CN106331827B - Advertisement pop-up processing method, equipment and system - Google Patents
Advertisement pop-up processing method, equipment and system Download PDFInfo
- Publication number
- CN106331827B CN106331827B CN201610689042.XA CN201610689042A CN106331827B CN 106331827 B CN106331827 B CN 106331827B CN 201610689042 A CN201610689042 A CN 201610689042A CN 106331827 B CN106331827 B CN 106331827B
- Authority
- CN
- China
- Prior art keywords
- cryptographic hash
- advertising information
- user terminal
- server
- illegal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 25
- 230000004044 response Effects 0.000 claims abstract description 74
- 238000000034 method Methods 0.000 claims abstract description 30
- 238000012545 processing Methods 0.000 claims description 17
- 208000033748 Device issues Diseases 0.000 claims 1
- 101100409308 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) adv-1 gene Proteins 0.000 description 6
- 244000097202 Rathbunia alamosensis Species 0.000 description 5
- 235000009776 Rathbunia alamosensis Nutrition 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002224 dissection Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000029058 respiratory gaseous exchange Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000003612 virological effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/431—Generation of visual interfaces for content selection or interaction; Content or additional data rendering
- H04N21/4312—Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations
- H04N21/4316—Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations for displaying supplemental content in a region of the screen, e.g. an advertisement in a separate window
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44204—Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Marketing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the present invention provides a kind of advertisement pop-up processing method, equipment and system.This method comprises: user terminal receives the http response and advertising information that network side issues;User terminal calculates separately the first cryptographic Hash of http response and the second cryptographic Hash of advertising information;The incidence relation of first cryptographic Hash and the second cryptographic Hash is sent to server by user terminal.The embodiment of the present invention identifies http response and advertising information by cryptographic Hash, if the associated advertising information of different http responses is identical, indicate that the advertising information is illegal advertising information, by the cryptographic Hash of http response and the cryptographic Hash of advertising information, illegal advertising information can be accurately judged.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of advertisement pop-up processing methods, equipment and system.
Background technique
With the development of communication technology, user obtains Internet resources by way of online, has become the daily life of people
Indispensable information acquiring pattern in work.
In the prior art, during user browses webpage by browser, it always can be appreciated that below webpage there is advertisement pop-up,
The advertisement pop-up is suspended in a window on web page contents, and occurring advertisement pop-up below webpage may be because hacker steals
Hypertext transfer protocol (Hyper Text Transfer Protocol, the abbreviation HTTP) request that user terminal issues is black
Visitor obtains the IP address of user terminal by parsing HTTP request, and then is pushed according to the IP address of user terminal to user terminal
Advertising information, the advertising information specifically can be ad code, will be wide after the browser of user terminal receives ad code
Announcement code is integrated into advertisement pop-up and is shown in the webpage of user's browsing.
Since hacker has stolen the IP address of user terminal, so hacker can constantly push illegally to user terminal
Advertisement pop-up, and the prior art is lower to the detection accuracy of illegal advertisement pop-up.
Summary of the invention
The embodiment of the present invention provides a kind of advertisement pop-up processing method, equipment and system, to improve to illegal advertisement bullet
The detection accuracy of window.
The one aspect of the embodiment of the present invention is to provide a kind of advertisement pop-up processing method, comprising:
User terminal receives the http response and advertising information that network side issues;
The user terminal calculates separately the first cryptographic Hash of the http response and the second Hash of the advertising information
Value;
The incidence relation of first cryptographic Hash and second cryptographic Hash is sent to server by the user terminal, with
The incidence relation for sending the server according to each user terminal determines whether the advertising information is illegal advertisement letter
Breath.
The other side of the embodiment of the present invention is to provide a kind of advertisement pop-up processing method, comprising:
Server receives the incidence relation of the first cryptographic Hash that each user terminal is sent and the second cryptographic Hash, and described first
Cryptographic Hash is that the user terminal receives and the cryptographic Hash of calculated http response, second cryptographic Hash are that the user is whole
End receives and the cryptographic Hash of calculated advertising information, and the http response and the advertising information are the user terminals from net
Network, which flanks, to be received;
The incidence relation that the server is sent according to each user terminal determines whether the advertising information is non-
Method advertising information.
The other side of the embodiment of the present invention is to provide a kind of user terminal, comprising:
First receiving module, for receiving the http response and advertising information that network side issues;
Computing module, for calculating separately the first cryptographic Hash of the http response and the second Hash of the advertising information
Value;
First sending module, for the incidence relation of first cryptographic Hash and second cryptographic Hash to be sent to service
Device, so that the incidence relation that the server is sent according to each user terminal, determines whether the advertising information is illegal wide
Accuse information.
The other side of the embodiment of the present invention is to provide a kind of server, comprising:
Second receiving module, the association for receiving the first cryptographic Hash and the second cryptographic Hash that each user terminal is sent are closed
System, first cryptographic Hash are the cryptographic Hash of the user terminal reception and calculated http response, second cryptographic Hash
It is the cryptographic Hash of the user terminal reception and calculated advertising information, the http response and the advertising information are described
User terminal is received from network side;
Second determining module, the incidence relation for being sent according to each user terminal, determines the advertising information
It whether is illegal advertising information.
The other side of the embodiment of the present invention is to provide a kind of advertisement pop-up processing system, including the user terminal
With the server.
Advertisement pop-up processing method, equipment and system provided in an embodiment of the present invention, receive network side by user terminal
The http response and advertising information issued, and calculate separately the first cryptographic Hash of http response and the second Hash of advertising information
Value, is sent to server for the incidence relation of the first cryptographic Hash and the second cryptographic Hash, server is sent according to each user terminal
Incidence relation in identical second cryptographic Hash number and corresponding first cryptographic Hash of identical second cryptographic Hash be
It is no identical, determine whether advertising information is illegal advertising information, i.e., identifies http response and advertising information by cryptographic Hash, if
The associated advertising information of different http responses is identical, indicates that the advertising information is illegal advertising information, passes through http response
Cryptographic Hash and advertising information cryptographic Hash, can accurately judge illegal advertising information.
Detailed description of the invention
Fig. 1 is advertisement pop-up processing method flow chart provided in an embodiment of the present invention;
Fig. 2 is the network architecture diagram that advertisement pop-up processing method provided in an embodiment of the present invention is applicable in;
Fig. 3 be another embodiment of the present invention provides advertisement pop-up processing method flow chart;
Fig. 4 be another embodiment of the present invention provides advertisement pop-up processing method flow chart;
Fig. 5 is the structure chart of user terminal provided in an embodiment of the present invention;
Fig. 6 be another embodiment of the present invention provides user terminal structure chart;
Fig. 7 is the structure chart of server provided in an embodiment of the present invention;
Fig. 8 be another embodiment of the present invention provides server structure chart;
Fig. 9 is the structure chart of advertisement pop-up processing system provided in an embodiment of the present invention.
Specific embodiment
Fig. 1 is advertisement pop-up processing method flow chart provided in an embodiment of the present invention;Fig. 2 is provided in an embodiment of the present invention
The applicable network architecture diagram of advertisement pop-up processing method.The embodiment of the present invention is directed in the prior art since hacker has stolen user
The IP address of terminal, so hacker can constantly push illegal advertisement pop-up to user terminal, and the prior art is to illegal
Advertisement pop-up detection accuracy it is lower, provide advertisement pop-up processing method, specific step is as follows for this method:
Step S101, user terminal receives the http response and advertising information that network side issues.
As shown in Fig. 2, user terminal 20 is connected to network by BAS Broadband Access Server 21, from BAS Broadband Access Server 21
Into the link of network, it is possible to be deployed with light-dividing device, the light-dividing device is reproducible from BAS Broadband Access Server 21 to network
Link in the optical signal that transmits, if the optical signal that light-dividing device copies to is stolen by hacked equipment 23, hacked equipment 23 can will
The optical signal that light-dividing device copies to is converted to electric signal, and carries out dissection process to electric signal, for example, user terminal 20 passes through
BAS Broadband Access Server 21 sends HTTP request to the service server 25 of network side, can be stolen by preceding method hacked equipment 23
The HTTP request is got, and does not influence the normal transmission of HTTP request, i.e., hacked equipment 23 can take in user terminal 20 and business
In the unwitting situation of device 25 of being engaged in, the HTTP request that user terminal 20 is sent to service server 25 is stolen, due to HTTP request
In include user terminal 20 IP address and service server 25 IP address, then hacked equipment 23 can be according to user terminal 20
IP address sends invalid information to user terminal 20, can also be sent out according to the IP address of service server 25 to service server 25
Send invalid information.
Since service server 25 can normally receive the HTTP request of the transmission of user terminal 20, then service server 25 can be just
Http response often is fed back to user terminal 20, in addition, if thering is advertising information to need to be sent to user terminal in service server 25
20, service server 25 also normally can issue advertising information to user terminal 20, alternatively, hacked equipment 23 can be according to user terminal
20 IP address sends illegal advertising information to user terminal 20, i.e. user terminal 20 sends HTTP to service server 25 and asks
After asking, the http response of the transmission of service server 25 can receive, also can receive service server 25 or hacked equipment 23 is sent out
The advertising information sent, for a user, the advertising information that service server 25 issues are acceptables, and hacker is set
Standby 23 advertising informations issued are unacceptable, because the advertising information that service server 25 issues may be no viral, and
The advertising information that hacked equipment 23 issues contains virus.
Step S102, described user terminal calculates separately the first cryptographic Hash and the advertising information of the http response
Second cryptographic Hash.
In this embodiment it is assumed that receiving a http response and one after a user terminal HTTP request of every transmission
Advertising information is shown multiple for example, user opens Sina's homepage by the browser that user terminal is installed in Sina's homepage
Hyperlink, when the user clicks when one of hyperlink, user terminal sends a HTTP request to Sina website, and user clicks
After the hyperlink, browser shows the web page contents that the hyperlink is connected and advertisement pop-up quickly, wherein web page contents
It is equivalent to the http response that Sina website is fed back to user terminal, advertisement pop-up may be that Sina website issues, it is also possible to
What hacked equipment 23 issued.
In order to carry out legitimate verification to the advertisement pop-up, after user terminal receives http response and advertising information,
The cryptographic Hash of http response and advertising information is calculated separately, in the present embodiment, the cryptographic Hash of http response is denoted as the first Hash
Value, the cryptographic Hash of advertising information are denoted as the second cryptographic Hash.
Step S103, the incidence relation of first cryptographic Hash and second cryptographic Hash is sent to by the described user terminal
Server, so that the incidence relation that the server is sent according to each user terminal, determines whether the advertising information is non-
Method advertising information.
When user terminal 20 calculate http response the first cryptographic Hash and advertising information the second cryptographic Hash after, by
The incidence relation of one cryptographic Hash and the second cryptographic Hash is sent to server 24 as shown in Figure 2.
Since there are many number of the user terminal of access service server 25, when each user terminal receives http response
After advertising information, each user terminal calculates the first cryptographic Hash of http response and the second cryptographic Hash of advertising information, and
The incidence relation of first cryptographic Hash and the second cryptographic Hash is sent to server 24.Therefore, server 24 will receive multiple
User terminal send the first cryptographic Hash and the second cryptographic Hash incidence relation, it is assumed that user terminal 30 send incidence relation be
H (site 1): H (adv 1), H (site 1) are the first cryptographic Hash of the http response that user terminal 30 receives, H (adv 1)
It is the second cryptographic Hash of the advertising information that user terminal 30 receives;The incidence relation that user terminal 20 is sent is H (site 2):
H (adv 2), H (site 2) are the first cryptographic Hash of the http response that user terminal 20 receives, and H (adv 2) is user terminal
Second cryptographic Hash of 20 advertising informations received;The incidence relation that user terminal 40 is sent is H (site 3): H (adv 3), H
(site 3) is the first cryptographic Hash of the http response that user terminal 40 receives, and H (adv 3) is that user terminal 40 receives
Second cryptographic Hash of advertising information.If H (site 1), H (adv 2), H (site 3) are different, and H (adv 1), H
(adv 2), H (adv 3) three are identical, and the webpage for indicating that user terminal 20, user terminal 30, user terminal 40 access is different,
User terminal 20, user terminal 30, the web page contents that show respectively of browser of user terminal 40 are different, but user terminal 20,
User terminal 30, the advertisement pop-up that the browser of user terminal 40 is shown respectively are identical, i.e., multiple users browse different webpages
Content, but the visible identical advertisement pop-up of multiple users, illustrate that hacked equipment 23 is issued to the user terminal of multiple users
Identical advertisement pop-up, then server 24 can determine that the advertisement pop-up that multiple users see is illegal advertisement pop-up.
The present embodiment receives the http response and advertising information that network side issues by user terminal, and calculates separately HTTP
First cryptographic Hash of response and the second cryptographic Hash of advertising information, the incidence relation of the first cryptographic Hash and the second cryptographic Hash is sent
To server, the number of identical second cryptographic Hash, Yi Jixiang in the incidence relation that server is sent according to each user terminal
With corresponding first cryptographic Hash of the second cryptographic Hash it is whether identical, determine whether advertising information is illegal advertising information, i.e.,
Http response and advertising information are identified by cryptographic Hash, if the associated advertising information of different http responses is identical, indicating should
Advertising information is illegal advertising information, by the cryptographic Hash of http response and the cryptographic Hash of advertising information, can accurately be sentenced
Break and illegal advertising information.
Fig. 3 be another embodiment of the present invention provides advertisement pop-up processing method flow chart.The base of embodiment shown in Fig. 1
On plinth, specific step is as follows for advertisement pop-up processing method provided in this embodiment:
Step S301, user terminal receives the http response and advertising information that network side issues.
Step S301 is consistent with step S101, and details are not described herein again for specific method.
Step S302, described user terminal calculates separately the first cryptographic Hash and the advertising information of the http response
Second cryptographic Hash.
Step S302 is consistent with step S102, and details are not described herein again for specific method.
Step S303, the incidence relation of first cryptographic Hash and second cryptographic Hash is sent to by the described user terminal
Server, so that the incidence relation that the server is sent according to each user terminal, determines whether the advertising information is non-
Method advertising information.
Step S303 is consistent with step S103, and details are not described herein again for specific method.
Step S304, the described user terminal receives the corresponding target Hash of illegal advertising information that the server issues
Value.
On the basis of the above embodiments, if server 24 determines user terminal 20, user terminal 30, user terminal 40
The advertisement pop-up that browser is shown respectively is illegal advertisement pop-up, then server 24 is by H (adv 1), H (adv 2) or H (adv
3) the second cryptographic Hash indicated is sent to user terminal 20, user terminal 30, user terminal 40, so that user terminal 20, user
Terminal 30, user terminal 40 determine that its received advertising information is illegal advertising information according to the second cryptographic Hash.
In addition, in other embodiments, not limiting the number of user terminal, it is assumed that the number of user terminal can be it is N number of,
N is more than or equal to 2, and it is as follows that server 24 receives the incidence relation that N number of user terminal is sent respectively:
H(site 1):H(adv 1);
H(site 2):H(adv 2);
H(site 3):H(adv 3);
……
H(site N):H(adv N)。
Assuming that having m the second cryptographic Hash identical in H (adv 1), H (adv 2) ... H (adv N), and the m second is breathed out
Corresponding first cryptographic Hash of uncommon value is different, it is determined that the advertising information of m the second cryptographic Hash common IDs is illegal wide
Accuse information.And server 24 is sent to N number of user terminal using m identical second cryptographic Hash as target cryptographic Hash.
Step S305, the advertisement that the described user terminal is received according to the target cryptographic Hash and the user terminal
Second cryptographic Hash of information determines whether the advertising information is illegal advertising information.
Specifically, if the second cryptographic Hash of the advertising information that the target cryptographic Hash and the user terminal receive
Equal, then the user terminal determines that the advertising information is illegal advertising information.
After N number of user terminal receives target cryptographic Hash, the institute that is received according to the target cryptographic Hash and the user terminal
The second cryptographic Hash for stating advertising information determines whether the advertising information is illegal advertising information, wherein user terminal receives
The advertising information can be the advertising information received before receiving target cryptographic Hash, be also possible to receive target Hash
The advertising information received after value, i.e. user terminal can carry out non-according to advertising information of the target cryptographic Hash to historical reception
Method verifying, can also illegally verify the advertising information newly received.Specifically, if target cryptographic Hash and the user terminal
Second cryptographic Hash of the advertising information received is identical, it is determined that whether the advertising information is illegal advertising information.
Step S306, the described user terminal carries out shielding processing to the illegal advertising information.
It is non-to this after user terminal determines that received advertising information is illegal advertising information according to step S305
Method advertising information carries out shielding processing, i.e., does not show illegal advertising information in the web page contents that browser is opened, illegal wide
Accusing information can be illegal advertisement pop-up above-mentioned.
The present embodiment receives the corresponding target cryptographic Hash of illegal advertising information that server issues by user terminal, according to
Second cryptographic Hash of the advertising information that target cryptographic Hash and user terminal receive determines whether advertising information is illegal advertisement letter
Breath, and after determining that the advertising information is illegal advertising information, shielding processing is carried out to illegal advertising information, avoids user's point
Illegal advertisement pop-up is hit, the safety of user terminal is improved.
Fig. 4 be another embodiment of the present invention provides advertisement pop-up processing method flow chart.As shown in figure 4, the present embodiment
Specific step is as follows for the advertisement pop-up processing method of offer:
Step S401, the association that server receives the first cryptographic Hash and the second cryptographic Hash that each user terminal is sent is closed
System, first cryptographic Hash are the cryptographic Hash of the user terminal reception and calculated http response, second cryptographic Hash
It is the cryptographic Hash of the user terminal reception and calculated advertising information, the http response and the advertising information are described
User terminal is received from network side.
Step S402, the incidence relation that the described server is sent according to each user terminal determines the advertisement letter
Whether breath is illegal advertising information.
Specifically, if each user terminal send the incidence relation in, identical second cryptographic Hash of size
Number is greater than threshold value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size is different, then the server
Determine that the advertising information is illegal advertising information;The server is breathed out identical second cryptographic Hash of size as target
Uncommon value is sent to the user terminal.
The method and step of the present embodiment and the method and step of above-described embodiment are consistent, and details are not described herein again.
The present embodiment receives the http response and advertising information that network side issues by user terminal, and calculates separately HTTP
First cryptographic Hash of response and the second cryptographic Hash of advertising information, the incidence relation of the first cryptographic Hash and the second cryptographic Hash is sent
To server, the number of identical second cryptographic Hash, Yi Jixiang in the incidence relation that server is sent according to each user terminal
With corresponding first cryptographic Hash of the second cryptographic Hash it is whether identical, determine whether advertising information is illegal advertising information, i.e.,
Http response and advertising information are identified by cryptographic Hash, if the associated advertising information of different http responses is identical, indicating should
Advertising information is illegal advertising information, by the cryptographic Hash of http response and the cryptographic Hash of advertising information, can accurately be sentenced
Break and illegal advertising information.
Fig. 5 is the structure chart of user terminal provided in an embodiment of the present invention.User terminal provided in an embodiment of the present invention can
To execute the process flow of advertisement pop-up processing method embodiment offer, as shown in figure 5, user terminal 50 includes the first reception mould
Block 51, computing module 52, the first sending module 53.First receiving module 51 is used to receive http response that network side issues and wide
Accuse information;Computing module 52 is used to calculate separately the first cryptographic Hash of the http response and the second Hash of the advertising information
Value;First sending module 53 is used to the incidence relation of first cryptographic Hash and second cryptographic Hash being sent to server,
So that the incidence relation that the server is sent according to each user terminal, determines whether the advertising information is illegal advertisement letter
Breath.
The embodiment of the present invention receives the http response and advertising information that network side issues by user terminal, and calculates separately
First cryptographic Hash of http response and the second cryptographic Hash of advertising information, by the incidence relation of the first cryptographic Hash and the second cryptographic Hash
It is sent to server, the number of identical second cryptographic Hash in the incidence relation that server is sent according to each user terminal, with
And whether corresponding first cryptographic Hash of identical second cryptographic Hash is identical, determines whether advertising information is illegal advertisement letter
Breath, i.e., identify http response and advertising information by cryptographic Hash, if the associated advertising information of different http responses is identical, table
Show that the advertising information is illegal advertising information, it, can be accurate by the cryptographic Hash of http response and the cryptographic Hash of advertising information
Judge illegal advertising information.
Fig. 6 be another embodiment of the present invention provides user terminal structure chart.On the basis of the above embodiments, first
Receiving module 51 is also used to receive the corresponding target cryptographic Hash of illegal advertising information that the server issues;User terminal 50 is also
Including the first determining module 54, what the first determining module 54 was used to be received according to the target cryptographic Hash and the user terminal
Second cryptographic Hash of the advertising information determines whether the advertising information is illegal advertising information.
Further, if the first determining module 54 is specifically used for what the target cryptographic Hash and the user terminal received
Second cryptographic Hash of the advertising information is equal, it is determined that the advertising information is illegal advertising information;User terminal 50 also wraps
Shroud module 55 is included, shroud module 55 is used to carry out shielding processing to the illegal advertising information.
User terminal provided in an embodiment of the present invention can be specifically used for executing embodiment of the method provided by above-mentioned Fig. 3,
Details are not described herein again for concrete function.
The embodiment of the present invention receives the corresponding target cryptographic Hash of illegal advertising information that server issues by user terminal,
According to the second cryptographic Hash of the advertising information that target cryptographic Hash and user terminal receive, determine whether advertising information is illegal wide
Information is accused, and after determining that the advertising information is illegal advertising information, shielding processing is carried out to illegal advertising information, avoids using
Illegal advertisement pop-up is clicked at family, improves the safety of user terminal.
Fig. 7 is the structure chart of server provided in an embodiment of the present invention.Server provided in an embodiment of the present invention can be held
Row advertisement pop-up processing method embodiment provide process flow, as shown in fig. 7, server 70 include the second receiving module 71,
Second determining module 72.Second receiving module 71 is used to receive the first cryptographic Hash and the second cryptographic Hash that each user terminal is sent
Incidence relation, first cryptographic Hash is that the user terminal receives and the cryptographic Hash of calculated http response, described the
Two cryptographic Hash are that the user terminal receives and the cryptographic Hash of calculated advertising information, the http response and the advertisement are believed
Breath is that the user terminal is received from network side;Second determining module 72 is used for according to the transmission of each user terminal
Incidence relation determines whether the advertising information is illegal advertising information.
The embodiment of the present invention receives the http response and advertising information that network side issues by user terminal, and calculates separately
First cryptographic Hash of http response and the second cryptographic Hash of advertising information, by the incidence relation of the first cryptographic Hash and the second cryptographic Hash
It is sent to server, the number of identical second cryptographic Hash in the incidence relation that server is sent according to each user terminal, with
And whether corresponding first cryptographic Hash of identical second cryptographic Hash is identical, determines whether advertising information is illegal advertisement letter
Breath, i.e., identify http response and advertising information by cryptographic Hash, if the associated advertising information of different http responses is identical, table
Show that the advertising information is illegal advertising information, it, can be accurate by the cryptographic Hash of http response and the cryptographic Hash of advertising information
Judge illegal advertising information.
Fig. 8 be another embodiment of the present invention provides server structure chart.On the basis of the above embodiments, second really
If cover half block 72 is specifically used in the incidence relation that each user terminal is sent, identical second cryptographic Hash of size
Number is greater than threshold value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size is different, it is determined that described wide
Accusing information is illegal advertising information.
Server 70 further includes the second sending module 73, and the second sending module 73 is used to breathe out size identical described second
Uncommon value is sent to the user terminal as target cryptographic Hash.
Server provided in an embodiment of the present invention can be specifically used for executing embodiment of the method provided by above-mentioned Fig. 4, tool
Details are not described herein again for body function.
The embodiment of the present invention receives the corresponding target cryptographic Hash of illegal advertising information that server issues by user terminal,
According to the second cryptographic Hash of the advertising information that target cryptographic Hash and user terminal receive, determine whether advertising information is illegal wide
Information is accused, and after determining that the advertising information is illegal advertising information, shielding processing is carried out to illegal advertising information, avoids using
Illegal advertisement pop-up is clicked at family, improves the safety of user terminal.
Fig. 9 is the structure chart of advertisement pop-up processing system provided in an embodiment of the present invention.It is provided in an embodiment of the present invention wide
The process flow of advertisement pop-up processing method embodiment offer can be executed by accusing pop-up processing system, as shown in figure 9, advertisement pop-up
Processing system 90 includes the server 70 in user terminal 50 and above-described embodiment in above-described embodiment.
Advertisement pop-up processing system provided in an embodiment of the present invention can execute the offer of advertisement pop-up processing method embodiment
Process flow.
In conclusion the embodiment of the present invention receives the http response and advertising information that network side issues by user terminal,
And the first cryptographic Hash of http response and the second cryptographic Hash of advertising information are calculated separately, by the first cryptographic Hash and the second cryptographic Hash
Incidence relation be sent to server, identical second cryptographic Hash in the incidence relation that server is sent according to each user terminal
Number and corresponding first cryptographic Hash of identical second cryptographic Hash it is whether identical, determine whether advertising information is non-
Method advertising information identifies http response and advertising information by cryptographic Hash, if the associated advertisement letter of different http responses
Manner of breathing is same, indicates that the advertising information is illegal advertising information, passes through the cryptographic Hash of http response and the Hash of advertising information
Value, can accurately judge illegal advertising information;It is corresponding that the illegal advertising information that server issues is received by user terminal
Target cryptographic Hash determine that advertisement is believed according to the second cryptographic Hash of the advertising information that target cryptographic Hash and user terminal receive
Whether breath is illegal advertising information, and after determining that the advertising information is illegal advertising information, is carried out to illegal advertising information
Shielding processing avoids user from clicking illegal advertisement pop-up, improves the safety of user terminal.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit
Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various
It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules
At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On
The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (11)
1. a kind of advertisement pop-up processing method characterized by comprising
User terminal receives the http response and advertising information that network side issues;
The user terminal calculates separately the first cryptographic Hash of the http response and the second cryptographic Hash of the advertising information;
The incidence relation of first cryptographic Hash and second cryptographic Hash is sent to server by the user terminal, so that institute
The incidence relation that server is sent according to each user terminal is stated, determines whether the advertising information is illegal advertising information;
Wherein, if the number of identical second cryptographic Hash of size is big in the incidence relation that each user terminal is sent
In threshold value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size is different, then the server determines institute
Stating advertising information is illegal advertising information.
2. the method according to claim 1, wherein the user terminal is by first cryptographic Hash and described
The incidence relation of two cryptographic Hash is sent to after server, further includes:
The user terminal receives the corresponding target cryptographic Hash of illegal advertising information that the server issues;
The second of the advertising information that the user terminal is received according to the target cryptographic Hash and the user terminal breathes out
Uncommon value, determines whether the advertising information is illegal advertising information.
3. according to the method described in claim 2, it is characterized in that, the user terminal is according to the target cryptographic Hash and described
Second cryptographic Hash of the advertising information that user terminal receives determines whether the advertising information is illegal advertising information,
Include:
It is described if the second cryptographic Hash of the advertising information that the target cryptographic Hash and the user terminal receive is equal
User terminal determines that the advertising information is illegal advertising information;
The user terminal carries out shielding processing to the illegal advertising information.
4. a kind of advertisement pop-up processing method characterized by comprising
Server receives the incidence relation of the first cryptographic Hash that each user terminal is sent and the second cryptographic Hash, first Hash
Value is the cryptographic Hash of the user terminal reception and calculated http response, and second cryptographic Hash is that the user terminal connects
It receives and the cryptographic Hash of calculated advertising information, the http response and the advertising information are the user terminals from network side
It receives;
The incidence relation that the server is sent according to each user terminal determines whether the advertising information is illegal wide
Accuse information;
Wherein, the incidence relation that the server is sent according to each user terminal, determine the advertising information whether be
Illegal advertising information, comprising:
If in the incidence relation that each user terminal is sent, the number of identical second cryptographic Hash of size is greater than threshold
Value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size is different, then the server determines described wide
Accusing information is illegal advertising information.
5. according to the method described in claim 4, it is characterized by further comprising:
The server is sent to the user terminal using identical second cryptographic Hash of size as target cryptographic Hash.
6. a kind of user terminal characterized by comprising
First receiving module, for receiving the http response and advertising information that network side issues;
Computing module, for calculating separately the first cryptographic Hash of the http response and the second cryptographic Hash of the advertising information;
First sending module, for the incidence relation of first cryptographic Hash and second cryptographic Hash to be sent to server,
So that the incidence relation that the server is sent according to each user terminal, determines whether the advertising information is illegal advertisement letter
Breath;
Wherein, if the number of identical second cryptographic Hash of size is big in the incidence relation that each user terminal is sent
In threshold value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size is different, then the server determines institute
Stating advertising information is illegal advertising information.
7. user terminal according to claim 6, which is characterized in that first receiving module is also used to receive the clothes
The corresponding target cryptographic Hash of illegal advertising information that business device issues;
The user terminal further include:
First determining module, of the advertising information for being received according to the target cryptographic Hash and the user terminal
Two cryptographic Hash determine whether the advertising information is illegal advertising information.
8. user terminal according to claim 7, which is characterized in that if first determining module is specifically used for the mesh
Second cryptographic Hash of the advertising information that mark cryptographic Hash and the user terminal receive is equal, it is determined that the advertising information
It is illegal advertising information;
The user terminal further include:
Shroud module, for carrying out shielding processing to the illegal advertising information.
9. a kind of server characterized by comprising
Second receiving module, for receiving the incidence relation of the first cryptographic Hash and the second cryptographic Hash that each user terminal is sent,
First cryptographic Hash is the cryptographic Hash of the user terminal reception and calculated http response, and second cryptographic Hash is institute
The cryptographic Hash of user terminal reception and calculated advertising information is stated, the http response and the advertising information are the users
What terminal from network side received;
Whether second determining module, the incidence relation for being sent according to each user terminal, determine the advertising information
For illegal advertising information;
Wherein, if second determining module is specifically used in the incidence relation that each user terminal is sent, size is identical
The number of second cryptographic Hash be greater than threshold value, and corresponding first cryptographic Hash of identical second cryptographic Hash of size
It is different, it is determined that the advertising information is illegal advertising information.
10. server according to claim 9, which is characterized in that the server further include:
Second sending module, it is whole for being sent to the user using identical second cryptographic Hash of size as target cryptographic Hash
End.
11. a kind of advertisement pop-up processing system characterized by comprising as the described in any item users of claim 6-8 are whole
End, and the server as described in claim 9 or 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610689042.XA CN106331827B (en) | 2016-08-18 | 2016-08-18 | Advertisement pop-up processing method, equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610689042.XA CN106331827B (en) | 2016-08-18 | 2016-08-18 | Advertisement pop-up processing method, equipment and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106331827A CN106331827A (en) | 2017-01-11 |
CN106331827B true CN106331827B (en) | 2019-04-16 |
Family
ID=57743098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610689042.XA Active CN106331827B (en) | 2016-08-18 | 2016-08-18 | Advertisement pop-up processing method, equipment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106331827B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104866478A (en) * | 2014-02-21 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Detection recognition method and device of malicious text |
CN105138442A (en) * | 2015-08-24 | 2015-12-09 | 成都秋雷科技有限责任公司 | Webpage advertisement popup blocking method |
CN105183793A (en) * | 2015-08-24 | 2015-12-23 | 成都秋雷科技有限责任公司 | Method for quickly intercepting popup windows of webpage |
CN105208401A (en) * | 2014-06-24 | 2015-12-30 | 广州市动景计算机科技有限公司 | Method and device for identifying advertisement videos |
CN105718861A (en) * | 2016-01-15 | 2016-06-29 | 北京市博汇科技股份有限公司 | Method and device for identifying video streaming data category |
-
2016
- 2016-08-18 CN CN201610689042.XA patent/CN106331827B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104866478A (en) * | 2014-02-21 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Detection recognition method and device of malicious text |
CN105208401A (en) * | 2014-06-24 | 2015-12-30 | 广州市动景计算机科技有限公司 | Method and device for identifying advertisement videos |
CN105138442A (en) * | 2015-08-24 | 2015-12-09 | 成都秋雷科技有限责任公司 | Webpage advertisement popup blocking method |
CN105183793A (en) * | 2015-08-24 | 2015-12-23 | 成都秋雷科技有限责任公司 | Method for quickly intercepting popup windows of webpage |
CN105718861A (en) * | 2016-01-15 | 2016-06-29 | 北京市博汇科技股份有限公司 | Method and device for identifying video streaming data category |
Also Published As
Publication number | Publication date |
---|---|
CN106331827A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102419808B (en) | Method, device and system for detecting safety of download link | |
CN102333122B (en) | Downloaded resource provision method, device and system | |
EP2889792A1 (en) | Method and system for identifying suspected phishing websites | |
CN103152354B (en) | To method, system and client device that dangerous website is pointed out | |
CN104079557A (en) | CC attack protection method and device | |
CN106899549B (en) | Network security detection method and device | |
WO2012166440A2 (en) | External link processing | |
CN102739663A (en) | Detection method and scanning engine of web pages | |
CN103491543A (en) | Method for detecting malicious websites through wireless terminal, and wireless terminal | |
WO2016101764A1 (en) | Method for advertisement blocking in dual-core browser, and browser device | |
CN104994092A (en) | Service request processing method, terminal browser and anti-attack server | |
CN103973635A (en) | Page access control method, and related device and system | |
CN103152355A (en) | Method and system for promoting dangerous website and client device | |
CN109996201B (en) | A network access method and network device | |
CN103986731A (en) | Method and device for detecting phishing web pages through image matching | |
EP2761463A1 (en) | Apparatus, method and computer-readable storage medium for securing javascript | |
CN103618696A (en) | Method and server for processing cookie information | |
CN104978423A (en) | Website type detection method and apparatus | |
CN103581321B (en) | A kind of creation method of refer chains, device and safety detection method and client | |
CN106331827B (en) | Advertisement pop-up processing method, equipment and system | |
CN109413022A (en) | A kind of method and apparatus based on user behavior detection HTTP FLOOD attack | |
CN104506529A (en) | Website protection method and device | |
CN107491480A (en) | A kind of search result display processing method and device | |
CN108984673B (en) | File detection method and device | |
TWI750252B (en) | Method and device for recording website access log |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |