Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for processing web application programs

A processing method and web application technology, applied in the computer field, can solve the problem of inability to detect illegal clients, etc.

Active Publication Date: 2021-06-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a processing method and device for a Web application program, which is used to solve the technical problem that an illegal client cannot be detected in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing web application programs
  • Method and device for processing web application programs
  • Method and device for processing web application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] This embodiment provides a processing method for a Web application, such as figure 1 As shown, the method includes:

[0050] Step S101: Obtain the JS code of the web application.

[0051]Specifically, JS code is JavaScript code, which is a literal scripting language, and also a dynamic type, weak type, and prototype-based language with built-in support types. Usually used to write web applications.

[0052] Step S102: Filter out core functions from the JS code.

[0053] Specifically, the JS code includes implementation codes for the core functions and security functions of the web application, and these codes are implemented by using functions, that is, core functions.

[0054] In an optional implementation, in order to better conceal the core functions, this implementation will also filter out some non-core functions, and the number of non-core functions can be selected according to needs, for example, the number of core functions is 50, the number of non-core func...

Embodiment 3

[0153] Based on the same inventive concept, the present application also provides a computer-readable storage medium 300, on which a computer program 311 is stored, and when the program is executed by a processor, the method in Embodiment 1 is realized.

[0154] Specifically, the above program is configured to perform the following steps:

[0155] Get the JS code of the web application;

[0156] Filter out core functions from the JS code;

[0157] Encrypting the original function name of the core function based on a first preset encryption algorithm to obtain a first function name;

[0158] Encrypting the first function name based on a second preset encryption algorithm to obtain a second function name;

[0159] storing the first function name and the second function name in the JS code;

[0160] If it is detected that the client calls the first function name in the JS code, it is determined that the client is an illegal client.

Embodiment 4

[0162] Based on the same inventive concept, this application also provides a kind of computer equipment, please refer to Figure 4 , including a storage 401, a processor 402, and a computer program 403 stored in the storage and operable on the processor, and the processor 402 implements the method in Embodiment 1 when executing the program.

[0163] Specifically, the above processor is configured to perform the following steps:

[0164] Get the JS code of the web application;

[0165] Filter out core functions from the JS code;

[0166] Encrypting the original function name of the core function based on a first preset encryption algorithm to obtain a first function name;

[0167] Encrypting the first function name based on a second preset encryption algorithm to obtain a second function name;

[0168] storing the first function name and the second function name in the JS code;

[0169] If it is detected that the client calls the first function name in the JS code, it is de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a method and device for processing a Web application, wherein the method includes: obtaining the JS code of the Web application; screening out the core function from the JS code; Encrypt the original function name of the core function to obtain a first function name; encrypt the first function name based on a second preset encryption algorithm to obtain a second function name; combine the first function name and the second function name The second function name is stored in the JS code; if it is detected that the client calls the first function name in the JS code, it is determined that the client is an illegal client. The method of the invention solves the technical problem that illegal clients cannot be detected in the prior art.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for processing Web application programs. Background technique [0002] Currently, a Web application is an application that can be accessed through the Web. Its advantage is that the access method is relatively simple, and users only need to access it through a browser without installing other software. [0003] For web application programs in the prior art, the commonly used programming language is JavaScript, so the code of the program is JS code. JS code is an interpreted scripting language that does not need to be compiled, but is interpreted and executed at runtime. When the web application is released, it is easy to release the source code, especially some security functions involved in the web application. The content, such as the password encryption of the login account, the protocol encryption of network communication, etc., is easy to be ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/125G06F21/602
Inventor 周志刚陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products