Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Data processing method and device, server and user terminal

A data processing and server technology, applied in the computer field, can solve problems such as loss of user traffic, hijacking of page A, affecting user experience, etc., and achieve the effect of avoiding experience.

Inactive Publication Date: 2018-07-13
ALIBABA (CHINA) CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Traffic hijacking is the use of various malicious software to modify the browser, lock the homepage or pop up new windows continuously, forcing users to visit certain websites, resulting in the loss of user traffic
For example, when the client initiates a request to the server, the server sends a page A to the client in response to the request. However, the page A is hijacked during transmission to the client, and part of the content is changed such as being inserted into an advertisement or the url is changed such as changing the channel number. Or the entire site is changed, so that the data actually received by the client is the tampered B page
Nowadays, traffic hijacking is becoming more and more common, especially in mobile network communication, which greatly affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, server and user terminal
  • Data processing method and device, server and user terminal
  • Data processing method and device, server and user terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0044] Figure 4 shows a flow chart of a data processing method provided by the first embodiment of the present invention, please refer to Figure 4 , this embodiment describes the processing flow of the server 200. The data processing methods include:

[0045] Step S110, the server generates response data according to the data request sent by the client;

[0046] Hypertext Transfer Protocol (HTTP, Hyper Text Transfer Protocol) is the most widely used network protocol on the Internet, and is a standard protocol for request and response between user terminals and servers. The HTTP protocol uses a request / response model. After the user terminal and the server establish a connection based on the HTTP protocol, the user can send a data request to the server through the client. After receiving the data request, the server will generate response data according to the data request, also known as a response (response) message.

[0047] Step S120, the server generates verification ...

no. 2 example

[0065] Figure 7 shows a flow chart of a data processing method provided by the second embodiment of the present invention, please refer to Figure 7 , this embodiment describes the processing flow of the client in the user terminal 100 . The data processing methods include:

[0066] Step S201, the client sends a data request to the server;

[0067] The user can send a data request to the server 200 through the client. For example, the client is a browser, and when a user needs to access a webpage in the browser, a data request for obtaining the content of the webpage needs to be sent to the server through the browser.

[0068] Step S202, the client receives the response data and verification information sent by the server;

[0069]After obtaining the data request sent by the client, the server 200 generates corresponding response data according to the data request, and generates verification information according to the data request, response data and key. For a specific...

no. 3 example

[0079] Figure 8 shows a flow chart of a data processing method provided by the third embodiment of the present invention, please refer to Figure 8 , this embodiment describes the processing flow of the client in the user terminal 100 . The data processing methods include:

[0080] Step S301, the client sends a data request to the server;

[0081] Step S302, the client receives the response data sent by the server;

[0082] For specific implementation manners of step S301 and step S302, reference may be made to step S201 and step S202 in the above-mentioned second embodiment, which will not be repeated here.

[0083] Step S303, judging whether verification information is received;

[0084] If the verification information is received, it indicates that the server 200 has generated the verification information according to the received data request, the response data generated according to the data request and the key, and sent the response data and the generated verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data processing method and device, a server and a user terminal, and belongs to the field of computer technology. The data processing method comprises the following steps that: a server generates response data according to a data request sent by a client; the server generates check information according to the data request, the response data and a key; and the server sendsthe response data and the check information to the client, so that the client judges whether the response data are hijacked or not according to the check information in order to prevent the hijackedresponse data from affecting the user experience.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular, to a data processing method, device, server and user terminal. Background technique [0002] Traffic hijacking is the use of various malicious software to modify the browser, lock the homepage or pop up new windows continuously, forcing users to visit certain websites, resulting in the loss of user traffic. For example, when the client initiates a request to the server, the server sends a page A to the client in response to the request. However, the page A is hijacked during the transmission to the client, and some content changes, such as inserting advertisements or url changes, such as changing the channel number, Or the entire site is changed, etc., so that the data actually received by the client is the tampered B page. Nowadays, traffic hijacking is becoming more and more common, especially in mobile network communication, which greatly affects the user experience. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/123H04L63/126H04L63/1466
Inventor 陈策
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products