Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and terminal for detecting correctness of resource files

A resource file and correctness technology, which is applied in the direction of network data retrieval, other database retrieval, website content management, etc., can solve problems such as low efficiency, achieve the effect of improving efficiency, ensuring user experience and functional integrity

Active Publication Date: 2021-06-25
FUJIAN TIANQUAN EDUCATION TECH LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complex Internet environment and the relatively wide distribution of users, it is very inefficient to let users provide feedback to solve product problems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and terminal for detecting correctness of resource files
  • A method and terminal for detecting correctness of resource files
  • A method and terminal for detecting correctness of resource files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] Please refer to figure 1 , a method for detecting the correctness of resources, including the steps of:

[0071] S1. Obtain a first resource with a preset attribute on the current page, where the preset attribute is used to indicate the integrity of the first resource;

[0072] Wherein, in the browser of the client, the first resource corresponds to the second resource of the server, and the preset attribute is specifically a data-integrity attribute;

[0073] The first resource is the style and script file of the current page. Before the S1, the server scans the html file in the local project directory, and parses out the second resource corresponding to the first resource through a regular expression. The second The resource includes the style and script file of the parsed html file, the resource content of the second resource is read through the relative path of the second resource, and the third attribute value of the second resource is calculated through a preset ...

Embodiment 2

[0092] Please refer to figure 1 and image 3 , the difference between this embodiment and embodiment one is; also includes:

[0093] If the callback fails, and the first resource may be tampered with, execute S4;

[0094] S4. Re-initiate a second remote call request with the same address, and the second remote call request has no integrity attribute;

[0095] Obtaining resource information corresponding to the address through the second remote call request, and storing the resource information into a library;

[0096] Wherein, the corresponding resource information is specifically the resource information corresponding to the first resource, including the resource size and address information of the corresponding resource, and also includes information such as the user ip corresponding to the first resource;

[0097] Wherein, storing the resource information into the database includes:

[0098] Send information such as the resource size and address information of the resou...

Embodiment 3

[0101]Apply the technical solution of this application to a specific application scenario. For example, during the double 11 event, when a user uses a business product of the product side, a pop-up advertisement appears for Alipay to receive a red envelope. The user uses the technical solution of this application to obtain the current page The first resource with the preset data-integrity attribute, the first resource is the style and script file of the current page, create a sandbox isolation, and obtain the address and data-integrity of the first resource in sequence in the sandbox An attribute value of the integrity attribute, according to the address and the attribute value, sending and acquiring the first resource to construct a first remote call request, setting the value of the integrity attribute of the first remote call request as the attribute value of the data-integrity attribute, Monitor the callback result of the first remote call. If the callback is successful, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and a terminal for detecting the correctness of resources, obtains the first resource with preset attributes on the current page, sequentially obtains the address of the first resource and the first attribute value of the preset attribute, and according to the address and the first attribute value to construct the first remote call request, set the value of the integrity attribute of the first remote call request as the first attribute value, monitor the callback result of the first remote call request, and detect the correctness of the first resource according to the callback result; When a resource tag with an integrity attribute is detected, it will automatically verify whether the corresponding resource content conforms to the string obtained by the algorithm contained in the integrity attribute, so that we can know whether the resource content has been tampered with, and skillfully use the browser SRI to correct The verification mechanism automatically detects the correctness of resource files cached by operators or other network devices, improves the efficiency of detection, and effectively guarantees user experience and functional integrity.

Description

technical field [0001] The invention relates to the field of computer software security, in particular to a method and a terminal for detecting the correctness of resource files. Background technique [0002] Operators or other network devices usually use cached resource files to improve response speed, but due to the increasingly complex current network environment, different operators or other network devices may have different versions of resource files cached, but the resource file is It is not the correct version of the file provided by the product, or the cached resource file is tampered with, resulting in functions that are not related to the current business or affecting the current business functions on the user end, causing abnormalities on the user end. [0003] For example, during the Double 11 event, when users use the products of the product side on the user terminal, a pop-up advertisement for Alipay to receive red envelopes appears, but the product side does ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06F16/958G06F16/957
Inventor 刘德建林超郭玉湖
Owner FUJIAN TIANQUAN EDUCATION TECH LTD