Mobile internet traffic anti-hijacking method and system

A mobile Internet, anti-hijacking technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inability to effectively prevent session layer hijacking, low compatibility, and no logging

Pending Publication Date: 2022-01-28
杭州推啊网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology mainly has no log records, low compatibility and inability to effectively prevent session layer hijacking, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile internet traffic anti-hijacking method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following description serves to disclose the present invention to enable those skilled in the art to carry out the present invention. The preferred embodiments described below are only examples, and those skilled in the art can devise other obvious variations. The basic principles of the present invention defined in the following description can be applied to other embodiments, variations, improvements, equivalents and other technical solutions without departing from the spirit and scope of the present invention.

[0022] It can be understood that the term "a" should be understood as "at least one" or "one or more", that is, in one embodiment, the number of an element can be one, while in another embodiment, the number of the element The quantity can be multiple, and the term "a" cannot be understood as a limitation on the quantity.

[0023] Please combine figure 1 , a method and system for preventing hijacking of mobile Internet traffic in the present invention, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile internet traffic anti-hijacking method and system, and the method comprises the following steps: loading a monitoring script on a mobile terminal page, wherein the monitoring script is used for monitoring a dom label of the mobile terminal page, and the monitoring script obtains a dom label of the page script of the mobile terminal; pre-establishing a domain name white list; obtaining the address of the dom tag, judging whether the address of the dom tag is in the domain name white list or not, and if not, executing script operation corresponding to the dom tag. According to the method and the system, on the basis of recording and reporting of front-end code hijacking, whether the illegal dom tag exists in the current page or not is intelligently detected by introducing the monitoring script, the illegal hijacking flow is identified according to the detected illegal dom tag, the compatibility is better, and the efficiency is higher. when the illegal dom tag is found each time, the deletion operation of the script corresponding to the illegal dom tag is executed, and the monitoring and execution log is generated and reported, so that the mobile browser page can be effectively monitored.

Description

technical field [0001] The invention relates to the technical field of Internet traffic monitoring, in particular to a mobile Internet traffic anti-hijacking method and system. Background technique [0002] At present, in the era of mobile Internet, traffic hijacking is very common, such as hosts hijacking, process hooking, startup hijacking, LSP injection, browser plug-in hijacking, HTTP proxy filtering, kernel data packet hijacking, etc., which have a great impact on traffic propagation. CSP mainly adds whitelist domain names in the nginx configuration file. However, the existing technologies mainly have no logging, low compatibility, and inability to effectively prevent session layer hijacking. Contents of the invention [0003] One of the purposes of the present invention is to provide a method and system for preventing hijacking of mobile Internet traffic. The method and system are based on the recording and reporting of front-end code hijacking, and intelligently de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1466H04L63/101
Inventor 田正男康旭峰郭鹏
Owner 杭州推啊网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products