Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-network hijacking method, terminal and server based on tag tracking

A server and tagging technology, applied in the Internet field, can solve problems such as users misunderstanding the quality of product providers and affect user experience, so as to increase the difficulty of cracking and improve the effect of prevention.

Active Publication Date: 2021-11-23
车轮互联科技(上海)股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Injection hijacking not only seriously affects user experience, but also easily causes users to misunderstand the quality of product providers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-network hijacking method, terminal and server based on tag tracking
  • Anti-network hijacking method, terminal and server based on tag tracking
  • Anti-network hijacking method, terminal and server based on tag tracking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] The terms "comprising" and "having" and any variations thereof in the specification and claims of the present invention and the above drawings are intended to cover non-exclusive inclusion, and the terms "first" and "second" are only used for distinguishing names , does not represent the size or ordering of numbers. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a method for preventing network hijacking based on tag tracking, a terminal, and a server, wherein the method includes the following steps: each node in the html issued by the server has a unique fingerprint, and the fingerprint is encoded by obfuscation and then Send it to the client, and the client monitors the changes of the entire DOM through MutationObserver. When a new DOM is found, it first judges whether the root element of the newly added DOM has a data-key, and if so, judges whether its data-key is in the server. The newly added legal DOM, and then determine whether the newly added DOM is legal. By adopting the invention, the cracking difficulty for injection hijacking can be increased, thereby improving the preventive effect for conventional injection hijacking behavior.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a tag tracking-based anti-network hijacking method, a terminal, and a server. Background technique [0002] Web hijacking, that is, network hijacking is not uncommon. Some operator networks or fake base stations hijack users' network requests and inject third-party advertisements or marketing content into the web pages returned by the server. Even if it is a secure network request based on https technology, the hijacking party can also Injection via a man-in-the-middle attack. Injection hijacking not only seriously affects user experience, but also easily causes users to misunderstand the quality of product providers. Contents of the invention [0003] Embodiments of the present invention provide a tag-tracking-based anti-network hijacking method, a terminal, and a server, which can increase the difficulty of deciphering injection-type hijacking, thereby improving the pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 周晶吴峰郭伟
Owner 车轮互联科技(上海)股份有限公司