CN114157568B - Browser secure access method, device, equipment and storage medium - Google Patents
Browser secure access method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN114157568B CN114157568B CN202111433784.3A CN202111433784A CN114157568B CN 114157568 B CN114157568 B CN 114157568B CN 202111433784 A CN202111433784 A CN 202111433784A CN 114157568 B CN114157568 B CN 114157568B
- Authority
- CN
- China
- Prior art keywords
- browser
- configuration parameters
- access
- preset
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000004088 simulation Methods 0.000 claims abstract description 8
- 238000012986 modification Methods 0.000 claims description 12
- 230000004048 modification Effects 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 4
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims description 2
- 230000006870 function Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 210000001072 colon Anatomy 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000003997 social interaction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a browser secure access method, device, equipment and storage medium. The method comprises the following steps: receiving a security access trigger signal and acquiring a browser configuration parameter; modifying the browser configuration parameters to obtain browser virtual configuration parameters; and sending an access request to a target webpage based on the browser virtual configuration parameters. According to the embodiment of the invention, the actually-operated browser configuration parameters are modified, and the access request is generated based on the modified simulation configuration parameters instead of directly utilizing the browser actual configuration parameters to generate the access request, so that the identity of the current access equipment cannot be effectively identified by the target webpage, the user is prevented from being excessively collected information, and the privacy of the user is protected.
Description
Technical Field
The embodiment of the invention relates to the internet technology, in particular to a browser safe access method, device, equipment and storage medium.
Background
With the increasing popularity of networks in various industries, various behaviors such as shopping, learning, social interaction and the like, which are performed on the network by a user through a browser every day, are more easily and widely collected than ever before.
It is common to summarize and analyze various behaviors of the same user to visually characterize the user. For example, the interest and the demand of the user are determined by searching the content through the search engine of the user, the stay time of certain web pages, collecting web pages, approving the content, purchasing goods and the like, and then the related content is pushed to the user.
Although the behavior is convenient for users to a certain extent, as the collection of information is more and more perfect, the privacy of the users is difficult to avoid being violated and disturbed, and various unthreaded marketing messages and push information also increasingly influence the use experience of the users.
Disclosure of Invention
The embodiment of the invention provides a browser safe access method, device, equipment and storage medium, which are used for realizing that a user cannot effectively collect information by a target webpage, so that the privacy of the user is protected.
In a first aspect, an embodiment of the present invention provides a method for securely accessing a browser, where the method includes:
receiving a security access trigger signal and acquiring a browser configuration parameter;
Modifying the browser configuration parameters to obtain browser virtual configuration parameters;
And sending an access request to a target webpage based on the browser virtual configuration parameters.
In a second aspect, an embodiment of the present invention further provides a secure access device for a browser, where the device includes:
The parameter acquisition module is used for receiving the safety access trigger signal and acquiring the browser configuration parameters;
The parameter modification module is used for modifying the browser configuration parameters to obtain browser virtual configuration parameters;
And the request sending module is used for sending an access request to the target webpage based on the browser virtual configuration parameters.
In a third aspect, an embodiment of the present invention further provides an electronic device, including:
One or more processors;
A storage means for storing one or more programs;
The one or more programs, when executed by the one or more processors, cause the one or more processors to implement the browser security access method of any of the first aspects.
In a fourth aspect, an embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions, when executed by a computer processor, implement the browser security access method of any of the first aspects.
According to the embodiment of the invention, the actually-operated browser configuration parameters are modified, and the access request is generated based on the modified simulation configuration parameters instead of directly utilizing the browser actual configuration parameters to generate the access request, so that the identity of the current access equipment cannot be effectively identified by the target webpage, the user is prevented from being excessively collected information, and the privacy of the user is protected.
Drawings
Other features, objects and advantages of the present invention will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
FIG. 1 is a schematic diagram of a browser secure access method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a browser secure access method according to another embodiment of the present invention;
Fig. 3 is a schematic structural diagram of a browser security access device according to another embodiment of the present invention;
fig. 4 is a block diagram of an electronic device for implementing an embodiment of the invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
Fig. 1 is a flowchart of a browser security access provided in an embodiment of the present invention, where the embodiment is applicable to a scenario where a user accesses a certain web page or a web page through a browser, the method may be performed by a browser security access device, and the device may be implemented in a software and/or hardware manner. The device can be configured in an access device provided with a browser, and the method specifically comprises the following steps:
s110, receiving a security access trigger signal and acquiring browser configuration parameters.
The browser is an application program installed in terminal equipment such as a current mobile phone and a computer for users to access the internet, and can be an independent application program independently presented in an APP form, such as an XX browser; comprehensive application programs of the browser kernel, such as WeChat, XX video, can also be embedded. The configuration parameters are configuration data and operating states on the software and hardware of the current browsing device at run time.
Specifically, in order to ensure the privacy of the user and facilitate the use experience of the user as much as possible, the invention does not directly simulate the configuration parameters of all websites, but obtains the configuration parameters of the browser after receiving the security access trigger signal, and carries out subsequent processing.
In an embodiment of the present invention, optionally, the configuration parameters include at least one of the following: language, geographic location, time zone range, screen resolution, canvas fingerprint, audio fingerprint, and hardware fingerprint.
Because each browser uses a different image processing engine, different export options and different compression levels, the graphics drawn by each access device will be slightly different, and these graphics can be used to assign a specific number to the user terminal as the Canvas (Canvas) fingerprint of the current terminal. And further associating the pattern with the hardware model (such as the hardware information of the display card number, the motherboard number and the like) of the access device to obtain the corresponding hardware (WebGL) fingerprint. Audio (AudioContext) is an Audio AP worker provided by HTML5 for JavaScript programming, which gives the developer the ability to directly manipulate the original Audio stream data in the code, and to perform any of various operations such as increasing tone, changing pitch, audio segmentation, etc. The audio fingerprint is a specific audio information stream generated, and after a series of operations are performed on the specific audio information stream, SHA values are calculated as fingerprints.
In particular, when the configuration parameters include Canvas fingerprints, listening to the Canvas requests modification of the Canvas fingerprints, in order to prevent tracking, adjustments to the generation are required, thus avoiding exposing own data. When the configuration parameters include AudioContext fingerprints, listening AudioContext requests modification of AudioContext fingerprints, protecting itself from AudioContext fingerprints by noise of the analyzer data. When the configuration parameters comprise WebGL fingerprints, monitoring the WebGL to request modification of the WebGL fingerprints, and re-mapping the attribute names through functions in a 16-system form to obtain real attribute names for confusion, so that the reset of the WebGL fingerprints is achieved.
S120, modifying the browser configuration parameters to obtain browser virtual configuration parameters.
Wherein the virtual configuration parameter is a configuration parameter which is different from the original configuration parameter after the original actual configuration parameter is modified,
Specifically, the process of modifying the obtained virtual configuration parameters runs in the background of the current browser, and normal running of the original configuration parameters is not affected or covered. For example, the language used by the current user is Chinese, the browser displays the time as Beijing time zone 12:00, and the two are respectively modified into virtual configuration parameters: english and Washington time zones 23:00, but the user display is still Chinese and time 12:00, and English and Washington time zones 23:00 are only generated in the background and are not displayed to the user, so that the continuity of the user experience is ensured.
In the embodiment of the present invention, optionally, modifying the browser configuration parameter to obtain a browser virtual configuration parameter includes:
and modifying the configuration parameters of the browser by utilizing a configuration parameter modification plug-in which is embedded in the browser in advance.
The browser plug-in can be a pre-built plug-in based on a WebKit kernel, and the WebKit is an open-source browser engine which is widely applied to various devices and operating systems, so that the browser plug-in built based on the WebKit kernel also has high device compatibility and scene applicability.
Specifically, a special browser plug-in corresponding to each type can be set for each type of configuration parameter corresponding to the parameter type to realize accurate control of configuration parameter simulation and meet virtual requirements of different configuration parameters, and a configuration parameter modification plug-in can be set for a plurality of or all evaluation configuration parameters, so that the number of plug-ins required to be operated when the browser simulates the configuration parameters is reduced, and the operation speed of the browser is improved.
S130, sending an access request to a target webpage based on the browser virtual configuration parameters.
The target access request is request data carrying current configuration parameter information and sent to a target webpage of a user.
Specifically, as the target webpage needs the configuration parameters corresponding to the current access equipment, corresponding display data is returned to the current terminal. In the traditional scheme, because the configuration parameters of the user are unchanged, the information returned by the access device to the corresponding server of the target webpage is also fixed, and the target webpage records the data of the access device with the same configuration parameters, so that the portrait of the user can be depicted to acquire various privacy of the user. In this embodiment, the data returned to the target webpage each time is not the actual configuration parameter data of the current access device, but the generated virtual configuration parameter may each time carry different browser configuration parameter data in the access request, so that the target webpage cannot effectively identify and record the identity of the current access device.
According to the embodiment of the invention, the actually-operated browser configuration parameters are modified, and the access request is generated based on the modified simulation configuration parameters instead of directly utilizing the browser actual configuration parameters to generate the access request, so that the identity of the current access equipment cannot be effectively identified by the target webpage, the user is prevented from being excessively collected information, and the privacy of the user is protected.
Fig. 2 is a flowchart of a browser secure access method according to another embodiment of the present invention, where the browser secure access method is further optimized and improved based on the foregoing embodiments. Specifically, referring to fig. 2, the method may include:
S210, if the user is detected to access the preset webpage or execute the preset operation, determining to generate a security access trigger signal.
Specifically, the preset web page is preset by the user according to the own requirement, that is, the user presets a web page white list which does not perform parameter simulation according to the own requirement, and when the web page accessed by the user is detected not to be in the white list, the simulation of the configuration parameters is performed. The preset operation can be a trigger operation which is preset by a user in a preselection mode and accords with the habit of the user, and can be a function starting module preset in a browser interface or a preset shortcut key combination.
S220, receiving the security access trigger signal and acquiring the browser configuration parameters.
S230, modifying the browser configuration parameters to obtain browser virtual configuration parameters.
S240, using a proxy plug-in embedded in the browser in advance to proxy the Internet protocol address of the browser; and skipping access to the target webpage through the Internet protocol address of the proxy.
Wherein the agent's internetworking address dynamically changes.
Specifically, since the IP address (IP address) of each device is generally fixed when the user does not move in place, the same IP address is kept for a long time to access the same web page, and a large amount of history data is easily recorded in the web page. Therefore, the invention does not directly connect with the network through the local actual IP address, but uses the Torr browser agent, so that the user can access the target webpage through agent jump, and the Torr browser agent is dynamically changed, thereby realizing hiding the local public network IP from the risk of IP leakage.
S250, obtaining browser request header information by utilizing a request header generation plug-in embedded in the browser in advance, and modifying the request header information to obtain virtual request header information; and generating a hypertext transfer protocol request according to the virtual request header information.
Wherein, the request header is composed of keyword/value pairs, each row is a pair, the keyword and the value are separated by English colon, the method is used for informing the corresponding server of the target webpage that the information about the client request is included: user-Agent: the browser type of the request is generated, accept: a list of content types identifiable by the client. Host: the requested hostname allows multiple domain names to co-locate an IP address, i.e., a virtual host.
Specifically, communication between the browser and the server corresponding to the web page is generally performed based on a hypertext transfer protocol (HTTP), and the HTTP protocol is generally based on a request header to carry local information. Therefore, the invention can acquire the browser by using the request header generation plug-in the browser to set the request header information, thereby realizing disguising the request header information and enabling the server corresponding to the target webpage to not effectively lock the information such as the browser type, the host name and the like of the local webpage.
And S260, sending an access request to the target webpage based on the browser virtual configuration parameters.
S270, checking whether the target webpage has a function of starting access equipment hardware or not by utilizing a function detection plug-in embedded in the browser in advance; and if the target webpage is determined to have the function of starting the hardware of the access equipment, feeding back to the user.
The device hardware is a camera, a microphone and the like which can be used for collecting user privacy when the device is accessed currently.
Specifically, the function detection plug-in may be used to detect the data returned by the current webpage, determine whether the returned data has an instruction for starting and accessing the hardware of the device, or determine whether the current webpage has a function for starting and accessing the hardware of the device based on a certain database, or may read the historical access record of the webpage, and determine whether the historical access record requiring starting and accessing the hardware of the device exists. When the current webpage is determined to have the function of enabling the hardware of the access equipment, the user is fed back, reminding and notification can be carried out to the user, the options of prohibiting the function, closing the current webpage and returning false parameters of the equipment are further given on the basis of reminding and notification, a specific solution is provided for the user on the basis of protecting the privacy of the user, and the user experience is further improved.
The above-described step S240 and step S250 do not have to be performed in the order of execution, and step S240 may be performed first, step S250 may be performed first, or both may be performed together. The plug-ins used in executing steps S240, S250, and S260 may be pre-built based on WebKit kernel as the configuration parameter modification plug-ins, and have corresponding beneficial effects.
According to the technical scheme, on the basis of simulating the configuration parameters, request header data and an IP address are further disguised, whether the target webpage starts the current hardware configuration parameters or not is judged and processed, so that the user is more difficult to accurately identify the identity by the current target webpage, and the privacy of the user is further protected.
Fig. 3 is a block diagram of a secure access device for a browser according to still another embodiment of the present invention, where, as shown in fig. 3, the device may include:
The parameter obtaining module 310 is configured to receive the security access trigger signal and obtain the browser configuration parameter.
And the parameter modification module 320 is configured to modify the browser configuration parameters to obtain browser virtual configuration parameters.
And the request sending module 330 is configured to send an access request to the target webpage based on the browser virtual configuration parameter.
The device and the module can execute the browser safe access method provided by any embodiment of the invention, and have the corresponding functional modules and beneficial effects of the execution method.
Optionally, the parameter modification module 320 is specifically configured to modify the browser configuration parameter by using a configuration parameter modification plug-in embedded in the browser in advance.
Optionally, the configuration parameters include at least one of: language, geographic location, time zone range, screen resolution, canvas fingerprint, audio fingerprint, and hardware fingerprint.
Optionally, the browser security access device further includes: the signal generation module 340.
The signal generating module 340 is configured to determine to generate a security access trigger signal if it is detected that the user accesses a preset web page or performs a preset operation.
Optionally, the browser security access device further includes: the address proxy module 350.
The address proxy module 350 is configured to proxy the internet protocol address of the browser by using a proxy plugin pre-embedded in the browser; accessing a target webpage through Internet protocol address jump of the proxy; wherein the agent's internetworking address dynamically changes.
Optionally, the browser security access device further includes: request header masquerading module 360.
The request header disguising module 360 is configured to obtain request header information of the browser by using a request header generating plug-in embedded in the browser in advance, and modify the request header information to obtain virtual request header information; and generating a hypertext transfer protocol request according to the virtual request header information.
Optionally, the browser security access device further includes: the function detection module 370.
The function detection module 370 is configured to check whether the target web page has a function of starting the hardware of the access device by using a function detection plug-in embedded in the browser in advance; and if the target webpage is determined to have the function of starting the hardware of the access equipment, feeding back to the user.
The device and the module after further description can execute the browser security access method provided by any embodiment of the invention, and have the corresponding functional module and beneficial effects of the execution method
Fig. 4 is a schematic structural diagram of an electronic device according to another embodiment of the present invention, and as shown in fig. 4, the device includes a processor 40, a memory 41, an input device 42 and an output device 43; the number of processors 40 in the device may be one or more, one processor 40 being taken as an example in fig. 4; the processor 40, the memory 41, the input means 42 and the output means 43 in the device may be connected by a bus or other means, in fig. 4 by way of example.
The memory 41 is a computer readable storage medium, and may be used to store a software program, a computer executable program, and modules, such as program instructions/modules corresponding to the browser security access method in the embodiment of the present invention (for example, the parameter obtaining module 301, the parameter modifying module 302, and the request sending module 303 in the browser security access device). The processor 40 executes various functional applications of the device and data processing by running software programs, instructions and modules stored in the memory 41, i.e. implements the browser security access method described above.
The memory 41 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application program required for functions; the storage data area may store data created according to the use of the terminal, etc. In addition, memory 41 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 41 may further include memory located remotely from processor 40, which may be connected to the device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 42 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the device. The output means 43 may comprise a display device such as a display screen.
Yet another embodiment of the present invention provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are for performing a browser secure access method, the method comprising:
receiving a security access trigger signal and acquiring a browser configuration parameter;
Modifying the browser configuration parameters to obtain browser virtual configuration parameters;
And sending an access request to a target webpage based on the browser virtual configuration parameters.
Of course, the storage medium containing the computer executable instructions provided in the embodiments of the present invention is not limited to the above-described method operations, and may also perform the related operations in the browser security access method provided in any embodiment of the present invention.
From the above description of embodiments, it will be clear to a person skilled in the art that the present invention may be implemented by means of software and necessary general purpose hardware, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk, or an optical disk of a computer, etc., and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present invention.
It should be noted that, in the embodiment of the browser security access device, each module included is only divided according to the functional logic, but not limited to the above division, so long as the corresponding function can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present invention.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.
Claims (8)
1. A browser secure access method, comprising:
if the user is detected to access a preset webpage or execute a preset operation, determining to generate a safe access trigger signal;
receiving a security access trigger signal and acquiring a browser configuration parameter;
Modifying the browser configuration parameters to obtain browser virtual configuration parameters;
Sending an access request to a target webpage based on the browser virtual configuration parameters;
wherein the configuration parameters include: canvas fingerprint, audio fingerprint and hardware fingerprint; the hardware fingerprint is obtained by associating a graph drawn by the access equipment with a hardware model; the audio fingerprint is obtained by generating a specific audio information stream, performing a series of operations on the audio information stream, and then calculating an SHA value;
The preset web pages are web pages in a web page white list which is preset by a user and does not perform parameter simulation; the preset operation is that a user clicks a certain function starting module preset in the browser interface or a preset shortcut key combination.
2. The method of claim 1, wherein modifying the browser configuration parameters to obtain browser virtual configuration parameters comprises:
and modifying the configuration parameters of the browser by utilizing a configuration parameter modification plug-in which is embedded in the browser in advance.
3. The method of claim 1, further comprising, prior to sending an access request to a target web page based on the browser virtual configuration parameters:
using a proxy plugin pre-embedded in a browser to proxy an internet protocol address of the browser;
accessing a target webpage through Internet protocol address jump of the proxy;
Wherein the agent's internetworking address dynamically changes.
4. The method of claim 1, further comprising, prior to sending an access request to a target web page based on the browser virtual configuration parameters:
Obtaining browser request header information by utilizing a request header generation plug-in which is embedded in the browser in advance, and modifying the request header information to obtain virtual request header information;
and generating a hypertext transfer protocol request according to the virtual request header information.
5. The method of claim 1, further comprising, after sending an access request to a target web page based on the browser virtual configuration parameters:
checking whether the target webpage has a function of starting access equipment hardware or not by utilizing a function detection plug-in embedded in the browser in advance;
and if the target webpage is determined to have the function of starting the hardware of the access equipment, feeding back to the user.
6. A browser secure access device, the device comprising:
The signal generation module is used for determining to generate a safe access trigger signal if detecting that a user accesses a preset webpage or executes preset operation;
The parameter acquisition module is used for receiving the safety access trigger signal and acquiring the browser configuration parameters;
The parameter modification module is used for modifying the browser configuration parameters to obtain browser virtual configuration parameters;
The request sending module is used for sending an access request to a target webpage based on the browser virtual configuration parameters;
wherein the configuration parameters include: canvas fingerprint, audio fingerprint and hardware fingerprint; the hardware fingerprint is obtained by associating a graph drawn by the access equipment with a hardware model; the audio fingerprint is obtained by generating a specific audio information stream, performing a series of operations on the audio information stream, and then calculating an SHA value;
The preset web pages are web pages in a web page white list which is preset by a user and does not perform parameter simulation; the preset operation is that a user clicks a certain function starting module preset in the browser interface or a preset shortcut key combination.
7. A browser secure access device, the device comprising:
One or more processors;
storage means for storing one or more programs,
The one or more programs, when executed by the one or more processors, cause the one or more processors to implement the browser security access method of any of claims 1-5.
8. A storage medium containing computer executable instructions which, when executed by a computer processor, are for performing the browser security access method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111433784.3A CN114157568B (en) | 2021-11-29 | 2021-11-29 | Browser secure access method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111433784.3A CN114157568B (en) | 2021-11-29 | 2021-11-29 | Browser secure access method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114157568A CN114157568A (en) | 2022-03-08 |
CN114157568B true CN114157568B (en) | 2024-04-23 |
Family
ID=80784324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111433784.3A Active CN114157568B (en) | 2021-11-29 | 2021-11-29 | Browser secure access method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114157568B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114610305B (en) * | 2022-03-11 | 2023-11-10 | 数坤科技(宁波)有限公司 | Invisible webpage resource development method and device, electronic equipment and medium |
CN117544322B (en) * | 2024-01-10 | 2024-03-22 | 北京雪诺科技有限公司 | Browser identification method, device, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106993009A (en) * | 2016-01-20 | 2017-07-28 | 青岛海信移动通信技术股份有限公司 | A kind of method and apparatus for loading webpage in a browser |
CN110737835A (en) * | 2019-10-15 | 2020-01-31 | 北京丁牛科技有限公司 | browser anti-tracking method and device |
CN111245824A (en) * | 2020-01-09 | 2020-06-05 | 广东三维家信息科技有限公司 | Web client tracking prevention method and system and electronic equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104253805B (en) * | 2013-06-28 | 2018-07-06 | 腾讯科技(深圳)有限公司 | The data guard method and browser of a kind of browser |
-
2021
- 2021-11-29 CN CN202111433784.3A patent/CN114157568B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106993009A (en) * | 2016-01-20 | 2017-07-28 | 青岛海信移动通信技术股份有限公司 | A kind of method and apparatus for loading webpage in a browser |
CN110737835A (en) * | 2019-10-15 | 2020-01-31 | 北京丁牛科技有限公司 | browser anti-tracking method and device |
CN111245824A (en) * | 2020-01-09 | 2020-06-05 | 广东三维家信息科技有限公司 | Web client tracking prevention method and system and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114157568A (en) | 2022-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110537180B (en) | System and method for tagging elements in internet content within a direct browser | |
CN103888490B (en) | A kind of man-machine knowledge method for distinguishing of full automatic WEB client side | |
CN113098870A (en) | Phishing detection method and device, electronic equipment and storage medium | |
US20130042306A1 (en) | Determining machine behavior | |
CN114157568B (en) | Browser secure access method, device, equipment and storage medium | |
CN107085549B (en) | Method and device for generating fault information | |
CN108733559B (en) | Page event triggering method, terminal equipment and medium | |
US10235712B1 (en) | Generating product image maps | |
CN111008348A (en) | Anti-crawler method, terminal, server and computer readable storage medium | |
CN110782374A (en) | Electronic evidence obtaining method and system based on block chain | |
CN102664872B (en) | For detection of with the method preventing server attack in computer network | |
CN111404937B (en) | Method and device for detecting server vulnerability | |
CN103973635A (en) | Page access control method, and related device and system | |
CA3024889C (en) | Method and device for preventing server from being attacked | |
CN106250761B (en) | Equipment, device and method for identifying web automation tool | |
CN109981533B (en) | DDoS attack detection method, device, electronic equipment and storage medium | |
CN112307464A (en) | Fraud identification method and device and electronic equipment | |
CN107180194B (en) | Method and device for vulnerability detection based on visual analysis system | |
CN108270754B (en) | Detection method and device for phishing website | |
CN110929129B (en) | Information detection method, equipment and machine-readable storage medium | |
CN114448645A (en) | Method, device, storage medium and program product for processing webpage access | |
CN110708270B (en) | Abnormal link detection method and device | |
Noskov | Smart City Webgis Applications: Proof of Work Concept For High-Level Quality-Of-Service Assurance | |
CN110825976B (en) | Website page detection method and device, electronic equipment and medium | |
CN112257100A (en) | Method and device for detecting sensitive data protection effect and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |