Data processing method, system and network system
A data processing and key data technology, applied in the field of network security, can solve the problem of low network security performance, achieve the effect of improving network security, ensuring reliability, and avoiding rewriting
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] According to an embodiment of the present application, an embodiment of a data processing method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and although A logical order is shown in the flowcharts, but in some cases steps shown or described may be performed in an order different from that herein.
[0036] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 A block diagram of the hardware structure of a computer terminal (or mobile device) for implementing the data processing method is shown. like figure 1As shown, the computer terminal 10 (or mobile device 10 ) may include one or more processors 102 (shown as 102a, 102b, . or a processing device such as a programmable logic device FPGA), a memory 104 for...
Embodiment 2
[0118] According to the embodiments of the present application, a data processing method is also provided, such as Figure 8 As shown, the method includes the following steps:
[0119] Step S802, intercepting the first request generated by the browser.
[0120] In the above step S802, image 3 The proxy module 301 in can intercept the first request generated by the browser, wherein the first request generated by the browser includes a request generated by operating a web page (for example, an HTTP request) and a request generated by application triggering.
[0121] It should be noted that the process corresponding to the proxy module is a service process running in the background of the browser, and the process corresponding to the proxy module supports offline operation.
[0122] Step S804 , perform duplication processing on the first request to obtain a second request.
[0123] It should be noted that in the process of sending the first request through the browser, each r...
Embodiment 3
[0142] According to an embodiment of the present application, a data processing system for implementing the above data processing method is also provided, such as image 3 As shown, the system includes: an agent module 301 and a page function module 303 .
[0143] The proxy module 301 is used for intercepting the first request generated by the browser, duplicating the first request, and obtaining the second request; receiving the key data sent by the page function module, and making the first request based on the key data Perform signature processing to obtain the third request; send the third request to the firewall indicated by the target address, and temporarily store the second request in the queue to be sent; the process corresponding to the proxy module is the service process running in the background of the browser, And the process corresponding to the proxy module supports offline operation; the page function module 303 is used to generate key data and send the key dat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com