CN105991634A - Access control method and apparatus - Google Patents
Access control method and apparatus Download PDFInfo
- Publication number
- CN105991634A CN105991634A CN201510218061.XA CN201510218061A CN105991634A CN 105991634 A CN105991634 A CN 105991634A CN 201510218061 A CN201510218061 A CN 201510218061A CN 105991634 A CN105991634 A CN 105991634A
- Authority
- CN
- China
- Prior art keywords
- field
- legal
- referer
- request message
- host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000008569 process Effects 0.000 claims description 22
- 108010001267 Protein Subunits Proteins 0.000 claims 4
- 238000001914 filtration Methods 0.000 abstract description 5
- 239000000284 extract Substances 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 239000000203 mixture Substances 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides an access control method and an access control apparatus. The method includes the following steps that: a HTTP request message sent by a client device is received; and when it is determined that at least one of a Referer field and a Host field which are carried by the HTTP request message is legitimate, the HTTP request message is forwarded. With the access control method and the access control apparatus provided by the embodiments of the invention, the legitimacy of the Referer field and the Host field which are carried by the HTTP request message is judged, when at least one of the Referer field and the Host field is legitimate, the HTTP request message is forwarded, and therefore, the client device can normally access corresponding websites, and a situation that legitimate websites are mistakenly judged as illegal websites can be avoided to the greatest extent, and the false alarm rate of website filtering can be reduced, and the client device can normally access the legitimate websites, and user experience can be improved.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of method and apparatus accessing control.
Background technology
Along with the development of network technology, dragons and fishes jumbled together to make the Internet also become, and also exists and is not good in a large number
Health or the illegal website of reaction, filtering illegal website, effectively management becomes people to the access of the Internet
The key of healthy online.At present, URL (Uniform Resource Locator, URL)
Filtering technique is a kind of conventional internet data filter method, can enter packet according to URL address
Row filters, and then can effectively filter illegal website.
But, existing url filtering technology can filter illegal website, but also can by legal website by mistake
It is judged to illegal website, causes user cannot access these legitimate site, and reduce Consumer's Experience.
Summary of the invention
In view of this, the present invention provides a kind of method and apparatus accessing control, to avoid legitimate site
The problem being mistaken for illegal website, it is ensured that user normally accesses legal website, improves Consumer's Experience.
Specifically, the present invention is achieved through the following technical solutions:
An aspect of of the present present invention, it is provided that a kind of method accessing control, described method includes:
Receive the HTTP request message that client device sends;
As at least determined in the Referer field and Host field that described HTTP request message carries
When individual field is legal, forward described HTTP request message.
Another aspect of the present invention, it is provided that a kind of device accessing control, described device includes:
Message receives unit, for receiving the HTTP request message that client device sends;
Message process unit, for when determine Referer field that described HTTP request message carries and
When at least one field in Host field is legal, forward described HTTP request message.
The application embodiment of the present invention, the Referer field that HTTP request message is carried and Host field
Legitimacy judge, when in two fields, at least one field is legal, forward HTTP request report
Literary composition, so that client device can normally access corresponding website, therefore, it can farthest avoid
Legitimate site is mistaken for illegal website, reduces the rate of false alarm of website programming, so that client device can
Normally access legitimate site, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of method accessing control shown in the present invention one exemplary embodiment;
Fig. 2 is the another kind of flow chart accessing the method controlled shown in the present invention one exemplary embodiment;
Fig. 3 is the hardware accessing the device place equipment controlled shown in the present invention one exemplary embodiment
Structure chart;
Fig. 4 is the structured flowchart of a kind of device accessing control shown in the present invention one exemplary embodiment;
Fig. 5 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment;
Fig. 6 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment;
Fig. 7 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following
When description relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous
Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the present invention
There is embodiment.On the contrary, they only with as appended claims describes in detail, the one of the present invention
The example of the apparatus and method that a little aspects are consistent.
It is only merely for describing the purpose of specific embodiment in terminology used in the present invention, and is not intended to be limiting
The present invention." a kind of " of singulative used in the present invention and appended claims, " institute
State " and " being somebody's turn to do " be also intended to include most form, unless context clearly shows that other implications.Also should
Work as understanding, term "and/or" used herein refer to and comprise one or more be associated list item
Any or all possible combination of purpose.
Although should be appreciated that may use term first, second, third, etc. various to describe in the present invention
Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that
This distinguishes.Such as, without departing from the present invention, the first information can also be referred to as
Two information, similarly, the second information can also be referred to as the first information.Depend on linguistic context, as in this institute
Use word " if " can be construed to " and ... time " or " when ... time " or " response
In determining ".
HTTP (Hypertext Transfer Protocol, HTTP) request message is by asking
Row, request header, null and request data 4 part composition, wherein, request header can include Host
Field and Referer field, the field value of the Host field territory to being the website that client device is to be accessed
Name or IP address, the field value of described Host field is to being also possible to include the information such as port numbers.Referer
The field value of field, to being domain name or the IP address of website, represents and is linked to current net wherefrom
Stand, i.e. can check that the link of current website is wherefrom according to Referer field.Such as,
In Baidu, search for Sohu, " Sohu's homepage " link in result of page searching can be clicked on, to access
Sohu.com, during accessing Sohu.com, the HTTP request message that client device sends
The Host field value that carries is to for www.sohu.com, and the carrying of HTTP request message
Referer field value is to for http://www.baidu.com/s?Tn=baidusite&word=Sohu, by institute
State Referer field value to it can be seen that user is to be linked to Sohu.com from www.baidu.com.
In correlation technique, when HTTP request message being filtered according to URL, it is to judge Host
The field value of field, to whether hitting white list, if hit white list, then may determine that Host field is closed
Method, if but white list can not be hit, it is determined that Host field is illegal, abandons described HTTP request
Message, so that user cannot access corresponding website.But, for said method, in white list
The data volume of field value pair be limited, if not including some legitimate site in white list
The information such as URL or IP address, then when user accesses these legitimate site, due to HTTP request
The Host field of message can not hit white list, and this legitimate site can be falsely determined that as non-by the network equipment
Method website, and then abandon described HTTP request message, cause user cannot this legitimate site be visited
Ask, reduce Consumer's Experience.
In embodiments of the present invention, user access certain website time, the client device meeting that user is used
First send HTTP request message, the network equipment (example between client device and Website server
As, fire wall) after receiving HTTP request message, described HTTP request message is analyzed,
In the network equipment determines the Referer field and Host field that HTTP request message carries at least one
When individual field is legal, can confirm that the website that user is to be accessed is legitimate site, forward this HTTP request
Message, applies the embodiment of the present invention, only when Referer field and Host field are the most illegal,
Abandon this HTTP request message, such that it is able to farthest avoid being mistaken for legitimate site the non-net of justice
Stand, so that client device can normally access legitimate site.
Offer of the present invention accesses method and apparatus below in conjunction with the accompanying drawings that control illustrate.
Fig. 1 is the flow chart of a kind of method accessing control shown in the present invention one exemplary embodiment.
With reference to Fig. 1, a kind of method accessing control, described method comprises the steps:
Step S101, receives the HTTP request message that client device sends.
Step S102, it is judged that the Host field of HTTP request message is the most legal, if illegal,
Perform step S103, if legal, perform step S105.
Host field is the field of the request header of HTTP request message, in this step, from described
The Host field of HTTP request header extracts field value pair, with described field value to as URL
As a example by, the URL of client device website to be accessed can be extracted, such as: Host:
Www.sohu.com, then according to field value to judging that Host field is the most legal.According to the present invention's
Preferred embodiment, can by judge the field value of Host field to whether hitting white list, to determine
Host field is the most legal, specifically, if hit, it is determined that Host field would be legal, performs step
Rapid S105, otherwise, it is determined that Host field is illegal, performs step S103, and wherein, white list can
Think that substantial amounts of legal website domain name, IP address or domain name/IP address add the collection of the information such as port numbers
Close.For example, it is assumed that the field value of the Host field of HTTP request message is to for www.sohu.com,
Search white list according to www.sohu.com, if hit white list, then may determine that this Host field
Legal.
Step S103, it is judged that whether HTTP request message has Referer field, if it has, perform step
Rapid S104, if it did not, perform step S106.
Referer field is the field of the request header of HTTP request message, can according to Referer field
It is wherefrom to check the link of current website.In this step, if it is determined that HTTP request
Message has Referer field, then performs step S104, whereas if do not have, then perform step S106.
Step S104, it is judged that the Referer field of HTTP request message is the most legal, if legal,
Perform step S105, if illegal, perform step S106.
According to a preferred embodiment of the invention, determine in step S103 and comprise in HTTP request message
There is Referer field, then from the Referer field of described HTTP request header, extract field
It is right, such as to be worth: can extract URL from Referer field.In this step, can be according to this
Field value is to judging that Referer field is the most legal, it is preferable that can be by judging Referer field
Field value is to whether hitting white list, the most legal to determine Referer field, specifically, if
Hit, it is determined that Referer field is legal, performs step S105.Without hit, it is determined that institute
State Referer field illegal, perform step S106.This step judging, Referer field is the most legal
Judge that Host field is the most legal with step S102 and can use same white list.
Step S105, forwards HTTP request message, terminates the present embodiment flow process.
Step S106, abandons HTTP request message, terminates the present embodiment flow process.
In order to make that technical scheme describes become apparent from, understandable, below by applying skill of the present invention
The example of art scheme further describes explanation.
Assume to search for Tengxun from Baidu, and " the Tengxun's homepage " of clicking on result of page searching conduct interviews,
Client device will send HTTP request message to server, and this HTTP request message includes following two
Individual field:
Host:http: //www.qq.com/
Referer:http: //www.baidu.com/s?Wd=Teng Xun &ie=utf-8
Above-mentioned field can represent that the domain name of the targeted website that client device is to be accessed is
Http:// www.qq.com/, and be from http://www.baidu.com/s?Wd=Teng Xun &ie=utf-8 links
To this website of http://www.qq.com/.
Assume again that white list includes Baidu's domain-name information (such as, http://www.baidu.com/), and do not have
Having and include Tengxun's domain-name information, if using existing url filtering technology, only judging Host field
Field value is to whether hitting white list, and user can not access Tengxun's homepage (i.e. http://www.qq.com/),
Reduce Consumer's Experience, according to embodiments of the present invention, if it is determined that the field value of Host field is to not life
Middle white list, will determine that the field value of Referer field to whether hitting, owing to including at white list
Baidu's domain-name information, the field value of Referer field is to hitting white list, by HTTP request message
It is transmitted to server, allows the user to access Tengxun's homepage.
It should be noted that HTTP request message includes but not limited to Host field and Referer field,
Also include other fields, such as, Accept field, be used for representing browser acceptable MIME class
Type, specifically may refer to the correlation technique content of HTTP request message, and this is no longer going to repeat them.
Fig. 2 is the another kind of flow chart accessing the method controlled shown in the present invention one exemplary embodiment.
Seeing Fig. 2, a kind of method accessing control, described method comprises the steps:
Step S201, receives the HTTP request message that client device sends.
Step S202, it is judged that whether HTTP request message has Referer field, if it has, perform step
Rapid S203, if it did not, perform step S204.
Step S203, it is judged that the Referer field of HTTP request message is the most legal, if illegal,
Perform step S204, if legal, perform step S206.
In step S202, determine that HTTP request message has Referer field, then from HTTP request
The Referer field of header extracts field value pair, such as: can extract from Referer field
Go out URL.In this step, can have according to this field value to judging that Referer field is the most legal
Body may refer to the implementation method of step S104 shown in Fig. 1, does not repeats them here.
Step S204, it is judged that the Host field of HTTP request message is the most legal, if illegal,
Perform step S205, if legal, perform step S206.
Host field is the field of the request header of HTTP request message, in this step, from described
The Host field of HTTP request header extracts field value pair, with described field value to as URL
As a example by, the URL of client device website to be accessed can be extracted.In embodiments of the present invention, right
The most legal determination methods of Host field may refer to the implementation method of step S102 shown in Fig. 1,
Do not repeat them here.
Step S205, abandons HTTP request message, terminates the present embodiment flow process.
Step S206, forwards HTTP request message, terminates the present embodiment flow process.
In summary it can be seen, unlike the embodiment shown in Fig. 1, the embodiment shown in Fig. 2 is first sentenced
The Referer field of disconnected HTTP request message is the most legal, if Referer field is illegal, then sentences
The Host field of disconnected HTTP request message is the most legal.Whichsoever embodiment, when determining HTTP
When at least one field in the Referer field of request message and Host field is legal, forward described
HTTP request message.
According to an alternate embodiment of the present invention, when determine Referer field that HTTP request message carries and
When Host field is the most illegal, this HTTP request message will be abandoned.
Application above-described embodiment, Referer field and the Host field of carrying HTTP request message are entered
Row is analyzed, and when at least one field determined in Referer field and Host field is legal, forwards
HTTP request message, otherwise, abandons HTTP request message.Therefore, it can farthest avoid
The problem that legitimate site is mistaken for illegal website, reduces the rate of false alarm of website programming, so that client sets
The standby legitimate site that can normally access, raising Consumer's Experience.
Corresponding with the embodiment of the method that aforementioned access controls, present invention also offers and access the dress controlled
The embodiment put.
The present invention accesses the embodiment of the device of control and can apply on network devices, such as, and fire wall.
Device embodiment can be realized by software, it is also possible to realizes by the way of hardware or software and hardware combining.
As a example by implemented in software, as the device on a logical meaning, it it is the processor by its place equipment
Computer program instructions corresponding in nonvolatile memory is read in internal memory and run formation.From firmly
For part aspect, as it is shown on figure 3, the device controlled for the access shown in the present invention one exemplary embodiment
One hardware structure diagram of place equipment, except the processor shown in Fig. 3, internal memory, network interface and
Outside nonvolatile memory, embodiment accesses the equipment at device 400 place of control generally according to this
The actual functional capability of equipment, it is also possible to include other hardware, this is repeated no more.
Fig. 4 is the structured flowchart of a kind of device accessing control shown in the present invention one exemplary embodiment.
Seeing Fig. 4, a kind of device 400 accessing control, described device includes: message receives unit 410
With message process unit 420, wherein, message process unit 420 can include the first judgment sub-unit 421
With the second judgment sub-unit 422.
Message receives unit 410 for receiving the HTTP request message that client device sends.
Message process unit 420 is for when the Referer field and Host determining that HTTP request message carries
When at least one field in field is legal, forward HTTP request message.
According to one preferred embodiment of the present invention, the first judgment sub-unit 421 is used for whether judging Host field
Legal, in the first judgment sub-unit 421, the second judgment sub-unit 422 is for determining that Host field is illegal
Time, it is judged that Referer field is the most legal.
An alternative embodiment according to the present invention, the device 400 accessing control that the present invention provides also includes:
Packet loss unit 430, for when the Referer field and Host determining that HTTP request message carries
When field is the most illegal, abandon HTTP request message.
Fig. 5 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment,
Seeing Fig. 5, the first judgment sub-unit 421 can also include that the first judge module 4211 and first determines mould
Block 4212, wherein, the first judge module 4211 is for judging that the field value of Host field is to whether hitting
White list, first determine module 4212 for Host field field value to hit white list time, really
Determine Host field legal, at the field value of Host field to when not hitting white list, determine Host word
Section is illegal.
Fig. 6 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment,
Seeing Fig. 6, the second judgment sub-unit 422 can also include that the second judge module 4221 and second determines mould
Block 4222, wherein, the second judge module 4221 is for judging that the field value of Referer field is to whether ordering
Middle white list, second determine module 4222 for Referer field field value to hit white list time,
Determine that Referer field is legal, at the field value of Referer field to when not hitting white list, determine
Referer field is illegal.
Fig. 7 is the another kind of structured flowchart accessing the device controlled shown in the present invention one exemplary embodiment.
Seeing Fig. 7, a kind of device 400 accessing control, described device includes: message reception unit 410,
Message process unit 420 and packet loss unit 430, wherein, message process unit 420 can include
3rd judgment sub-unit 423 and the 4th judgment sub-unit 424.
Message receives unit 410, message process unit 420 and the function of packet loss unit 430 and work
The process that realizes may refer to the function of corresponding unit in embodiment illustrated in fig. 4 and effect realize process,
Do not repeat them here.
3rd judgment sub-unit 423 is used for judging that Referer field is the most legal, the 4th judging unit 424
For when the 3rd judgment sub-unit 423 determines that Referer field is illegal, it is judged that whether Host field
Legal.Wherein, the 3rd judgment sub-unit 423 and the function of the 4th judging unit 424 and the realization of effect
What process may refer to aforementioned first judgment sub-unit 421 and the second judgment sub-unit 422 realizes process,
Do not repeat them here.
In said apparatus, the function of unit and the process that realizes of effect specifically refer in said method corresponding
Step realize process, do not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part ginseng
See that the part of embodiment of the method illustrates.Device embodiment described above is only schematically,
The wherein said unit illustrated as separating component can be or may not be physically separate, makees
The parts shown for unit can be or may not be physical location, i.e. may be located at a place,
Or can also be distributed on multiple NE.Can select according to the actual needs part therein or
The whole module of person realizes the purpose of the present invention program.Those of ordinary skill in the art are not paying creativeness
In the case of work, i.e. it is appreciated that and implements.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all at this
Within the spirit of invention and principle, any modification, equivalent substitution and improvement etc. done, should be included in
Within the scope of protection of the invention.
Claims (10)
1. the method accessing control, it is characterised in that described method includes:
Receive the HTTP request message that client device sends;
As at least determined in the Referer field and Host field that described HTTP request message carries
When individual field is legal, forward described HTTP request message.
Method the most according to claim 1, it is characterised in that determine described Referer field and
The most legal process of Host field includes:
Judge that described Host field is the most legal;
If Host field is illegal, then judge that described Referer field is the most legal.
Method the most according to claim 1, it is characterised in that determine described Referer field and
The most legal process of Host field includes:
Judge that described Referer field is the most legal;
If Referer field is illegal, then judge that described Host field is the most legal.
The most according to the method in claim 2 or 3, it is characterised in that
Described judge that described Host field is the most legal and include:
Judge that the field value of described Host field is to whether hitting white list;
If hit, it is determined that described Host field is legal;Without hit, it is determined that described Host word
Section is illegal;And
Described judge that described Referer field is the most legal and include:
Judge that the field value of described Referer field is to whether hitting described white list;
If hit, it is determined that described Referer field is legal;Without hit, it is determined that described
Referer field is illegal.
Method the most according to claim 1, it is characterised in that described method also includes:
When determining that Referer field that described HTTP request message carries and Host field are the most illegal,
Abandon described HTTP request message.
6. the device accessing control, it is characterised in that described device includes:
Message receives unit, for receiving the HTTP request message that client device sends;
Message process unit, for when determine Referer field that described HTTP request message carries and
When at least one field in Host field is legal, forward described HTTP request message.
Device the most according to claim 6, it is characterised in that described message process unit includes:
First judgment sub-unit, is used for judging that described Host field is the most legal;
Second judgment sub-unit, for when Host field is illegal, it is judged that described Referer field is
No legal.
Device the most according to claim 6, it is characterised in that described message process unit includes:
3rd judgment sub-unit, is used for judging that described Referer field is the most legal;
4th judgment sub-unit, for when Referer field is illegal, it is judged that described Host field is
No legal.
Device the most according to claim 7, it is characterised in that
Described first judgment sub-unit includes:
First judge module, for judging that the field value of described Host field is to whether hitting white list;
First determines module, is used for when the field value of described Host field is to the described white list of hit, really
Fixed described Host field is legal;At the field value of described Host field to when not hitting described white list,
Determine that described Host field is illegal;And
Described second judgment sub-unit includes:
Second judge module, for judge the field value of described Referer field to whether hit described in vain
List;
Second determines module, is used for when the field value of described Referer field is to the described white list of hit,
Determine that described Referer field is legal;Described Referer field field value to do not hit described in vain
During list, determine that described Referer field is illegal.
Device the most according to claim 6, it is characterised in that described device also includes:
Packet loss unit, for when determine Referer field that described HTTP request message carries and
When Host field is the most illegal, abandon described HTTP request message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510218061.XA CN105991634A (en) | 2015-04-29 | 2015-04-29 | Access control method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510218061.XA CN105991634A (en) | 2015-04-29 | 2015-04-29 | Access control method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105991634A true CN105991634A (en) | 2016-10-05 |
Family
ID=57040144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510218061.XA Pending CN105991634A (en) | 2015-04-29 | 2015-04-29 | Access control method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991634A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547421A (en) * | 2018-11-08 | 2019-03-29 | 锐捷网络股份有限公司 | A kind of method and device for the URL that audits |
CN109660528A (en) * | 2018-12-05 | 2019-04-19 | 广州昂宝电子有限公司 | For frame data to be carried out with the method and system of real time filtering |
CN109981600A (en) * | 2019-03-06 | 2019-07-05 | 山东信天辰信息安全技术有限公司 | A kind of safety evaluation system that website reinforces |
CN111770168A (en) * | 2020-06-28 | 2020-10-13 | 杭州迪普科技股份有限公司 | Webpage redirection protection method and device and electronic equipment |
CN112260991A (en) * | 2020-09-16 | 2021-01-22 | 厦门网宿有限公司 | Authentication management method and device |
CN115051845A (en) * | 2022-06-08 | 2022-09-13 | 北京启明星辰信息安全技术有限公司 | Suspicious traffic identification method, device, equipment and storage medium |
CN116436656A (en) * | 2023-03-29 | 2023-07-14 | 睿哲科技股份有限公司 | Processing method, device and electronic device for accessing external link request |
CN118041824A (en) * | 2024-04-12 | 2024-05-14 | 杭州优云科技股份有限公司 | Method and device for testing bypass mirror function, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030195971A1 (en) * | 2002-04-15 | 2003-10-16 | Chien-Chou Lai | Method and electronic device allowing an HTML document to access local system resources |
WO2010074839A2 (en) * | 2008-12-15 | 2010-07-01 | Taproot Systems, Inc. | Algorithm for classification of browser links |
CN102158499A (en) * | 2011-06-02 | 2011-08-17 | 国家计算机病毒应急处理中心 | Trojan-embedded website detection method based on hyper text transfer protocol (HTTP) traffic analysis |
US20120227106A1 (en) * | 2007-06-20 | 2012-09-06 | Amichai Shulman | System and method for preventing web frauds committed using client-scripting attacks |
CN102801697A (en) * | 2011-12-20 | 2012-11-28 | 北京安天电子设备有限公司 | Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator) |
CN102932375A (en) * | 2012-11-22 | 2013-02-13 | 北京奇虎科技有限公司 | Protection method and device for network access behavior |
CN103561036A (en) * | 2013-11-12 | 2014-02-05 | 深信服网络科技(深圳)有限公司 | Request intercepting method and device in white-list internet surfing environment |
CN104239353A (en) * | 2013-06-20 | 2014-12-24 | 上海博达数据通信有限公司 | WEB classification control and log auditing method |
-
2015
- 2015-04-29 CN CN201510218061.XA patent/CN105991634A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030195971A1 (en) * | 2002-04-15 | 2003-10-16 | Chien-Chou Lai | Method and electronic device allowing an HTML document to access local system resources |
US20120227106A1 (en) * | 2007-06-20 | 2012-09-06 | Amichai Shulman | System and method for preventing web frauds committed using client-scripting attacks |
WO2010074839A2 (en) * | 2008-12-15 | 2010-07-01 | Taproot Systems, Inc. | Algorithm for classification of browser links |
CN102158499A (en) * | 2011-06-02 | 2011-08-17 | 国家计算机病毒应急处理中心 | Trojan-embedded website detection method based on hyper text transfer protocol (HTTP) traffic analysis |
CN102801697A (en) * | 2011-12-20 | 2012-11-28 | 北京安天电子设备有限公司 | Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator) |
CN102932375A (en) * | 2012-11-22 | 2013-02-13 | 北京奇虎科技有限公司 | Protection method and device for network access behavior |
CN104239353A (en) * | 2013-06-20 | 2014-12-24 | 上海博达数据通信有限公司 | WEB classification control and log auditing method |
CN103561036A (en) * | 2013-11-12 | 2014-02-05 | 深信服网络科技(深圳)有限公司 | Request intercepting method and device in white-list internet surfing environment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547421A (en) * | 2018-11-08 | 2019-03-29 | 锐捷网络股份有限公司 | A kind of method and device for the URL that audits |
CN109660528A (en) * | 2018-12-05 | 2019-04-19 | 广州昂宝电子有限公司 | For frame data to be carried out with the method and system of real time filtering |
CN109660528B (en) * | 2018-12-05 | 2022-03-22 | 广州昂宝电子有限公司 | Method and system for real-time filtering of frame data |
CN109981600A (en) * | 2019-03-06 | 2019-07-05 | 山东信天辰信息安全技术有限公司 | A kind of safety evaluation system that website reinforces |
CN109981600B (en) * | 2019-03-06 | 2021-08-17 | 山东信天辰信息安全技术有限公司 | Security assessment system for website reinforcement |
CN111770168A (en) * | 2020-06-28 | 2020-10-13 | 杭州迪普科技股份有限公司 | Webpage redirection protection method and device and electronic equipment |
CN112260991A (en) * | 2020-09-16 | 2021-01-22 | 厦门网宿有限公司 | Authentication management method and device |
CN115051845A (en) * | 2022-06-08 | 2022-09-13 | 北京启明星辰信息安全技术有限公司 | Suspicious traffic identification method, device, equipment and storage medium |
CN116436656A (en) * | 2023-03-29 | 2023-07-14 | 睿哲科技股份有限公司 | Processing method, device and electronic device for accessing external link request |
CN118041824A (en) * | 2024-04-12 | 2024-05-14 | 杭州优云科技股份有限公司 | Method and device for testing bypass mirror function, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105991634A (en) | Access control method and apparatus | |
Sanchez-Rola et al. | The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services | |
CN102685215B (en) | The methods, devices and systems of mobile terminal Internet access monitoring | |
CN110430188A (en) | A kind of quick url filtering method and device | |
CN105721479B (en) | A kind of network address filter method and device | |
CN104901975B (en) | Web log file safety analytical method, device and gateway | |
TW201824047A (en) | Attack request determination method, apparatus and server | |
CN104168316B (en) | A kind of Webpage access control method, gateway | |
US20230040895A1 (en) | System and method for developing a risk profile for an internet service | |
CN108664559A (en) | A kind of automatic crawling method of website and webpage source code | |
CN104092665A (en) | Access request filtering method, device and facility | |
CN102594934A (en) | Method and device for identifying hijacked website | |
JP2006520940A (en) | Invalid click detection method and apparatus in internet search engine | |
KR20180074774A (en) | How to identify malicious websites, devices and computer storage media | |
CN108228864A (en) | Web spider identification method, device, computer equipment and storage medium | |
CN116830095A (en) | Use assigned co-actor identifiers to evaluate access requests | |
CN104615695B (en) | A kind of detection method and system of malice network address | |
CN115037526B (en) | Anti-crawler method, device, equipment and computer storage medium | |
CN107391714A (en) | A kind of screenshot method, capture server, sectional drawing service system and medium | |
CN106411819A (en) | Method and apparatus for recognizing proxy Internet protocol address | |
US20100192069A1 (en) | Differentiating a User from Multiple Users Based on a Determined Pattern of Accessing a Prescribed Network Destination | |
CN103929498B (en) | The method and apparatus for handling client request | |
CN104680063B (en) | A kind of information intercepting method and terminal | |
CN103581349B (en) | A kind of domain name analytic method and device | |
RU2693325C2 (en) | Method and system for detecting actions potentially associated with spamming in account registration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building Applicant after: Hangzhou Dipu Polytron Technologies Inc Address before: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building Applicant before: Hangzhou Dipu Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161005 |
|
RJ01 | Rejection of invention patent application after publication |