[go: up one dir, main page]

CN105991634A - Access control method and apparatus - Google Patents

Access control method and apparatus Download PDF

Info

Publication number
CN105991634A
CN105991634A CN201510218061.XA CN201510218061A CN105991634A CN 105991634 A CN105991634 A CN 105991634A CN 201510218061 A CN201510218061 A CN 201510218061A CN 105991634 A CN105991634 A CN 105991634A
Authority
CN
China
Prior art keywords
field
legal
referer
request message
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510218061.XA
Other languages
Chinese (zh)
Inventor
王奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201510218061.XA priority Critical patent/CN105991634A/en
Publication of CN105991634A publication Critical patent/CN105991634A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides an access control method and an access control apparatus. The method includes the following steps that: a HTTP request message sent by a client device is received; and when it is determined that at least one of a Referer field and a Host field which are carried by the HTTP request message is legitimate, the HTTP request message is forwarded. With the access control method and the access control apparatus provided by the embodiments of the invention, the legitimacy of the Referer field and the Host field which are carried by the HTTP request message is judged, when at least one of the Referer field and the Host field is legitimate, the HTTP request message is forwarded, and therefore, the client device can normally access corresponding websites, and a situation that legitimate websites are mistakenly judged as illegal websites can be avoided to the greatest extent, and the false alarm rate of website filtering can be reduced, and the client device can normally access the legitimate websites, and user experience can be improved.

Description

Access the method and apparatus controlled
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of method and apparatus accessing control.
Background technology
Along with the development of network technology, dragons and fishes jumbled together to make the Internet also become, and also exists and is not good in a large number Health or the illegal website of reaction, filtering illegal website, effectively management becomes people to the access of the Internet The key of healthy online.At present, URL (Uniform Resource Locator, URL) Filtering technique is a kind of conventional internet data filter method, can enter packet according to URL address Row filters, and then can effectively filter illegal website.
But, existing url filtering technology can filter illegal website, but also can by legal website by mistake It is judged to illegal website, causes user cannot access these legitimate site, and reduce Consumer's Experience.
Summary of the invention
In view of this, the present invention provides a kind of method and apparatus accessing control, to avoid legitimate site The problem being mistaken for illegal website, it is ensured that user normally accesses legal website, improves Consumer's Experience.
Specifically, the present invention is achieved through the following technical solutions:
An aspect of of the present present invention, it is provided that a kind of method accessing control, described method includes:
Receive the HTTP request message that client device sends;
As at least determined in the Referer field and Host field that described HTTP request message carries When individual field is legal, forward described HTTP request message.
Another aspect of the present invention, it is provided that a kind of device accessing control, described device includes:
Message receives unit, for receiving the HTTP request message that client device sends;
Message process unit, for when determine Referer field that described HTTP request message carries and When at least one field in Host field is legal, forward described HTTP request message.
The application embodiment of the present invention, the Referer field that HTTP request message is carried and Host field Legitimacy judge, when in two fields, at least one field is legal, forward HTTP request report Literary composition, so that client device can normally access corresponding website, therefore, it can farthest avoid Legitimate site is mistaken for illegal website, reduces the rate of false alarm of website programming, so that client device can Normally access legitimate site, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of method accessing control shown in the present invention one exemplary embodiment;
Fig. 2 is the another kind of flow chart accessing the method controlled shown in the present invention one exemplary embodiment;
Fig. 3 is the hardware accessing the device place equipment controlled shown in the present invention one exemplary embodiment Structure chart;
Fig. 4 is the structured flowchart of a kind of device accessing control shown in the present invention one exemplary embodiment;
Fig. 5 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment;
Fig. 6 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment;
Fig. 7 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following When description relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the present invention There is embodiment.On the contrary, they only with as appended claims describes in detail, the one of the present invention The example of the apparatus and method that a little aspects are consistent.
It is only merely for describing the purpose of specific embodiment in terminology used in the present invention, and is not intended to be limiting The present invention." a kind of " of singulative used in the present invention and appended claims, " institute State " and " being somebody's turn to do " be also intended to include most form, unless context clearly shows that other implications.Also should Work as understanding, term "and/or" used herein refer to and comprise one or more be associated list item Any or all possible combination of purpose.
Although should be appreciated that may use term first, second, third, etc. various to describe in the present invention Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that This distinguishes.Such as, without departing from the present invention, the first information can also be referred to as Two information, similarly, the second information can also be referred to as the first information.Depend on linguistic context, as in this institute Use word " if " can be construed to " and ... time " or " when ... time " or " response In determining ".
HTTP (Hypertext Transfer Protocol, HTTP) request message is by asking Row, request header, null and request data 4 part composition, wherein, request header can include Host Field and Referer field, the field value of the Host field territory to being the website that client device is to be accessed Name or IP address, the field value of described Host field is to being also possible to include the information such as port numbers.Referer The field value of field, to being domain name or the IP address of website, represents and is linked to current net wherefrom Stand, i.e. can check that the link of current website is wherefrom according to Referer field.Such as, In Baidu, search for Sohu, " Sohu's homepage " link in result of page searching can be clicked on, to access Sohu.com, during accessing Sohu.com, the HTTP request message that client device sends The Host field value that carries is to for www.sohu.com, and the carrying of HTTP request message Referer field value is to for http://www.baidu.com/s?Tn=baidusite&word=Sohu, by institute State Referer field value to it can be seen that user is to be linked to Sohu.com from www.baidu.com.
In correlation technique, when HTTP request message being filtered according to URL, it is to judge Host The field value of field, to whether hitting white list, if hit white list, then may determine that Host field is closed Method, if but white list can not be hit, it is determined that Host field is illegal, abandons described HTTP request Message, so that user cannot access corresponding website.But, for said method, in white list The data volume of field value pair be limited, if not including some legitimate site in white list The information such as URL or IP address, then when user accesses these legitimate site, due to HTTP request The Host field of message can not hit white list, and this legitimate site can be falsely determined that as non-by the network equipment Method website, and then abandon described HTTP request message, cause user cannot this legitimate site be visited Ask, reduce Consumer's Experience.
In embodiments of the present invention, user access certain website time, the client device meeting that user is used First send HTTP request message, the network equipment (example between client device and Website server As, fire wall) after receiving HTTP request message, described HTTP request message is analyzed, In the network equipment determines the Referer field and Host field that HTTP request message carries at least one When individual field is legal, can confirm that the website that user is to be accessed is legitimate site, forward this HTTP request Message, applies the embodiment of the present invention, only when Referer field and Host field are the most illegal, Abandon this HTTP request message, such that it is able to farthest avoid being mistaken for legitimate site the non-net of justice Stand, so that client device can normally access legitimate site.
Offer of the present invention accesses method and apparatus below in conjunction with the accompanying drawings that control illustrate.
Fig. 1 is the flow chart of a kind of method accessing control shown in the present invention one exemplary embodiment.
With reference to Fig. 1, a kind of method accessing control, described method comprises the steps:
Step S101, receives the HTTP request message that client device sends.
Step S102, it is judged that the Host field of HTTP request message is the most legal, if illegal, Perform step S103, if legal, perform step S105.
Host field is the field of the request header of HTTP request message, in this step, from described The Host field of HTTP request header extracts field value pair, with described field value to as URL As a example by, the URL of client device website to be accessed can be extracted, such as: Host: Www.sohu.com, then according to field value to judging that Host field is the most legal.According to the present invention's Preferred embodiment, can by judge the field value of Host field to whether hitting white list, to determine Host field is the most legal, specifically, if hit, it is determined that Host field would be legal, performs step Rapid S105, otherwise, it is determined that Host field is illegal, performs step S103, and wherein, white list can Think that substantial amounts of legal website domain name, IP address or domain name/IP address add the collection of the information such as port numbers Close.For example, it is assumed that the field value of the Host field of HTTP request message is to for www.sohu.com, Search white list according to www.sohu.com, if hit white list, then may determine that this Host field Legal.
Step S103, it is judged that whether HTTP request message has Referer field, if it has, perform step Rapid S104, if it did not, perform step S106.
Referer field is the field of the request header of HTTP request message, can according to Referer field It is wherefrom to check the link of current website.In this step, if it is determined that HTTP request Message has Referer field, then performs step S104, whereas if do not have, then perform step S106.
Step S104, it is judged that the Referer field of HTTP request message is the most legal, if legal, Perform step S105, if illegal, perform step S106.
According to a preferred embodiment of the invention, determine in step S103 and comprise in HTTP request message There is Referer field, then from the Referer field of described HTTP request header, extract field It is right, such as to be worth: can extract URL from Referer field.In this step, can be according to this Field value is to judging that Referer field is the most legal, it is preferable that can be by judging Referer field Field value is to whether hitting white list, the most legal to determine Referer field, specifically, if Hit, it is determined that Referer field is legal, performs step S105.Without hit, it is determined that institute State Referer field illegal, perform step S106.This step judging, Referer field is the most legal Judge that Host field is the most legal with step S102 and can use same white list.
Step S105, forwards HTTP request message, terminates the present embodiment flow process.
Step S106, abandons HTTP request message, terminates the present embodiment flow process.
In order to make that technical scheme describes become apparent from, understandable, below by applying skill of the present invention The example of art scheme further describes explanation.
Assume to search for Tengxun from Baidu, and " the Tengxun's homepage " of clicking on result of page searching conduct interviews, Client device will send HTTP request message to server, and this HTTP request message includes following two Individual field:
Host:http: //www.qq.com/
Referer:http: //www.baidu.com/s?Wd=Teng Xun &ie=utf-8
Above-mentioned field can represent that the domain name of the targeted website that client device is to be accessed is Http:// www.qq.com/, and be from http://www.baidu.com/s?Wd=Teng Xun &ie=utf-8 links To this website of http://www.qq.com/.
Assume again that white list includes Baidu's domain-name information (such as, http://www.baidu.com/), and do not have Having and include Tengxun's domain-name information, if using existing url filtering technology, only judging Host field Field value is to whether hitting white list, and user can not access Tengxun's homepage (i.e. http://www.qq.com/), Reduce Consumer's Experience, according to embodiments of the present invention, if it is determined that the field value of Host field is to not life Middle white list, will determine that the field value of Referer field to whether hitting, owing to including at white list Baidu's domain-name information, the field value of Referer field is to hitting white list, by HTTP request message It is transmitted to server, allows the user to access Tengxun's homepage.
It should be noted that HTTP request message includes but not limited to Host field and Referer field, Also include other fields, such as, Accept field, be used for representing browser acceptable MIME class Type, specifically may refer to the correlation technique content of HTTP request message, and this is no longer going to repeat them.
Fig. 2 is the another kind of flow chart accessing the method controlled shown in the present invention one exemplary embodiment.
Seeing Fig. 2, a kind of method accessing control, described method comprises the steps:
Step S201, receives the HTTP request message that client device sends.
Step S202, it is judged that whether HTTP request message has Referer field, if it has, perform step Rapid S203, if it did not, perform step S204.
Step S203, it is judged that the Referer field of HTTP request message is the most legal, if illegal, Perform step S204, if legal, perform step S206.
In step S202, determine that HTTP request message has Referer field, then from HTTP request The Referer field of header extracts field value pair, such as: can extract from Referer field Go out URL.In this step, can have according to this field value to judging that Referer field is the most legal Body may refer to the implementation method of step S104 shown in Fig. 1, does not repeats them here.
Step S204, it is judged that the Host field of HTTP request message is the most legal, if illegal, Perform step S205, if legal, perform step S206.
Host field is the field of the request header of HTTP request message, in this step, from described The Host field of HTTP request header extracts field value pair, with described field value to as URL As a example by, the URL of client device website to be accessed can be extracted.In embodiments of the present invention, right The most legal determination methods of Host field may refer to the implementation method of step S102 shown in Fig. 1, Do not repeat them here.
Step S205, abandons HTTP request message, terminates the present embodiment flow process.
Step S206, forwards HTTP request message, terminates the present embodiment flow process.
In summary it can be seen, unlike the embodiment shown in Fig. 1, the embodiment shown in Fig. 2 is first sentenced The Referer field of disconnected HTTP request message is the most legal, if Referer field is illegal, then sentences The Host field of disconnected HTTP request message is the most legal.Whichsoever embodiment, when determining HTTP When at least one field in the Referer field of request message and Host field is legal, forward described HTTP request message.
According to an alternate embodiment of the present invention, when determine Referer field that HTTP request message carries and When Host field is the most illegal, this HTTP request message will be abandoned.
Application above-described embodiment, Referer field and the Host field of carrying HTTP request message are entered Row is analyzed, and when at least one field determined in Referer field and Host field is legal, forwards HTTP request message, otherwise, abandons HTTP request message.Therefore, it can farthest avoid The problem that legitimate site is mistaken for illegal website, reduces the rate of false alarm of website programming, so that client sets The standby legitimate site that can normally access, raising Consumer's Experience.
Corresponding with the embodiment of the method that aforementioned access controls, present invention also offers and access the dress controlled The embodiment put.
The present invention accesses the embodiment of the device of control and can apply on network devices, such as, and fire wall. Device embodiment can be realized by software, it is also possible to realizes by the way of hardware or software and hardware combining. As a example by implemented in software, as the device on a logical meaning, it it is the processor by its place equipment Computer program instructions corresponding in nonvolatile memory is read in internal memory and run formation.From firmly For part aspect, as it is shown on figure 3, the device controlled for the access shown in the present invention one exemplary embodiment One hardware structure diagram of place equipment, except the processor shown in Fig. 3, internal memory, network interface and Outside nonvolatile memory, embodiment accesses the equipment at device 400 place of control generally according to this The actual functional capability of equipment, it is also possible to include other hardware, this is repeated no more.
Fig. 4 is the structured flowchart of a kind of device accessing control shown in the present invention one exemplary embodiment.
Seeing Fig. 4, a kind of device 400 accessing control, described device includes: message receives unit 410 With message process unit 420, wherein, message process unit 420 can include the first judgment sub-unit 421 With the second judgment sub-unit 422.
Message receives unit 410 for receiving the HTTP request message that client device sends.
Message process unit 420 is for when the Referer field and Host determining that HTTP request message carries When at least one field in field is legal, forward HTTP request message.
According to one preferred embodiment of the present invention, the first judgment sub-unit 421 is used for whether judging Host field Legal, in the first judgment sub-unit 421, the second judgment sub-unit 422 is for determining that Host field is illegal Time, it is judged that Referer field is the most legal.
An alternative embodiment according to the present invention, the device 400 accessing control that the present invention provides also includes: Packet loss unit 430, for when the Referer field and Host determining that HTTP request message carries When field is the most illegal, abandon HTTP request message.
Fig. 5 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment, Seeing Fig. 5, the first judgment sub-unit 421 can also include that the first judge module 4211 and first determines mould Block 4212, wherein, the first judge module 4211 is for judging that the field value of Host field is to whether hitting White list, first determine module 4212 for Host field field value to hit white list time, really Determine Host field legal, at the field value of Host field to when not hitting white list, determine Host word Section is illegal.
Fig. 6 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment, Seeing Fig. 6, the second judgment sub-unit 422 can also include that the second judge module 4221 and second determines mould Block 4222, wherein, the second judge module 4221 is for judging that the field value of Referer field is to whether ordering Middle white list, second determine module 4222 for Referer field field value to hit white list time, Determine that Referer field is legal, at the field value of Referer field to when not hitting white list, determine Referer field is illegal.
Fig. 7 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment.
Seeing Fig. 7, a kind of device 400 accessing control, described device includes: message reception unit 410, Message process unit 420 and packet loss unit 430, wherein, message process unit 420 can include 3rd judgment sub-unit 423 and the 4th judgment sub-unit 424.
Message receives unit 410, message process unit 420 and the function of packet loss unit 430 and work The process that realizes may refer to the function of corresponding unit in embodiment illustrated in fig. 4 and effect realize process, Do not repeat them here.
3rd judgment sub-unit 423 is used for judging that Referer field is the most legal, the 4th judging unit 424 For when the 3rd judgment sub-unit 423 determines that Referer field is illegal, it is judged that whether Host field Legal.Wherein, the 3rd judgment sub-unit 423 and the function of the 4th judging unit 424 and the realization of effect What process may refer to aforementioned first judgment sub-unit 421 and the second judgment sub-unit 422 realizes process, Do not repeat them here.
In said apparatus, the function of unit and the process that realizes of effect specifically refer in said method corresponding Step realize process, do not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part ginseng See that the part of embodiment of the method illustrates.Device embodiment described above is only schematically, The wherein said unit illustrated as separating component can be or may not be physically separate, makees The parts shown for unit can be or may not be physical location, i.e. may be located at a place, Or can also be distributed on multiple NE.Can select according to the actual needs part therein or The whole module of person realizes the purpose of the present invention program.Those of ordinary skill in the art are not paying creativeness In the case of work, i.e. it is appreciated that and implements.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all at this Within the spirit of invention and principle, any modification, equivalent substitution and improvement etc. done, should be included in Within the scope of protection of the invention.

Claims (10)

1. the method accessing control, it is characterised in that described method includes:
Receive the HTTP request message that client device sends;
As at least determined in the Referer field and Host field that described HTTP request message carries When individual field is legal, forward described HTTP request message.
Method the most according to claim 1, it is characterised in that determine described Referer field and The most legal process of Host field includes:
Judge that described Host field is the most legal;
If Host field is illegal, then judge that described Referer field is the most legal.
Method the most according to claim 1, it is characterised in that determine described Referer field and The most legal process of Host field includes:
Judge that described Referer field is the most legal;
If Referer field is illegal, then judge that described Host field is the most legal.
The most according to the method in claim 2 or 3, it is characterised in that
Described judge that described Host field is the most legal and include:
Judge that the field value of described Host field is to whether hitting white list;
If hit, it is determined that described Host field is legal;Without hit, it is determined that described Host word Section is illegal;And
Described judge that described Referer field is the most legal and include:
Judge that the field value of described Referer field is to whether hitting described white list;
If hit, it is determined that described Referer field is legal;Without hit, it is determined that described Referer field is illegal.
Method the most according to claim 1, it is characterised in that described method also includes:
When determining that Referer field that described HTTP request message carries and Host field are the most illegal, Abandon described HTTP request message.
6. the device accessing control, it is characterised in that described device includes:
Message receives unit, for receiving the HTTP request message that client device sends;
Message process unit, for when determine Referer field that described HTTP request message carries and When at least one field in Host field is legal, forward described HTTP request message.
Device the most according to claim 6, it is characterised in that described message process unit includes:
First judgment sub-unit, is used for judging that described Host field is the most legal;
Second judgment sub-unit, for when Host field is illegal, it is judged that described Referer field is No legal.
Device the most according to claim 6, it is characterised in that described message process unit includes:
3rd judgment sub-unit, is used for judging that described Referer field is the most legal;
4th judgment sub-unit, for when Referer field is illegal, it is judged that described Host field is No legal.
Device the most according to claim 7, it is characterised in that
Described first judgment sub-unit includes:
First judge module, for judging that the field value of described Host field is to whether hitting white list;
First determines module, is used for when the field value of described Host field is to the described white list of hit, really Fixed described Host field is legal;At the field value of described Host field to when not hitting described white list, Determine that described Host field is illegal;And
Described second judgment sub-unit includes:
Second judge module, for judge the field value of described Referer field to whether hit described in vain List;
Second determines module, is used for when the field value of described Referer field is to the described white list of hit, Determine that described Referer field is legal;Described Referer field field value to do not hit described in vain During list, determine that described Referer field is illegal.
Device the most according to claim 6, it is characterised in that described device also includes:
Packet loss unit, for when determine Referer field that described HTTP request message carries and When Host field is the most illegal, abandon described HTTP request message.
CN201510218061.XA 2015-04-29 2015-04-29 Access control method and apparatus Pending CN105991634A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510218061.XA CN105991634A (en) 2015-04-29 2015-04-29 Access control method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510218061.XA CN105991634A (en) 2015-04-29 2015-04-29 Access control method and apparatus

Publications (1)

Publication Number Publication Date
CN105991634A true CN105991634A (en) 2016-10-05

Family

ID=57040144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510218061.XA Pending CN105991634A (en) 2015-04-29 2015-04-29 Access control method and apparatus

Country Status (1)

Country Link
CN (1) CN105991634A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547421A (en) * 2018-11-08 2019-03-29 锐捷网络股份有限公司 A kind of method and device for the URL that audits
CN109660528A (en) * 2018-12-05 2019-04-19 广州昂宝电子有限公司 For frame data to be carried out with the method and system of real time filtering
CN109981600A (en) * 2019-03-06 2019-07-05 山东信天辰信息安全技术有限公司 A kind of safety evaluation system that website reinforces
CN111770168A (en) * 2020-06-28 2020-10-13 杭州迪普科技股份有限公司 Webpage redirection protection method and device and electronic equipment
CN112260991A (en) * 2020-09-16 2021-01-22 厦门网宿有限公司 Authentication management method and device
CN115051845A (en) * 2022-06-08 2022-09-13 北京启明星辰信息安全技术有限公司 Suspicious traffic identification method, device, equipment and storage medium
CN116436656A (en) * 2023-03-29 2023-07-14 睿哲科技股份有限公司 Processing method, device and electronic device for accessing external link request
CN118041824A (en) * 2024-04-12 2024-05-14 杭州优云科技股份有限公司 Method and device for testing bypass mirror function, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030195971A1 (en) * 2002-04-15 2003-10-16 Chien-Chou Lai Method and electronic device allowing an HTML document to access local system resources
WO2010074839A2 (en) * 2008-12-15 2010-07-01 Taproot Systems, Inc. Algorithm for classification of browser links
CN102158499A (en) * 2011-06-02 2011-08-17 国家计算机病毒应急处理中心 Trojan-embedded website detection method based on hyper text transfer protocol (HTTP) traffic analysis
US20120227106A1 (en) * 2007-06-20 2012-09-06 Amichai Shulman System and method for preventing web frauds committed using client-scripting attacks
CN102801697A (en) * 2011-12-20 2012-11-28 北京安天电子设备有限公司 Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator)
CN102932375A (en) * 2012-11-22 2013-02-13 北京奇虎科技有限公司 Protection method and device for network access behavior
CN103561036A (en) * 2013-11-12 2014-02-05 深信服网络科技(深圳)有限公司 Request intercepting method and device in white-list internet surfing environment
CN104239353A (en) * 2013-06-20 2014-12-24 上海博达数据通信有限公司 WEB classification control and log auditing method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030195971A1 (en) * 2002-04-15 2003-10-16 Chien-Chou Lai Method and electronic device allowing an HTML document to access local system resources
US20120227106A1 (en) * 2007-06-20 2012-09-06 Amichai Shulman System and method for preventing web frauds committed using client-scripting attacks
WO2010074839A2 (en) * 2008-12-15 2010-07-01 Taproot Systems, Inc. Algorithm for classification of browser links
CN102158499A (en) * 2011-06-02 2011-08-17 国家计算机病毒应急处理中心 Trojan-embedded website detection method based on hyper text transfer protocol (HTTP) traffic analysis
CN102801697A (en) * 2011-12-20 2012-11-28 北京安天电子设备有限公司 Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator)
CN102932375A (en) * 2012-11-22 2013-02-13 北京奇虎科技有限公司 Protection method and device for network access behavior
CN104239353A (en) * 2013-06-20 2014-12-24 上海博达数据通信有限公司 WEB classification control and log auditing method
CN103561036A (en) * 2013-11-12 2014-02-05 深信服网络科技(深圳)有限公司 Request intercepting method and device in white-list internet surfing environment

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547421A (en) * 2018-11-08 2019-03-29 锐捷网络股份有限公司 A kind of method and device for the URL that audits
CN109660528A (en) * 2018-12-05 2019-04-19 广州昂宝电子有限公司 For frame data to be carried out with the method and system of real time filtering
CN109660528B (en) * 2018-12-05 2022-03-22 广州昂宝电子有限公司 Method and system for real-time filtering of frame data
CN109981600A (en) * 2019-03-06 2019-07-05 山东信天辰信息安全技术有限公司 A kind of safety evaluation system that website reinforces
CN109981600B (en) * 2019-03-06 2021-08-17 山东信天辰信息安全技术有限公司 Security assessment system for website reinforcement
CN111770168A (en) * 2020-06-28 2020-10-13 杭州迪普科技股份有限公司 Webpage redirection protection method and device and electronic equipment
CN112260991A (en) * 2020-09-16 2021-01-22 厦门网宿有限公司 Authentication management method and device
CN115051845A (en) * 2022-06-08 2022-09-13 北京启明星辰信息安全技术有限公司 Suspicious traffic identification method, device, equipment and storage medium
CN116436656A (en) * 2023-03-29 2023-07-14 睿哲科技股份有限公司 Processing method, device and electronic device for accessing external link request
CN118041824A (en) * 2024-04-12 2024-05-14 杭州优云科技股份有限公司 Method and device for testing bypass mirror function, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105991634A (en) Access control method and apparatus
Sanchez-Rola et al. The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services
CN102685215B (en) The methods, devices and systems of mobile terminal Internet access monitoring
CN110430188A (en) A kind of quick url filtering method and device
CN105721479B (en) A kind of network address filter method and device
CN104901975B (en) Web log file safety analytical method, device and gateway
TW201824047A (en) Attack request determination method, apparatus and server
CN104168316B (en) A kind of Webpage access control method, gateway
US20230040895A1 (en) System and method for developing a risk profile for an internet service
CN108664559A (en) A kind of automatic crawling method of website and webpage source code
CN104092665A (en) Access request filtering method, device and facility
CN102594934A (en) Method and device for identifying hijacked website
JP2006520940A (en) Invalid click detection method and apparatus in internet search engine
KR20180074774A (en) How to identify malicious websites, devices and computer storage media
CN108228864A (en) Web spider identification method, device, computer equipment and storage medium
CN116830095A (en) Use assigned co-actor identifiers to evaluate access requests
CN104615695B (en) A kind of detection method and system of malice network address
CN115037526B (en) Anti-crawler method, device, equipment and computer storage medium
CN107391714A (en) A kind of screenshot method, capture server, sectional drawing service system and medium
CN106411819A (en) Method and apparatus for recognizing proxy Internet protocol address
US20100192069A1 (en) Differentiating a User from Multiple Users Based on a Determined Pattern of Accessing a Prescribed Network Destination
CN103929498B (en) The method and apparatus for handling client request
CN104680063B (en) A kind of information intercepting method and terminal
CN103581349B (en) A kind of domain name analytic method and device
RU2693325C2 (en) Method and system for detecting actions potentially associated with spamming in account registration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant after: Hangzhou Dipu Polytron Technologies Inc

Address before: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant before: Hangzhou Dipu Technology Co., Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005

RJ01 Rejection of invention patent application after publication