Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data acquisition method, device and system

A network data and acquisition method technology, applied in the field of network data acquisition, can solve problems such as website hijacking, and achieve the effect of preventing traffic hijacking

Active Publication Date: 2019-02-15
ALIBABA (CHINA) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when accessing a website that does not support the https protocol, it may be hijacked by operators or hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data acquisition method, device and system
  • Network data acquisition method, device and system
  • Network data acquisition method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0067] The present invention provides a method, device and system for acquiring network data, which prevents traffic hijacking when accessing a target website that does not support the https protocol by using encrypted data transmission in areas where traffic hijacking exists.

[0068] image 3 A structural diagram of a network data acquisition system according to an embodiment of the present invention is shown.

[0069] The network data acquisition system 10 s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network data obtaining method, device and system, and the method comprises the steps: carrying out encrypted packaging of a network data obtaining request based on an SSL / TLS protocol; transmitting the packaged request to an SSL / TLS server through a central layer, and obtaining network data from a target server after the decrypted processing through the SSL / TLS server; and enabling the obtained network data to be encrypted packaged based on the SSL / TLS protocol, and returning the network data to terminal equipment. The method carries out data transmission between the terminal equipment and the SSL / TLS server in a mode of ciphertext, obtains the network data in a mode of transferring through the SSL / TLS server, and can avoid a flow hijacking phenomenon during the access to a target website which does not support an https protocol.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, and more specifically, to a network data acquisition method, device and system. Background technique [0002] At present, the mainstream transmission mode of network transmission is http. The process of network transmission based on the http protocol is transmitted in plain text, and the traffic can be controlled as you like on the way. The traditional program has been downloaded to the local area in advance, and there is only communication traffic during operation; while the WebApp used online, the traffic includes both communication data and program interface and code, so hijacking is easy. Therefore, there is a lot of traffic hijacking on the Internet and mobile Internet. [0003] figure 1 A flow chart of normal access to the target website is shown. Such as figure 1 As shown, when a user requests to visit a target website, the terminal device first establishes a conn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 梁捷何小鹏杨伟
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products