Data processing method, system and network system

A data processing and key data technology, applied in the field of network security, can solve the problem of low network security performance, achieve the effect of improving network security, ensuring reliability, and avoiding rewriting

Active Publication Date: 2022-06-28
ALIBABA GRP HLDG LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a data processing method, system, and network system to at least solve the technical problem of low network security performance caused by the existing way of rewriting the application program interface to intercept traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, system and network system
  • Data processing method, system and network system
  • Data processing method, system and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] According to an embodiment of the present application, an embodiment of a data processing method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and although A logical order is shown in the flowcharts, but in some cases steps shown or described may be performed in an order different from that herein.

[0036] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 A block diagram of the hardware structure of a computer terminal (or mobile device) for implementing the data processing method is shown. like figure 1As shown, the computer terminal 10 (or mobile device 10 ) may include one or more processors 102 (shown as 102a, 102b, . or a processing device such as a programmable logic device FPGA), a memory 104 for...

Embodiment 2

[0118] According to the embodiments of the present application, a data processing method is also provided, such as Figure 8 As shown, the method includes the following steps:

[0119] Step S802, intercepting the first request generated by the browser.

[0120] In the above step S802, image 3 The proxy module 301 in can intercept the first request generated by the browser, wherein the first request generated by the browser includes a request generated by operating a web page (for example, an HTTP request) and a request generated by application triggering.

[0121] It should be noted that the process corresponding to the proxy module is a service process running in the background of the browser, and the process corresponding to the proxy module supports offline operation.

[0122] Step S804 , perform duplication processing on the first request to obtain a second request.

[0123] It should be noted that in the process of sending the first request through the browser, each r...

Embodiment 3

[0142] According to an embodiment of the present application, a data processing system for implementing the above data processing method is also provided, such as image 3 As shown, the system includes: an agent module 301 and a page function module 303 .

[0143] The proxy module 301 is used for intercepting the first request generated by the browser, duplicating the first request, and obtaining the second request; receiving the key data sent by the page function module, and making the first request based on the key data Perform signature processing to obtain the third request; send the third request to the firewall indicated by the target address, and temporarily store the second request in the queue to be sent; the process corresponding to the proxy module is the service process running in the background of the browser, And the process corresponding to the proxy module supports offline operation; the page function module 303 is used to generate key data and send the key dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a data processing method, system and network system. Wherein, the method includes: intercepting the first request generated by the browser; copying the first request to obtain the second request; obtaining key data from the browser, and signing the first request based on the key data , get the third request; send the third request to the target address, and temporarily store the second request in the waiting queue. The present application solves the technical problem of low network security performance caused by the existing way of rewriting the application program interface to intercept traffic.

Description

technical field [0001] The present application relates to the field of network security, and in particular, to a data processing method, system, and network system. Background technique [0002] Machine traffic, also known as automated program traffic, is the traffic generated when automated tools run. Automated tools are programs that are automatically executed, and usually perform simple and repetitive tasks, such as crawler robots that automatically retrieve websites, automatic The ticket grabbing program for train tickets, the ticket brushing program for automatic voting, etc. [0003] Although automated tools bring convenience to people's life and work, automated tools also pose a threat to network security. For example, CC (Challenge Collapsar) attacks pose a threat to the network with the help of automated tools. Therefore, intercepting machine traffic can effectively improve network security. [0004] Most of the existing solutions for intercepting machine traffic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L67/02H04L67/56
CPCH04L63/306H04L63/0428H04L63/02H04L9/3271H04L9/3247H04L9/3213H04L67/02H04L67/56
Inventor 张佳辰
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products