Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

97results about How to "Avoid hijacking" patented technology

Domain name system DNS secondary recursion resolution method

The invention discloses a domain name system DNS secondary recursion resolution method. After a local DNS server receives a domain name resolution request of a user host, whether a resolution result is cached locally or not is firstly checked, if the resolution result is cached locally, a process is directly responded and finished, if the resolution result is not cached locally, the local DNS server carries out recursion resolution, and the user host is prevented from being attacked by address pollution and domain name hijacking; only when the recursion resolution is failed, the domain name resolution request is forwarded to an external recursion resolution server for secondary resolution; and the local DNS server receives a resolution result returned by the external recursion resolution server, sends the resolution result to the user host and records a cache. The cache record is stored in the external recursion resolution server and positions of network nodes are different, so the condition that the user host cannot access a domain name due to a recursion failure resulting from an error occurring in authorized DNS configuration of a searched domain name is not liable to occur. The method provided by the invention is simple and convenient in operation steps, no hardware is increased, only functions of the local DNS server is modified, and the recursion resolution is backed up.
Owner:BEIJING WANGRUIDA TECH CO LTD

Network data access method and device and electronic equipment

The embodiment of the invention provides a network data access method and device and electronic equipment. The method is applied to a client, and comprises the following steps: firstly, obtaining a first URL request for accessing target network data; Secondly, determining a target agent IP address; Then, based on a target agent IP address, sending an HTTPS request carrying a first domain name andpath information in the first URL request to a target server, after receiving the HTTPS request, the target server determines a second domain name corresponding to the first domain name, determines anIP address corresponding to the second domain name based on a domain name system DNS server in the enterprise intranet, accesses the IP address to obtain target network data corresponding to the pathinformation, and feeds back the target network data to the client; And finally, receiving target network data fed back by the target server. By applying the embodiment of the invention, HTTP hijacking and domain name resolution hijacking can be prevented, so that the purpose of accessing effective network data is achieved.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Credible electronic transaction method and transaction system

InactiveCN101482957APrevent man-in-the-middle attacksPrevent transaction sensitive information leakageTransmissionCommerceTransaction serviceAuthorization
The invention discloses a credible electronic trading method and a trading system thereof, belonging to the technical field of information security. The inventive trading method comprises the following steps: a user logs in a trading server through an information transmission medium; initializing between a credible trading service terminal and a trading server through the information transmission medium, and setting up security connection; the credible trading service terminal displays trading information of the electronic trading in a way capable of being understood by the user, and the trading information is validated through the credible trading service terminal if the user confirms the trading information is right; the credible trading service terminal authorizes the trading server to trade through the information transmission medium. The inventive trading system comprises a personal computer and the credible trading service terminal. Compared with the prior art, the invention solves security problems of network angling, authorization hijack and the like existing in electronic payment and network trading through the credible trading service terminal, and related authentication and encryption protocols.
Owner:PEKING UNIV

Anti-hijack communication method of DNS (Domain Name System)

ActiveCN104135471AGuaranteed not to be hijackedAvoid being hijackedTransmissionDomain nameDomain Name System
The invention provides an anti-hijack communication method of a DNS (Domain Name System), which relies on a router and has excellent security. The anti-hijack communication method comprises the following processes that: a user sends a domain name resolution request, after the router receives the request, the router does not directly forward outwards, instead, the following judgments are made, if the router has no DNS cache or the DNS cache has no relevant record, and an anti-hijack DNS server is arranged in the router, the router is communicated with the anti-hijack DNS server, and a communication process is as follows: if the router and the anti-hijack DNS server perform safety communication handshake, the following process is executed; otherwise, the safety communication handshake is established firstly; and the router and the anti-hijack DNS server both utilize keys established by the safety communication handshake to encrypt and decrypt sending information and receiving information respectively so as to carry out communication, the information, which is sent to the anti-hijack DNS server by the router, at least comprises a requested domain name, and the information, which is sent to the router by the anti-hijack DNS server, is information fed back by the information, which is sent to the anti-hijack DNS server by the router.
Owner:JIAXING CHENXIANG INFORMATION TECH

Method and device for full-text protection and verification of feedback data

The invention provides a method and a device for full-text protection and verification of feedback data. The method comprises the following steps: a server extracts the message abstract of full-text data requested by a client; hash operation is performed on a randomly generated disturbance string and the message abstract by use of a message abstract algorithm to obtain a digital signature; the asymmetrically encrypted disturbance string, the digital signature and the full-text data are combined into the feedback data for feeding back to the client; the client receives the feedback data and decrypts the disturbance string by use of an appointed key; the message abstract of the received full-text data by use of a method appointed with the server; hash operation is performed on the decrypted disturbance string and the message abstract by use of the message abstract algorithm to obtain a digital signature, and then the digital signature is compared with the digital signature in the feedback data, and then the comparison result indicates that the two digital signatures are the same, the full-text data are confirmed to be legal. The invention also provides a device corresponding to the method. The method for full-text protection and verification of feedback data is capable of performing quick and accurate verification on the authenticity of the full-text data.
Owner:BEIJING QIHOO TECH CO LTD +1

Refrigerator car or warehouse multipoint monitoring and data returning device

InactiveCN105607559AGuarantee quality and safetyComprehensive monitoring of environmental parametersProgramme controlComputer controlCold chainRefrigerator car
The invention discloses a refrigerator car or warehouse multipoint monitoring and data returning device. The refrigerator car or warehouse multipoint monitoring and data returning device comprises a monitoring unit, a monitoring data returning unit, a display unit, a keyboard and an alarm unit, wherein the monitoring unit, the monitoring data returning unit, the display unit, the keyboard and the alarm unit are connected with a control unit. Multiple temperature and humidity monitoring points are arranged in a refrigerator car or a warehouse, environment parameters in a compartment or the warehouse can be monitored in an omni-directional manner, when humiture is higher than a preset upper value or lower than a preset lower value, acousto-optic alarm signals are emitted, real-time monitoring data is transmitted to a background management server or a specified mobile phone through a GPRS wireless network, and monitoring personnel is prompted timely to take remedy measures, such that quality safety of vaccines, biological agents, food and the like which are transported by the refrigerator car in a cold chain transport process or quality safety of medicine, food and the like in the warehouse can be fully guaranteed.
Owner:北京华海隆科技有限公司

Website monitoring method and device thereof

ActiveCN108809943APrevent traffic from being hijackedWide range of applicationsTransmissionData miningData science
The disclosure relates to a website monitoring method and a device thereof. The method includes the following steps: obtaining multiple pictures corresponding to a website at multiple time points; calculating a hash value corresponding to each picture among the multiple pictures; comparing the first hash values corresponding to each picture; and if the first hash values are different, determiningthat the website is tampered with. According to the website monitoring method and the device thereof provided by the embodiment of the disclosure, whether the website is tampered with can be determined by using the hash values of the pictures corresponding to the website, additional setting conditions are not required, and thus the website monitoring is simple and effective.
Owner:SUZHOU WINNDOO NETWORK TECH CO LTD

Method, client, and server for preventing web page hijacking

A method for preventing hijacking of a web page is provided. A HyperText Markup Language (HTML) source file is received from a web server in response to a HyperText Transfer Protocol (HTTP) access request, the HTML source file being embedded with a script tag corresponding to script code for preventing HTTP hijacking. The script code for preventing HTTP hijacking is pulled from an antihijacking server according to the script tag. It is detected, based on the script code for preventing HTTP hijacking, whether a document object model (DOM) node used for HTTP hijacking exists in a DOM tree. The DOM node used for HTTP hijacking is hidden from a web page of a browser in response to detecting that the DOM node used for HTTP hijacking.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and sever for downloading application program

The embodiment of the invention discloses a method and a server for downloading an application program. The method comprises the following steps: receiving request information for downloading an application program, sent by a client; generating response information for downloading the application program, sent by the client; judging whether the response information contains the suffix name of a moving application program or the name of the application program; if the response information contains the suffix name of the moving application program or the name of the application program, encrypting the response information; sending the encrypted response information to the client. The implementation of the embodiment of the invention is favorable for reducing the possibility that an operator recognizes the feature information in the application downloading request to prevent the operator to hijack the application program, so that the application downloading safety and user experience are promoted.
Owner:MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products