Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for identifying page hijacking behaviors

A behavior and page technology, applied in computer security devices, special data processing applications, network data navigation, etc., can solve problems such as users being unable to perform page rollbacks

Pending Publication Date: 2020-09-01
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing poor experience on H5, such as the page being hijacked and causing the user to be unable to perform page rollback, has also begun to appear in the small program.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying page hijacking behaviors
  • Method and device for identifying page hijacking behaviors
  • Method and device for identifying page hijacking behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Exemplary embodiments of the present application are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present application to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0018] figure 1 An exemplary system architecture 100 is shown to which embodiments of the method for identifying pagejacking behavior of the present application may be applied.

[0019] like figure 1 As shown, the system architecture 100 may include terminal devices 1011 and 1012 , a network 102 and a host application server 103 . The network 102 is used as a medi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for identifying page hijacking behaviors, and relates to the technical field of data security. A specific embodiment of the method comprises the steps of monitoring a navigation behavior of a page of a hosting application hosted in a host application and an operation behavior of a user for the hosting application; determining whether the page is hijacked or not based on the navigation behavior and the operation behavior by utilizing preset configuration information used for identifying that the hosting application page is hijacked,the configuration information comprising hijacking behavior discrimination information, and the hijacking behavior discrimination information being used for indicating a hijacking behavior that the page is hijacked; in response to determining that the page is hijacked, generating a page hijacking record; and sending the page hijacking record to a server of the host application. According to the embodiment, the hijacking behavior of the applet page can be accurately identified.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and specifically to the field of data security technology. Background technique [0002] A hosted application (ie, an applet) is an application that can run in a host application. The user can directly open the applet through the host application. With the continuous development of the Mini Program ecology, more and more original H5 sites are migrated to Mini Programs. However, the existing poor experience on H5, such as the hijacking of the page and the inability of the user to return the page, and other bad situations are also beginning to appear in the small program. Therefore, how to accurately identify the hijacking of the mini program page based on the user's operation behavior, so as to deal with the mini program in a timely manner, will directly affect whether the mini program ecology can develop healthily. Contents of the invention [0003] A method and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/56G06F16/954
CPCG06F21/566G06F21/552G06F16/954
Inventor 陈都
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD