Data hijacking judgment method and apparatus, and user terminal

A technology of user terminal and judgment device, applied in electrical components, transmission systems, etc., can solve problems such as affecting user experience, loss of service provider, and user's distrust of service provider.

Inactive Publication Date: 2018-07-13
ALIBABA (CHINA) CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this seriously affects the user experience and also causes users to distrust the service provider.
Cause direct and indirect losses to service providers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data hijacking judgment method and apparatus, and user terminal
  • Data hijacking judgment method and apparatus, and user terminal
  • Data hijacking judgment method and apparatus, and user terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0037] image 3 A schematic diagram of functional modules of a data hijacking judging apparatus 400 provided in the first embodiment of the present invention is shown. see image 3 , the apparatus 400 for judging data hijacking in this embodiment is applied to the user terminal 100 connected in communication with the server 200 . The data hijacking judging device 400 includes: a first sending module 401 , a first receiving module 402 , a decryption module 403 and a first checking module 404 .

[0038] The first sending module 401 is configured to initiate an http data request to the server 200 .

[0039] HTTP is a widely used network protocol on the Internet. It is a standard protocol for request and response between the user terminal 100 and the server 200 . The user terminal 100 initiates an http data request to the server 200 by using a browser (such as a UC browser), a web crawler, or other tools to obtain data resources (such as HTML files, images, and installer pack...

no. 2 example

[0052] Figure 5 A schematic diagram of functional modules of a data hijacking judging apparatus 500 provided by the second embodiment of the present invention is shown. see Figure 5 , the data hijacking judging apparatus 500 in this embodiment is applied to the server 200 connected to the user terminal 100 in communication. The data hijacking judging device 500 includes: a second receiving module 501 , a generating module 502 , an encryption module 503 and a second sending module 504 .

[0053] The second receiving module 501 is configured to receive an http data request initiated by the user terminal 100 . http is a standard protocol for request and response between the user terminal 100 and the server 200 . The user terminal 100 initiates an http data request to the server 200 by using a browser (such as a UC browser), a web crawler, or other tools, and is used to obtain data resources stored on the server 200 of the response (such as HTML files, images, and installer ...

no. 4 example

[0062] Figure 7 It is a flowchart of a data hijacking judging method provided by the fourth embodiment of the present invention. Please refer to Figure 7 , a method for judging data hijacking, applied to a communication-connected server 200 and a user terminal 100, said method comprising the following steps:

[0063] Step S101 , the user terminal 100 initiates an http data request to the server 200 .

[0064] In this embodiment of the present invention, step S101 may be performed by the first sending module 401 .

[0065] Step S102, the server 200 receives the http data request.

[0066] In this embodiment of the present invention, substep S102 may be performed by the second receiving module 501 .

[0067] Step S103, the server 200 generates http response data according to the http data request.

[0068] In the embodiment of the present invention, step S103 may be executed by the generation module 502 . Such as Figure 8 As shown, step S103 also includes the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data hijacking judgment method and apparatus, and a user terminal, and relates to the field of mobile network communication. The data hijacking judgment method and apparatus are used to judge whether hijacking occurs in a data transmission process. The method comprises the following steps: initiating, by the user terminal, an http data request to a server; receiving http response data sent by the server according to the http data request; verifying the http response data; when the verification is passed, judging that the http response data are not hijacked; when the verification fails, judging that the http response data are hijacked; and when it is judged that the http response data are not hijacked, performing corresponding operations on the http response data. The situation that the data are hijacked in the transmission process to affect the user experience is avoided.

Description

technical field [0001] The present invention relates to the field of mobile network communication, in particular to a data hijacking judgment method, device and user terminal. Background technique [0002] Mobile network communication (Mobile web) refers to the way of using mobile devices (such as mobile phones, PDAs or other portable tools) to connect to public networks to achieve Internet access. However, hijacking of communications using mobile networks by malicious third parties is becoming more and more common. In particular, hijacking of mobile network communications for data transmission using the HyperText Transfer Protocol (HyperText Transfer Protocol, http) is extremely serious. After the hijacking is successful, the hijacker will modify the data content (such as inserting advertisements, etc.) to achieve his illegal purpose. However, this seriously affects the user's sense of experience, and will also cause users to distrust the service provider. Cause direct a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/12H04L63/123H04L63/1416H04L63/1466H04L67/02
Inventor 叶林清
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products