Unlock instant, AI-driven research and patent intelligence for your innovation.

Network hijacking processing method and device and electronic equipment

A processing method and network technology, applied in the Internet field, can solve problems such as user sensitive data leakage, and achieve the effect of blocking damage and preventing sensitive data leakage

Active Publication Date: 2019-06-07
TENCENT TECH WUHAN
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem in the prior art that when the certificate warning is popped up, the user chooses to ignore the certificate warning, resulting in the risk of user sensitive data leakage, the present disclosure provides a network hijacking processing method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network hijacking processing method and device and electronic equipment
  • Network hijacking processing method and device and electronic equipment
  • Network hijacking processing method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0064] figure 1 is a schematic diagram of an implementation environment involved in accordance with the present disclosure. The implementation environment includes: a terminal 110 , a web server 120 and a security control server 130 .

[0065] The association manner among the terminal 110, the webpage server 120 and the security control server 130 includes the network association manner and / or pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network hijacking processing method and device, electronic equipment and a computer readable storage medium. The scheme comprises the following steps: obtaining site access state data sent by a webpage display terminal for site access, wherein the site access state data is collected when a certificate alarm in site access is ignored and corresponds to a user of site access; Obtaining hijacked user information corresponding to the hijacked user in the site access according to the site access state data corresponding to the site access user; And controlling the sensitive data security of the hijacked user according to the hijacked user information. According to the scheme, the webpage server can know whether the communication link between the webpage server and thewebpage display end is hijacked or not at the first time and determine the specific hijacked user, and therefore corresponding measures can be taken in time to prevent sensitive data of the hijacked user from being leaked, and damage caused by network hijacking is blocked.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular to a network hijacking processing method and device, electronic equipment, and a computer-readable storage medium. Background technique [0002] Generally speaking, sites that store user sensitive data (such as social, financial, game and other related sites) use the HTTPS (Hypertext Transfer Security Protocol) protocol for encrypted transmission when providing services. This is because once such sensitive information is stolen by criminals, it will cause huge losses to users and cause unnecessary commercial disputes. Therefore, it is necessary to take security measures for the interactions involved in website access. [0003] When users visit such sites in an unsafe or untrusted network environment, they are usually attacked by man-in-the-middle criminals, that is, inserting a node between the site and the user, pretending to be the site and interacting with real ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张羿
Owner TENCENT TECH WUHAN