of accessing webpage data.
  • the first network request includes the link address using the security protocol
  • the first response data sent by the server is not received
  • the link address using the security protocol can be converted to use
  • a second network request is created again, and the second network request includes the link address of the non-secure protocol. In this way, it is ensured that the user can normally access the webpage data, does not affect the use of the user, and improves the user experience.
  • FIG. 4 it is a schematic diagram of another embodiment of the method for preventing hijacking of browser webpages in the embodiment of the present application. It should be noted that, as shown in FIG. 4 , it is a schematic diagram of an overall frame of the embodiment shown in FIGS. 1-3 above. The steps appearing in FIG. 4 are not necessarily necessary steps, and the steps not appearing are also within the protection scope of the present application.
  • FIG. 5 it is a schematic diagram of an embodiment of a browser webpage anti-hijacking device in the embodiment of the present application, which may include:
  • the transceiver module 501 is configured to receive the first response data from the server to the first network request, the first network request is sent by the electronic device through the browser and is used to request access to web page data;
  • the processing module 502 is configured to suspend the network state machine of the browser and disconnect the network of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data Link.
  • processing module 502 is also configured to obtain a link address for accessing the webpage
  • the processing module 502 is further configured to create a first network request if the link address uses a security protocol, where the first network request includes a link address using the security protocol;
  • the processing module 502 is further configured to convert the link address using the non-secure protocol into a link address using a secure protocol if the link address uses a non-secure protocol, create a first network request, and create a second network request Include URLs converted to use said security protocol;
  • the transceiver module 501 is further configured to send the first network request to the server.
  • the processing module 502 is further configured to determine whether the first network request includes a link address using a security protocol if the first response data is not received; if so, suspend the browser's network State machine, and disconnect the network link of the browser, convert the link address using the security protocol to the link address using the non-secure protocol, create a second network request, and the second network request includes converting to using the non-secure protocol A link address of a security protocol, the second network request is used to request access to web page data;
  • the transceiver module 501 is further configured to send the second network request to the server.
  • the transceiver module 501 is further configured to report a network error code to the server if the first network request does not include a link address using a security protocol and the first network request is a network request for a main resource;
  • the processing module 502 is further configured to ignore the first network request if the first network request does not include a link address using a security protocol and the first network request is a sub-resource network request.
  • the processing module 502 is specifically configured to determine the resource type corresponding to the first response data if the first response data is sub-resource response data; if the resource type corresponding to the first network request is the same as If the resource types corresponding to the first response data are inconsistent, the network state machine of the browser is suspended, and the network link of the browser is disconnected.
  • the processing module 502 is specifically configured to determine the resource type corresponding to the first response data if the first response data is the response data of the main resource; if the resource type corresponding to the first network request is the same as If the resource types corresponding to the first response data are inconsistent, the network state machine of the browser is suspended, the network link of the browser is disconnected, and an error page is displayed.
  • the display module 503 is configured to analyze the first response data and display network content if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data.
  • FIG. 6A it is a schematic diagram of another embodiment of the electronic device in the embodiment of the present application, which may include the browser webpage anti-hijacking device as shown in FIG. 5 .
  • FIG. 6B it is a schematic diagram of another embodiment of the electronic device in the embodiment of the present application, which may include:
  • FIG. 6B is a block diagram showing a partial structure of a mobile phone related to the electronic device provided by the embodiment of the present application.
  • the mobile phone includes: a radio frequency (Radio Frequency, RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (wireless fidelity, Wi-Fi) module 670, a processing Device 680, and power supply 690 and other components.
  • RF Radio Frequency
  • the RF circuit 610 can be used for sending and receiving information or receiving and sending signals during a call. In particular, after receiving the downlink information from the base station, it is processed by the processor 680; in addition, the designed uplink data is sent to the base station.
  • the RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like.
  • RF circuitry 610 may also communicate with networks and other devices via wireless communications.
  • the above wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile communication (Global System of Mobile communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (Code Division Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 620 can be used to store software programs and modules, and the processor 680 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 620 .
  • the memory 620 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created by the use of mobile phones (such as audio data, phonebook, etc.), etc.
  • the memory 620 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
  • the input unit 630 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile phone.
  • the input unit 630 may include a touch panel 631 and other input devices 632 .
  • the touch panel 631 also referred to as a touch screen, can collect the user's touch operations on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 631 or near the touch panel 631). operation), and drive the corresponding connection device according to the preset program.
  • the touch panel 631 may include two parts, a touch detection device and a touch controller.
  • the touch detection device detects the user's touch orientation, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to the to the processor 680, and can receive and execute commands sent by the processor 680.
  • the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the input unit 630 may also include other input devices 632 .
  • other input devices 632 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 640 may be used to display information input by or provided to the user and various menus of the mobile phone.
  • the display unit 640 may include a display panel 641.
  • the display panel 641 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like.
  • the touch panel 631 may cover the display panel 641, and when the touch panel 631 detects a touch operation on or near it, it transmits to the processor 680 to determine the type of the touch event, and then the processor 680 determines the type of the touch event according to the The type provides a corresponding visual output on the display panel 641 .
  • the touch panel 631 and the display panel 641 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 can be integrated to form a mobile phone. Realize the input and output functions of the mobile phone.
  • the handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors.
  • the light sensor can include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 641 according to the brightness of the ambient light, and the proximity sensor can turn off the display panel 641 and/or when the mobile phone is moved to the ear. or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is stationary, and can be used to identify the application of mobile phone posture (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.
  • mobile phone posture such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tap
  • other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.
  • the audio circuit 660, the speaker 661 and the microphone 662 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 660 can transmit the electrical signal converted from the received audio data to the loudspeaker 661, and the loudspeaker 661 converts it into an audio signal output; After being received, it is converted into audio data, and then the audio data is processed by the output processor 680, and then sent to another mobile phone through the RF circuit 610, or the audio data is output to the memory 620 for further processing.
  • Wi-Fi is a short-distance wireless transmission technology.
  • the mobile phone can help users send and receive emails, browse web pages, and access streaming media through the Wi-Fi module 670, which provides users with wireless broadband Internet access.
  • Fig. 6B shows the Wi-Fi module 670, it can be understood that it is not an essential component of the mobile phone, and can be completely omitted as required without changing the essence of the invention.
  • the processor 680 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. By running or executing software programs and/or modules stored in the memory 620, and calling data stored in the memory 620, execution Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole.
  • the processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 680 .
  • the mobile phone also includes a power supply 690 (such as a battery) for supplying power to various components.
  • a power supply 690 (such as a battery) for supplying power to various components.
  • the power supply can be logically connected to the processor 680 through the power management system, so as to realize functions such as managing charging, discharging, and power consumption management through the power management system.
  • the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.
  • the RF circuit 610 is configured to receive the first response data from the server to the first network request, the first network request is sent by the electronic device through the browser and is used to request access to web page data;
  • Processor 680 configured to suspend the network state machine of the browser and disconnect the network of the browser if the resource type corresponding to the first network request is inconsistent with the resource type corresponding to the first response data Link.
  • the processor 680 is also configured to obtain a link address for accessing the webpage
  • the processor 680 is further configured to create a first network request if the link address uses a security protocol, where the first network request includes the link address using the security protocol;
  • the processor 680 is further configured to, if the link address uses a non-secure protocol, convert the link address using the non-secure protocol into a link address using a secure protocol, create a first network request, and create a first network request, and the second network request Include URLs converted to use said security protocol;
  • the RF circuit 610 is further configured to send the first network request to the server.
  • the processor 680 is further configured to determine whether the first network request includes a link address using a security protocol if the first response data is not received; if yes, suspend the browser's network State machine, and disconnect the network link of the browser, convert the link address using the security protocol to the link address using the non-secure protocol, create a second network request, and the second network request includes converting to using the non-secure protocol A link address of a security protocol, the second network request is used to request access to web page data;
  • the RF circuit 610 is further configured to send the second network request to the server.
  • the RF circuit 610 is further configured to report a network error code to the server if the first network request does not include a link address using a security protocol and the first network request is a network request for a main resource;
  • the processor 680 is further configured to ignore the first network request if the first network request does not include a link address using a security protocol and the first network request is a sub-resource network request.
  • the processor 680 is specifically configured to determine a resource type corresponding to the first response data if the first response data is sub-resource response data; if the resource type corresponding to the first network request is the same as If the resource types corresponding to the first response data are inconsistent, the network state machine of the browser is suspended, and the network link of the browser is disconnected.
  • the processor 680 is specifically configured to determine the resource type corresponding to the first response data if the first response data is the response data of the main resource; if the resource type corresponding to the first network request is the same as If the resource types corresponding to the first response data are inconsistent, the network state machine of the browser is suspended, the network link of the browser is disconnected, and an error page is displayed.
  • the display unit 640 is configured to analyze the first response data and display network content if the resource type corresponding to the first network request is consistent with the resource type corresponding to the first response data.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server, or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • wired eg, coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless eg, infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk (SSD)).
  • the disclosed system, device and method can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
  • the integrated unit is realized in the form of a software function unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disc, etc., which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请实施例公开了一种浏览器网页防劫持的方法、装置、电子设备及计算机可读存储介质,用于可以有效防止网络劫持,大大提高了浏览器访问网页的安全性,提高了用户体验。本申请实施例方法包括:接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。

Description

浏览器网页防劫持的方法、装置、电子设备及存储介质
本申请要求于2021年06月02日提交中国专利局、申请号为2021106144143、申请名称为“浏览器网页防劫持的方法、装置、电子设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及互联网领域,尤其涉及一种浏览器网页防劫持的方法、装置、电子设备及计算机可读存储介质。
背景技术
在用户使用浏览器访问网页的过程中有时会发生网络劫持。网络劫持会改变网页的内容,并导致诸如消耗大量的数据流量等问题。在相关技术中,对于网络劫持都是通过在服务器方面部署超文本安全传输协议(Hyper Text Transfer Protocol over Secure Socket Layer,https)进行数据传输中的防劫持。但是,当浏览器访问网页得到数据后,对于数据的防劫持这方面还没有具体的处理方式。
发明内容
本申请实施例提供了一种浏览器网页防劫持的方法、装置、电子设备及计算机可读存储介质,可以有效防止网络劫持,大大提高了浏览器访问网页的安全性,提高了用户体验。
第一方面本申请提供一种浏览器网页防劫持的方法,所述方法应用于电子设备,所述方法可以包括:
接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
第二方面本申请提供一种浏览器网页防劫持的装置,可以包括:
收发模块,用于接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
处理模块,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
第三方面本申请提供一种电子设备,可以包括:
存储有可执行程序代码的存储器;
与所述存储器耦合的处理器和收发器;
所述收发器和所述处理器调用所述存储器中存储的所述可执行程序代码,用于执行如本申请第一方面所述的方法。
第四方面本申请提供一种计算机可读存储介质,包括指令,当其在处理器上运行时,使得处理器执行本申请第一方面所述的方法。
本申请还提供一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行本申请第一方面所述的方法。
本申请还提供一种应用发布平台,所述应用发布平台用于发布计算机程序产品,其中,当所述计算机程序产品在计算机上运行时,使得所述计算机执行本申请第一方面所述的方法。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例和现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,还可以根据这些附图获得其它的附图。
图1所示,为本申请实施例中浏览器网页防劫持的方法的一个实施例示意图;
图2为本申请实施例中浏览器网页防劫持的方法的另一个实施例示意图;
图3为本申请实施例中浏览器网页防劫持的方法的另一个实施例示意图;
图4为本申请实施例中浏览器网页防劫持的方法的另一个实施例示意图;
图5为本申请实施例中浏览器网页防劫持的装置的一个实施例示意图;
图6A为本申请实施例中电子设备的一个实施例示意图;
图6B为本申请实施例中电子设备的另一个实施例示意图。
具体实施方式
本申请实施例提供了一种浏览器网页防劫持的方法、装置、电子设备及计算机可读存储介质,用于可以有效防止网络劫持,大大提高了浏览器访问网页的安全性,提高了用户体验。
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分的实施例,而不是全部的实施例。基于本申请中的实施例,都应当属于本申请保护的范围。
在用户使用浏览器访问网页的过程中,有时会发生网络劫持。网络劫持会改变网页的内容,并导致诸如用户在访问网页时会消耗大量的数据流量等问题。例如用户在访问某些小说网页时,可能在小说网页停留的时间较长,如果小说网页内容被劫持,使得用户在看小说时后台一直在下载某个游戏或者网页上因劫持而增加一些不必要的网页元素,这都会造成大量的流量损耗,导致在用户未知的场景下造成经济损失,损害了用户的利益。现有技术中,对于网络劫持的解决方法是通过在服务器方面部署https安全协议进行数据传输中的防劫持,但是对于当浏览器访问得到网页数据后,这方面的防劫持还没有具体的实现方式。
而且现有技术完全依赖于网络协议,在数据传输过程中通过数据加密进行防劫持,这种方式虽然在一定程度上可以防止被篡改,但也可能被以欺骗中转服务器的方式进行篡改,所以也不能很好的避免劫持。而且,很多用户在输入网页地址时,都不会特意加上https安全协议,导致浏览器会主动的添加上http非安全协议,这也会增加网页劫持的风险。另外,如果网页数据被篡改了,例如网页元素是一张图片的链接,但是这个链接被劫持后,返回的第一响应数据却是一个应用apk的数据,这样就会造成用户访问网页数据后,返回一个应用数据,比如本来访问的是一个4MB的图片,结果返回的是400MB大小的应用apk,这样用户就会在不知不觉中花费大量不必要的流量。对于类似的场景目前浏览器侧还没有很好的解决方案。
在本申请实施例中,电子设备可以是手机(Mobile Phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端设备、无人驾驶(self driving)中的无线终端设备、远程医疗(remote medical)中的无线终端设备、智能电网(smart grid)中的无线终端设备、运输安全(transportation safety)中的无线终端设备、智慧城市(smart city)中的无线终端设备或智慧家庭(smart home)中的无线终端设备等。
作为示例而非限定,在本申请实施例中,该终端设备还可以是可穿戴设备。可穿戴设 备也可以称为穿戴式智能设备,是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如眼镜、手套、手表、服饰及鞋等。可穿戴设备即直接穿在身上,或是整合到用户的衣服或配件的一种便携式设备。可穿戴设备不仅仅是一种硬件设备,更是通过软件支持以及数据交互、云端交互来实现强大的功能。广义穿戴式智能设备包括功能全、尺寸大、可不依赖智能手机实现完整或者部分的功能,例如:智能手表或智能眼镜等,以及只专注于某一类应用功能,需要和其它设备如智能手机配合使用,如各类进行体征监测的智能手环、智能首饰等。
本申请提供一种浏览器网页防劫持的方法,所述方法应用于电子设备,所述方法包括:接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,所述接收服务器对第一网络请求的第一响应数据之前,所述方法还包括:获取用于访问网页的链接地址;若所述链接地址使用的是安全协议,则创建并向所述服务器发送第一网络请求,所述第一网络请求包括使用所述安全协议的链接地址;若所述链接地址使用的是非安全协议,则将使用所述非安全协议的链接地址转换为使用安全协议的链接地址,创建并向所述服务器发送第一网络请求,所述第一网络请求包括转换为使用所述安全协议的链接地址。
可选的,所述获取用于访问网页的链接地址,包括:响应用户输入链接地址的操作,获取用于访问网页的链接地址,判断所述链接地址是否使用的安全协议。
可选的,所述获取用于访问网页的链接地址,包括:响应用户输入链接地址的操作,获取用于访问网页的链接地址;判断所述链接地址是否为有效的输入地址,若是有效的输入地址,则判断所述链接地址是否使用的安全协议;若不是有效的输入地址,则报错。
可选的,所述方法还包括:若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址;若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建并向所述服务器发送第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于请求访问网页数据。
可选的,所述方法还包括:若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为主资源的网络请求,则向所述服务器上报网络错误码;若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为子资源的网络请求,则忽略所述第一网络请求。
可选的,所述若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址,包括:若在预置时长内,未接收到所述服务器发送的第一响应数据,则判断所述第一网络请求是否包括使用所述安全协议的链接地址。
可选的,所述若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建并向所述服务器发送第二网络请求,包括:若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建所述第二网络请求,恢复所述浏览器的网络状态机、重建所述浏览器的网络链接,并向所述服务器发送第二网络请求。
可选的,所述方法还包括:保存所述第二网络请求对应的资源类型。
可选的,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类 型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:若所述第一响应数据是子资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:若所述第一响应数据是主资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,以及显示错误页面。
可选的,所述方法还包括:若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
可选的,所述网络内容为排版后的网络内容。
可选的,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:
若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,停止接收所述服务器发送的网页数据;或,
若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一网络请求使用的链接地址向所述服务器发送,所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据向所述服务器发送,所述第一响应数据用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据,以及所述第一网络请求使用的链接地址向所述服务器发送,所述第一响应数据和所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接。
可选的,若所述第一网络请求是主资源的网络请求,则所述第一响应数据对应是所述主资源的响应数据;若所述第一网络请求是子资源的网络请求,则所述第一响应数据对应是所述子资源的响应数据。
可选的,所述第一网络请求对应的资源类型包括:图片、音频、视频、层叠样式表、JavaScript、二进制数据;
所述第一响应数据对应的资源类型包括:图片、音频、视频、层叠样式表、JavaScript、二进制数据。
可选的,所述方法还包括:保存所述第一网络请求对应的资源类型。
在本申请实施例中,提出了一种浏览器网页防劫持的方法,在很大程度上避免用户的流量被恶意消耗,损害用户的利益,大大的提高了用户的体验。
如图1所示,为本申请实施例中浏览器网页防劫持的方法的一个实施例示意图,该方法实施例应用于电子设备,该方法实施例可以包括:
101、接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据。
在一种实施方式中,电子设备在接收服务器对第一网络请求的第一响应数据之前,需要创建并向服务器发送第一网络请求,该第一网络请求用于所述电子设备通过浏览器请求访问网页数据。
102、若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
在一种实施方式中,所述第一网络请求对应的资源类型可以包括:图片、音频、视频、css(Cascading Style Sheets,层叠样式表)、js(JavaScript)、二进制数据等。
在一种实施方式中,所述第一响应数据对应的资源类型可以包括:图片、音频、视频、css、js、二进制数据等。
可以理解的是,如果该第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,例如:该第一网络请求对应的资源类型为图片,该第一响应数据对应的资源类型为二进制数据;或,该第一网络请求对应的资源类型为js(JavaScript),该第一响应数据对应的资源类型为css(Cascading Style Sheets,层叠样式表),则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
在本申请实施例中,接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。如果第一网络请求对应的资源类型与第一响应数据对应的资源类型不一致,则认为访问的网页数据被劫持,所以,电子设备可以暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,保证数据访问的安全。即可以有效防止网络劫持,大大提高了浏览器访问网页的安全性,提高了用户体验。
如图2所示,为本申请实施例中浏览器网页防劫持的方法的一个实施例示意图,该方法实施例应用于电子设备,该方法实施例可以包括:
201、获取用于访问网页的链接地址。
可选的,电子设备获取用于访问网页的链接地址,可以包括:电子设备响应用户输入链接地址的操作,获取用于访问网页的链接地址,判断所述链接地址是否使用的安全协议。
可选的,电子设备获取用于访问网页的链接地址,可以包括:电子设备响应用户输入链接地址的操作,获取用于访问网页的链接地址;判断所述链接地址是否为有效的输入地址,若是有效的输入地址,则判断所述链接地址是否使用的安全协议;若不是有效的输入地址,则报错。
示例性的,电子设备检测到用户启动浏览器,输入链接地址准备打开网页时,电子设备响应用户输入链接地址的操作,判断该链接地址是否是有效的输入地址,若是有效的输入地址,则判断该链接地址是否使用的安全协议;若不是有效的输入地址,则报错。
202、根据所述链接地址创建第一网络请求。
203、电子设备向服务器发送第一网络请求。
可选的,所述电子设备保存所述第一网络请求对应的资源类型。
可选的,电子设备根据所述链接地址创建第一网络请求,向所述服务器发送所述第一网络请求,可以包括:
(1)若所述链接地址使用的是安全协议,则创建并向所述服务器发送第一网络请求,所述第一网络请求包括使用所述安全协议的链接地址。
示例性的,如果该链接地址使用的是安全协议,则所述电子设备创建第一网络请求,其中,所述第一网络请求包括使用https安全协议的链接地址,并且向服务器发送第一网络请求;还可以保存该第一网络请求的资源类型,用于后续服务器返回第一响应数据时使 用,然后开始等待服务器发送第一响应数据。
(2)若所述链接地址使用的是非安全协议,则将使用所述非安全协议的链接地址转换为使用安全协议的链接地址,创建并向所述服务器发送第一网络请求,所述第一网络请求包括转换为使用所述安全协议的链接地址。
示例性的,如果该链接地址使用的是非安全协议,则通过纠正方式,将使用http非安全协议的链接地址转换为使用https安全协议的链接地址,然后再创建并向服务器发送第一网络请求,其中,所述第一网络请求包括转换为使用https安全协议的链接地址。还可以保存该第一网络请求的资源类型,用于后续服务器返回第一响应数据时使用,然后开始等待服务器发送第一响应数据。
204、接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据。
可以理解的是,该第一网络请求是主资源的网络请求,那么,该第一响应数据也对应是主资源的响应数据;该第一网络请求是子资源的网络请求,那么,该第一响应数据也对应是子资源的响应数据。
205、若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,可以包括:
(1)若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,停止接收所述服务器发送的网页数据;或,
(2)若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一网络请求使用的链接地址向所述服务器发送,所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
(3)若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据向所述服务器发送,所述第一响应数据用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
(4)若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据,以及所述第一网络请求使用的链接地址向所述服务器发送,所述第一响应数据和所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接。
可选的,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,可以包括:
(1)若所述第一响应数据是子资源的响应数据,则电子设备确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则电子设备暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
(2)若所述第一响应数据是子资源的响应数据,则电子设备确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则电子设备暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接;所述服务器停止向电子设备发送网页数据。
(3)若所述第一响应数据是主资源的响应数据,则电子设备确定所述第一响应数据对 应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则电子设备暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,以及显示错误页面。
(4)若所述第一响应数据是主资源的响应数据,则电子设备确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则电子设备暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,显示错误页面;所述服务器停止向电子设备发送网页数据。
示例性的,如果电子设备成功接收第一响应数据,则获取所述第一响应数据对应的资源类型(例如是图片,css,js,二进制数据等类型)。可选的,可以通过解析所述第一响应数据的包头,获取所述第一响应数据的资源类型。如果成功获取第一响应数据对应的资源类型,那么,再和第一网络请求对应的资源类型做对比。如果资源类型不一致,则确定该第一网络请求访问的网页数据被劫持,把被劫持的网页数据和所述第一网络请求使用的链接地址可以上报给服务器,用于后续数据统计和后台优化,然后暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,服务器停止向电子设备发送网页数据,避免不必要的流量浪费。
如果未成功获取所述第一响应数据对应的资源类型,即没有成功解析所述第一响应数据的包头,未获取所述第一响应数据的资源类型,则读取所述第一响应数据中前N个字节,通过资源类型转换方法,获取所述第一响应数据的资源类型,N为大于0的整数。其中,电子设备中可以预先保存有不同字节与资源类型的映射关系表。
如果资源类型转换成功,即成功获取所述第一响应数据转换后的资源类型,则判断转换后的资源类型与网络请求对应的资源类型是否一致,后续步骤与上文描述类似,此处不再赘述;如果资源类型转换不成功,则默认该第一响应数据是正常的服务器响应数据,即该第一响应数据对应的资源类型与所述第一网络请求对应的资源类型一致,对所述第一响应数据进行解析显示排版后的网页内容;然后等待服务器返回其他的网络请求对应的响应数据。
可以理解的是,电子设备在获取用于访问网页的链接地址后,可以自动从使用非安全协议的链接地址转换为使用安全协议的链接地址。电子设备会记录每个网络请求的资源类型,然后发送网络请求,等待服务器发送响应数据,根据返回响应数据对应的资源类型和网络请求对应的资源类型对比,如果发现不匹配,则认为是网页数据被劫持,然后可以断掉网络请求,终止网页数据返回,这样就解决了整个网页内网页数据被劫持导致的错误数据返回;通过这个方案在数据传输中进行了安全传输,对于网页数据的劫持也能进行监控和终止,大大提高了浏览器的安全性,避免了过多的劫持损害用户的利益,造成不必要的经济损失,提高用户体验。
206、若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
可选的,所述网络内容为排版后的网络内容。
在一些实施方式中,若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
示例性的,若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则电子设备对所述第一响应数据进行解析,得到网络内容,最后通过图形处理器(graphics processing unit,GPU)在电子设备上显示。
在本申请实施例中,电子设备获取用于访问网页的链接地址;根据所述链接地址创建第一网络请求;电子设备向服务器发送第一网络请求;接收服务器对第一网络请求的第一 响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
即在发送第一网络请求返回第一响应数据后,可以判断所述第一网络请求对应的资源类型和服务器返回的第一响应数据对应的资源类型是否一致,若不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;从而对于访问网页数据的资源劫持可以进行监控和终止,及时的避免网页数据被劫持导致消耗流量,大大提高了浏览器的稳定性和安全性,进而,提高用户体验。进一步的,使用该方案后,可以让用户访问网页数据时很大程度上采用https安全协议进行访问,有效避免在中途访问网页数据时篡改访问协议,提高访问网页数据的安全性。若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容,不影响用户正常访问网页数据。
如图3所示,为本申请实施例中浏览器网页防劫持的方法的一个实施例示意图,该方法实施例应用于电子设备,该方法实施例可以包括:
301、获取用于访问网页的链接地址。
302、根据所述链接地址创建第一网络请求。
303、电子设备向服务器发送第一网络请求。
需要说明的是,本申请实施例中步骤301-303可以参考图2所示实施例中步骤201-203的说明,此处不再赘述。
304、若未接收到第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址。
可选的,若未接收到第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址,可以包括:若在预置时长内,未接收到所述服务器发送的第一响应数据,则判断所述第一网络请求是否包括使用所述安全协议的链接地址。
305、若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于访问网页数据。
可选的,若所述第一网络请求包括使用安全协议的链接地址,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用所述安全协议的链接地址转换为使用非安全协议的链接地址,创建第二网络请求,恢复所述浏览器的网络状态机、重建所述浏览器的网络链接,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于再次访问网页数据。
306、电子设备向服务器发送所述第二网络请求。
可选的,所述电子设备保存所述第二网络请求对应的资源类型。
示例性的,电子设备在发送第一网络请求之后,等待服务器发送第一响应数据,如果服务器未接收到服务器发送的第一响应数据,则判断所述第一网络请求是否使用安全协议的链接地址,如果所述第一网络请求使用的是https安全协议的链接地址,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将https安全协议转换为http非安全协议,然后恢复所述浏览器的网络状态机、重建所述浏览器的网络链接,重新创建第二网络请求,并向服务器发送第二网络请求,其中,第二网络请求使用http非安全协议的链接 地址。同时将保存该第二网络请求的资源类型,等待服务器发送第二响应数据。需要说明的是,发送第二网络请求之后的处理流程,与图1和图2所述实施例中返回第一响应数据的流程类似,可参考上文中的描述,此处不再赘述。
在电子设备向服务器发送第一网络请求后,如果未接收到服务器发送的第一响应数据,则电子设备可以再去判断下当初发送的第一网络请求使用的是安全协议的链接地址,还是非安全协议的链接地址,如果使用的是安全协议的链接地址,有可能终端设备不支持该协议的网页数据访问,为了优先保证用户访问网页数据的需求,暂时可以不考虑访问网页数据的安全性,可以将使用安全协议的链接地址转换为使用非安全协议的链接地址,再次创建并向服务器发送第二网络请求,该第二网络请求包括使用转换为非安全协议的链接地址。从而保证用户可以正常访问网页数据,提高用户体验。
307、若所述第一网络请求未包括使用所述安全协议的链接地址,则电子设备进行相应处理。
若所述第一网络请求未包括使用所述安全协议的链接地址,则电子设备进行相应处理,可以包括:
若所述第一网络请求未包括使用所述安全协议的链接地址,且所述第一网络请求为主资源的网络请求,则将网络错误码向所述服务器上报;
若所述第一网络请求未包括使用所述安全协议的链接地址,且所述网络请求为子资源的网络请求,则忽略所述网络请求。
示例性的,电子设备在发送第一网络请求之后,等待服务器发送第一响应数据,如果电子设备未接收到服务器发送的第一响应数据,则电子设备可以再去判断下当初发送的第一网络请求使用的是安全协议的链接地址,还是非安全协议的链接地址,如果使用的是http非安全协议的链接地址,且该第一网络请求是主资源的网络请求,则将网络错误码上报给服务器,用于后续后台统计和数据优化。可选的,电子设备显示错误页面,提示用户访问网页失败。如果该第一网络请求是子资源网络请求,则忽略该网络请求。
在本申请实施例中,电子设备获取用于访问网页的链接地址;根据所述链接地址创建第一网络请求;电子设备向服务器发送第一网络请求;若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址;若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于访问网页数据;若所述第一网络请求未包括使用所述安全协议的链接地址,则电子设备进行相应处理。使用该方案后,可以让用户访问网页数据时很大程度上采用https安全协议进行访问,有效避免在中途访问网页数据时篡改访问协议,提高访问网页数据的安全性。
进一步的,在向服务器发送第一网络请求之后,该第一网络请求包括使用安全协议的链接地址,未收到服务器发送的第一响应数据,那么,可以将使用安全协议的链接地址转换为使用非安全协议的链接地址,再次创建第二网络请求,该第二网络请求包括使用非安全协议的链接地址。从而保证用户可以正常访问网页数据,不影响用户的使用,提高用户体验。
需要说明的是,图1-图3所示的实施例可以互相结合,而结合起来的实施例,也在本申请的保护范围内。如图4所示,为本申请实施例中关于浏览器网页防劫持的方法的另一个实施例示意图。需要说明的是,图4所示,是关于上述图1-图3所示实施例的一个整体的框架示意图。在图4中出现的步骤也不一定是必要的步骤,未出现的步骤,也在本申请的保护范围内。
如图5所示,为本申请实施例中浏览器网页防劫持的装置的一个实施例示意图,可以包括:
收发模块501,用于接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
处理模块502,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,处理模块502,还用于获取用于访问网页的链接地址;
处理模块502,还用于若所述链接地址使用的是安全协议,则创建第一网络请求,所述第一网络请求包括使用所述安全协议的链接地址;
或,
处理模块502,还用于若所述链接地址使用的是非安全协议,则将使用所述非安全协议的链接地址转换为使用安全协议的链接地址,创建第一网络请求,所述第二网络请求包括转换为使用所述安全协议的链接地址;
收发模块501,还用于向所述服务器发送所述第一网络请求。
可选的,处理模块502,还用于若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址;若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于请求访问网页数据;
收发模块501,还用于向所述服务器发送所述第二网络请求。
可选的,收发模块501,还用于若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为主资源的网络请求,则向所述服务器上报网络错误码;
处理模块502,还用于若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为子资源的网络请求,则忽略所述第一网络请求。
可选的,处理模块502,具体用于若所述第一响应数据是子资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,处理模块502,具体用于若所述第一响应数据是主资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,以及显示错误页面。
可选的,显示模块503,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
如图6A所示,为本申请实施例中电子设备的另一个实施例示意图,可以包括如图5所示的浏览器网页防劫持的装置。
如图6B所示,为本申请实施例中电子设备的另一个实施例示意图,可以包括:
图6B示出的是与本申请实施例提供的电子设备相关的手机的部分结构的框图。参考图6B,手机包括:射频(Radio Frequency,RF)电路610、存储器620、输入单元630、显示单元640、传感器650、音频电路660、无线保真(wireless fidelity,Wi-Fi)模块670、处理器680、以及电源690等部件。本领域技术人员可以理解,图6B中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图6B对手机的各个构成部件进行具体的介绍:
RF电路610可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器680处理;另外,将设计上行的数据发送给基站。通常,RF电路610包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路610还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器620可用于存储软件程序以及模块,处理器680通过运行存储在存储器620的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器620可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器620可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元630可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元630可包括触控面板631以及其他输入设备632。触控面板631,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板631上或在触控面板631附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器680,并能接收处理器680发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板631。除了触控面板631,输入单元630还可以包括其他输入设备632。具体地,其他输入设备632可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元640可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元640可包括显示面板641,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板641。进一步的,触控面板631可覆盖显示面板641,当触控面板631检测到在其上或附近的触摸操作后,传送给处理器680以确定触摸事件的类型,随后处理器680根据触摸事件的类型在显示面板641上提供相应的视觉输出。虽然在图6B中,触控面板631与显示面板641是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板631与显示面板641集成而实现手机的输入和输出功能。
手机还可包括至少一种传感器650,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板641的亮度,接近传感器可在手机移动到耳边时,关闭显示面板641和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手 机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路660、扬声器661,传声器662可提供用户与手机之间的音频接口。音频电路660可将接收到的音频数据转换后的电信号,传输到扬声器661,由扬声器661转换为声音信号输出;另一方面,传声器662将收集的声音信号转换为电信号,由音频电路660接收后转换为音频数据,再将音频数据输出处理器680处理后,经RF电路610以发送给比如另一手机,或者将音频数据输出至存储器620以便进一步处理。
Wi-Fi属于短距离无线传输技术,手机通过Wi-Fi模块670可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6B示出了Wi-Fi模块670,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器680是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器620内的软件程序和/或模块,以及调用存储在存储器620内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器680可包括一个或多个处理单元;优选的,处理器680可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器680中。
手机还包括给各个部件供电的电源690(比如电池),优选的,电源可以通过电源管理系统与处理器680逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。
在本申请实施例中,RF电路610,用于接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
处理器680,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,处理器680,还用于获取用于访问网页的链接地址;
处理器680,还用于若所述链接地址使用的是安全协议,则创建第一网络请求,所述第一网络请求包括使用所述安全协议的链接地址;
或,
处理器680,还用于若所述链接地址使用的是非安全协议,则将使用所述非安全协议的链接地址转换为使用安全协议的链接地址,创建第一网络请求,所述第二网络请求包括转换为使用所述安全协议的链接地址;
RF电路610,还用于向所述服务器发送所述第一网络请求。
可选的,处理器680,还用于若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址;若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于请求访问网页数据;
RF电路610,还用于向所述服务器发送所述第二网络请求。
可选的,RF电路610,还用于若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为主资源的网络请求,则向所述服务器上报网络错误码;
处理器680,还用于若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为子资源的网络请求,则忽略所述第一网络请求。
可选的,处理器680,具体用于若所述第一响应数据是子资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
可选的,处理器680,具体用于若所述第一响应数据是主资源的响应数据,则确定所述第一响应数据对应的资源类型;若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,以及显示错误页面。
可选的,显示单元640,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码 的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (20)

  1. 一种浏览器网页防劫持的方法,其特征在于,所述方法应用于电子设备,所述方法包括:
    接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
  2. 根据权利要求1所述的方法,其特征在于,所述接收服务器对第一网络请求的第一响应数据之前,所述方法还包括:
    获取用于访问网页的链接地址;
    若所述链接地址使用的是安全协议,则创建并向所述服务器发送第一网络请求,所述第一网络请求包括使用所述安全协议的链接地址;
    若所述链接地址使用的是非安全协议,则将使用所述非安全协议的链接地址转换为使用安全协议的链接地址,创建并向所述服务器发送第一网络请求,所述第一网络请求包括转换为使用所述安全协议的链接地址。
  3. 根据权利要求2所述的方法,其特征在于,所述获取用于访问网页的链接地址,包括:
    响应用户输入链接地址的操作,获取用于访问网页的链接地址,判断所述链接地址是否使用的安全协议。
  4. 根据权利要求2所述的方法,其特征在于,所述获取用于访问网页的链接地址,包括:
    响应用户输入链接地址的操作,获取用于访问网页的链接地址;判断所述链接地址是否为有效的输入地址,若是有效的输入地址,则判断所述链接地址是否使用的安全协议;若不是有效的输入地址,则报错。
  5. 根据权利要求1-4中任一项所述的方法,其特征在于,所述方法还包括:
    若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址;
    若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建并向所述服务器发送第二网络请求,所述第二网络请求包括转换为使用所述非安全协议的链接地址,所述第二网络请求用于请求访问网页数据。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为主资源的网络请求,则向所述服务器上报网络错误码;
    若所述第一网络请求未包括使用安全协议的链接地址且所述第一网络请求为子资源的网络请求,则忽略所述第一网络请求。
  7. 根据权利要求5或6所述的方法,其特征在于,所述若未接收到所述第一响应数据,则判断所述第一网络请求是否包括使用安全协议的链接地址,包括:
    若在预置时长内,未接收到所述服务器发送的第一响应数据,则判断所述第一网络请求是否包括使用所述安全协议的链接地址。
  8. 根据权利要求5-7中任一项所述的方法,其特征在于,所述若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建并向所述服务器发送第二网络请求,包括:
    若包括,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,将使用安全协议的链接地址转换为使用非安全协议的链接地址,创建所述第二网络请求,恢复所述浏览器的网络状态机、重建所述浏览器的网络链接,并向所述服务器发送第二网络请求。
  9. 根据权利要求5-8中任一项所述的方法,其特征在于,所述方法还包括:
    保存所述第二网络请求对应的资源类型。
  10. 根据权利要求1-9中任一项所述的方法,其特征在于,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:
    若所述第一响应数据是子资源的响应数据,则确定所述第一响应数据对应的资源类型;
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
  11. 根据权利要求1-10中任一项所述的方法,其特征在于,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:
    若所述第一响应数据是主资源的响应数据,则确定所述第一响应数据对应的资源类型;
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,以及显示错误页面。
  12. 根据权利要求1-11中任一项所述的方法,其特征在于,所述方法还包括:
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型一致,则对所述第一响应数据进行解析显示网络内容。
  13. 根据权利要求12所述的方法,其特征在于,所述网络内容为排版后的网络内容。
  14. 根据权利要求1-13中任一项所述的方法,其特征在于,所述若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接,包括:
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,断开所述浏览器的网络链接,停止接收所述服务器发送的网页数据;或,
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一网络请求使用的链接地址向所述服务器发送,所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据向所述服务器发送,所述第一响应数据用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接;或,
    若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则将所述第一响应数据作为被劫持数据,以及所述第一网络请求使用的链接地址向所述服务器发送,所述第一响应数据和所述第一网络请求使用的链接地址用于所述服务器进行数据统计和后台优化,暂停所述浏览器的网络状态机,断开所述浏览器的网络链接。
  15. 根据权利要求1-14中任一项所述的方法,其特征在于,若所述第一网络请求是主资源的网络请求,则所述第一响应数据对应是所述主资源的响应数据;若所述第一网络请求是子资源的网络请求,则所述第一响应数据对应是所述子资源的响应数据。
  16. 根据权利要求1-15中任一项所述的方法,其特征在于,所述第一网络请求对应的 资源类型包括:图片、音频、视频、层叠样式表、JavaScript、二进制数据;
    所述第一响应数据对应的资源类型包括:图片、音频、视频、层叠样式表、JavaScript、二进制数据。
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    保存所述第一网络请求对应的资源类型。
  18. 一种浏览器网页防劫持的装置,其特征在于,包括:
    收发模块,用于接收服务器对第一网络请求的第一响应数据,所述第一网络请求由所述电子设备通过浏览器发送并用于请求访问网页数据;
    处理模块,用于若所述第一网络请求对应的资源类型与所述第一响应数据对应的资源类型不一致,则暂停所述浏览器的网络状态机,并断开所述浏览器的网络链接。
  19. 一种电子设备,其特征在于,包括:
    存储有可执行程序代码的存储器;
    与所述存储器耦合的收发器和处理器;
    所述收发器和所述处理器调用所述存储器中存储的所述可执行程序代码,用于执行如权利要求1-17中任一项所述的方法。
  20. 一种计算机可读存储介质,包括指令,当其在处理器上运行时,使得处理器执行如权利要求1-17中任一项所述的方法。
PCT/CN2022/089299 2021-06-02 2022-04-26 浏览器网页防劫持的方法、装置、电子设备及存储介质 WO2022252882A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110614414.3A CN113395337B (zh) 2021-06-02 2021-06-02 浏览器网页防劫持的方法、装置、电子设备及存储介质
CN202110614414.3 2021-06-02

Publications (1)

Publication Number Publication Date
WO2022252882A1 true WO2022252882A1 (zh) 2022-12-08

Family

ID=77619978

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/089299 WO2022252882A1 (zh) 2021-06-02 2022-04-26 浏览器网页防劫持的方法、装置、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN113395337B (zh)
WO (1) WO2022252882A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116912669A (zh) * 2023-09-11 2023-10-20 中国物品编码中心 一种网页劫持监测方法、系统、电子设备和存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395337B (zh) * 2021-06-02 2022-09-27 Oppo广东移动通信有限公司 浏览器网页防劫持的方法、装置、电子设备及存储介质
CN114222301B (zh) * 2021-12-13 2024-04-12 奇安盘古(上海)信息技术有限公司 诈骗站点处理方法、装置及存储介质
CN115766685A (zh) * 2022-10-24 2023-03-07 加客云科技(河北)有限公司 一种防止http的get请求被劫持的方法
CN116980236B (zh) * 2023-09-25 2024-01-09 腾讯科技(深圳)有限公司 网络安全检测方法、装置、设备及存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078312A1 (en) * 2000-04-06 2001-10-18 Predictive Systems, Inc. Method and system for website content integrity
JP2007128119A (ja) * 2004-12-17 2007-05-24 Pcsafe Inc Url、ウェブページおよびコンテンツをフィルタ処理する方法およびシステム
CN104079673A (zh) * 2014-07-30 2014-10-01 北京奇虎科技有限公司 一种应用下载中防止dns劫持的方法、装置和系统
CN105245518A (zh) * 2015-09-30 2016-01-13 小米科技有限责任公司 网址劫持的检测方法及装置
CN108768870A (zh) * 2018-05-04 2018-11-06 Oppo广东移动通信有限公司 流量控制方法、装置及移动终端
CN108920589A (zh) * 2018-06-26 2018-11-30 百度在线网络技术(北京)有限公司 浏览劫持识别方法、装置、服务器及存储介质
CN109861947A (zh) * 2017-11-30 2019-06-07 腾讯科技(武汉)有限公司 一种网络劫持处理方法及装置、电子设备
CN113395337A (zh) * 2021-06-02 2021-09-14 深圳市中科明望通信软件有限公司 浏览器网页防劫持的方法、装置、电子设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1610518A1 (en) * 2004-06-21 2005-12-28 Ehsan Aboual Chamat Authentication system and security device
CN103618766B (zh) * 2013-11-14 2018-01-26 北京奇虎科技有限公司 一种进行网页游戏交互的方法和网页游戏交互服务器
CN106911693B (zh) * 2017-02-27 2020-11-10 百度在线网络技术(北京)有限公司 用于检测网页内容劫持的方法、装置和终端设备

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001078312A1 (en) * 2000-04-06 2001-10-18 Predictive Systems, Inc. Method and system for website content integrity
JP2007128119A (ja) * 2004-12-17 2007-05-24 Pcsafe Inc Url、ウェブページおよびコンテンツをフィルタ処理する方法およびシステム
CN104079673A (zh) * 2014-07-30 2014-10-01 北京奇虎科技有限公司 一种应用下载中防止dns劫持的方法、装置和系统
CN105245518A (zh) * 2015-09-30 2016-01-13 小米科技有限责任公司 网址劫持的检测方法及装置
CN109861947A (zh) * 2017-11-30 2019-06-07 腾讯科技(武汉)有限公司 一种网络劫持处理方法及装置、电子设备
CN108768870A (zh) * 2018-05-04 2018-11-06 Oppo广东移动通信有限公司 流量控制方法、装置及移动终端
CN108920589A (zh) * 2018-06-26 2018-11-30 百度在线网络技术(北京)有限公司 浏览劫持识别方法、装置、服务器及存储介质
CN113395337A (zh) * 2021-06-02 2021-09-14 深圳市中科明望通信软件有限公司 浏览器网页防劫持的方法、装置、电子设备及存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116912669A (zh) * 2023-09-11 2023-10-20 中国物品编码中心 一种网页劫持监测方法、系统、电子设备和存储介质
CN116912669B (zh) * 2023-09-11 2023-11-28 中国物品编码中心 一种网页劫持监测方法、系统、电子设备和存储介质

Also Published As

Publication number Publication date
CN113395337A (zh) 2021-09-14
CN113395337B (zh) 2022-09-27

Similar Documents

Publication Publication Date Title
WO2022252882A1 (zh) 浏览器网页防劫持的方法、装置、电子设备及存储介质
CN107040609B (zh) 一种网络请求处理方法和装置
US10853437B2 (en) Method and apparatus for invoking application programming interface
US20160321066A1 (en) Method, apparatus, and system for processing desktop data of mobile terminal
WO2018049897A1 (zh) 数据备份方法及设备
CN108039963B (zh) 一种容器配置方法、装置及存储介质
WO2018006841A1 (zh) 二维码信息传输方法、装置以及设备
US20150091935A1 (en) Method and device for browsing web under weak light with mobile terminal browser
WO2018049894A1 (zh) 数据传输方法及设备
US20140317483A1 (en) Method and terminal for adding quick link
CN103279574A (zh) 一种浏览器图片的加载方法、装置和终端设备
CN108170723B (zh) 一种网页资源获取方法、终端设备、服务器及系统
WO2014206138A1 (zh) 一种更新网页数据的方法、装置和终端设备
US20140351212A1 (en) Method and apparatus for processing reading history
CN103513987A (zh) 一种浏览器网页的渲染处理方法、装置及终端设备
US9582584B2 (en) Method, apparatus and system for filtering data of web page
WO2021078215A1 (zh) 一种云游戏跨终端切换的方法和相关装置
WO2015003549A1 (en) Method and system for application message alerting
CN104123276A (zh) 一种浏览器中弹窗的拦截方法、装置和系统
WO2015003636A1 (zh) 一种页面元素的拦截方法和装置
CN108270757B (zh) 一种用户账户切换方法、装置、客户端以及系统
CN113613064A (zh) 视频处理方法、装置、存储介质及终端
US10713414B2 (en) Web page display method, terminal, and storage medium
CN115589361A (zh) 一种管理设备固件更新方法、装置、电子设备及存储介质
WO2015062234A1 (zh) 移动终端资源处理方法、装置和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22814929

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22814929

Country of ref document: EP

Kind code of ref document: A1