CN110580318A - Information display method and device and storage medium - Google Patents
Information display method and device and storage medium Download PDFInfo
- Publication number
- CN110580318A CN110580318A CN201810487648.4A CN201810487648A CN110580318A CN 110580318 A CN110580318 A CN 110580318A CN 201810487648 A CN201810487648 A CN 201810487648A CN 110580318 A CN110580318 A CN 110580318A
- Authority
- CN
- China
- Prior art keywords
- media
- server
- information
- malicious
- media information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides an information display method, which comprises the following steps: responding to the display operation of the page, and sending an acquisition request to a server; receiving media information sent by a server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of first media content; sending a reading message to a server, wherein the reading message carries a storage directory of the media information, so that the server reads the media information according to the storage directory; receiving a reading result sent by a server; and when the reading result shows that the malicious media information exists, displaying the second media content on the display position corresponding to the malicious media information in the page.
Description
Technical Field
The present application relates to the field of information technologies, and in particular, to a method and an apparatus for displaying information, and a storage medium.
Background
With the development of information technology, more and more people perform daily activities through the internet, such as activities of watching news, watching videos and the like, when a user performs activities through the internet, particularly, activities through watching a web page, and when the display information on the web page is acquired, a malicious platform or a malicious terminal may perform malicious interception on part or all of the display information and replace the display information into malicious information, so that the malicious information is displayed in the web page, and therefore, bad use experience is brought to the user, and how to ensure good use experience of the user is the key for solving the problems.
Disclosure of Invention
the technical scheme is provided, malicious information can be prevented from being displayed, and therefore good use experience of a user is maintained.
The embodiment of the application provides an information display method, which comprises the following steps: responding to the display operation of the page, and sending an acquisition request to a server; receiving media information sent by a server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of first media content; sending a reading message to a server, wherein the reading message carries a storage directory of the media information, so that the server reads the media information according to the storage directory; receiving a reading result sent by a server; and when the reading result shows that the malicious media information exists, displaying the second media content on the display position corresponding to the malicious media information in the page.
In some examples, the method further comprises: and when the reading result shows that the malicious media information exists, displaying prompt information of malicious hijacking in the page.
In some examples, the method further comprises: storing the media information in a local storage directory; obtaining the obtaining address and the display bit information of the malicious media information from the reading result; determining a display bit according to the display bit information in the malicious media information; deleting the acquisition address under the storage directory; acquiring a storage address of the second media content; wherein the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the second media content on the display position in the page according to the storage address.
In some examples, the obtaining the storage address of the second media content includes: and responding to the triggering operation of the media tool control, and acquiring the storage address of the second media content through the media tool.
In some examples, the method further comprises: if the media information sent by the server in response to the acquisition request is not received, executing a step of sending the acquisition request to the server; and when receiving the media information sent by the server in response to the acquisition request, executing a step of sending a read message to the server.
In some examples, the method further comprises: and if the first media information sent by the server in response to the acquisition request is not received, executing the step of displaying the second media content on the display position corresponding to the malicious media information in the page.
In some examples, the method further comprises: if the media information sent by the server in response to the acquisition request is not received, recording an event indicating that the media information sent by the server in response to the acquisition request is not received; and sending the event to the server.
In some examples, the method further comprises: and when the reading result shows that the malicious media information does not exist, displaying the media content at the corresponding display position in the page.
In some examples, the method further comprises: when the reading result shows that malicious media information exists, displaying an installation control of a media tool and prompt information of the media tool for processing the malicious media information in the page; responding to the triggering operation of the installation control, and downloading and installing the media tool; after the media tool is installed, displaying a media tool control in the page; wherein, the obtaining the storage address of the second media content through the media tool in response to the triggering operation of the media tool control comprises: responding to the triggering operation of the media tool control, and acquiring the size of the display position so that the media tool acquires a storage address of second media content corresponding to the size from a media content server; wherein the method further comprises: and receiving the storage address of the second media content sent by the media tool.
In some examples, the page also presents hint information and media tool controls for media tools to handle malicious media information; wherein the method further comprises: responding to the triggering operation of the media tool control, and acquiring a storage address of the second media content through the media tool; wherein the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the second media content on the display position in the page according to the storage address.
in some examples, the obtaining the storage address of the second media content includes: sending an acquisition request to a media content server, wherein the acquisition request carries the size of the display position; and receiving the storage address of the second media content corresponding to the size, which is sent by the media content server in response to the acquisition request.
The example of this application has still provided a display device of information, the device includes: the sending module is used for responding to the display operation of the page and sending an acquisition request to the server; the receiving module is used for receiving media information sent by the server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of the first media content; the sending module is used for sending a reading message to the server, wherein the reading message carries the storage directory of the media information, so that the server reads the media information according to the storage directory; the receiving module is used for receiving a reading result sent by the server; and the display module is used for displaying the second media content on the display position corresponding to the malicious media information in the page when the read result shows that the malicious media information exists.
In some examples, the presentation module presents, when the read result indicates that malicious media information exists, prompt information indicating that malicious hijacking occurs in the page.
in some examples, the device further comprises: the storage module is used for storing the media information in a local storage directory; the acquisition module acquires an acquisition address and display bit information of the malicious media information from the reading result; the determining module is used for determining a display bit according to the display bit information in the malicious media information; the deleting module deletes the acquired address in the storage directory; the acquisition module acquires a storage address of the second media content; and the display module displays the second media content on the display position in the page according to the storage address.
in some examples, the obtaining module obtains, by the media tool, a storage address of the second media content in response to a triggering operation of the media tool control.
In some examples, if the media information sent by the server in response to the acquisition request is not received, the acquisition module executes a step of sending the acquisition request to the server; and when receiving the media information sent by the server in response to the acquisition request, the sending module executes the step of sending the read message to the server.
In some examples, if the first media information sent by the server in response to the acquisition request is not received, the presentation module executes the step of presenting the second media content on the presentation position corresponding to the malicious media information in the page.
In some examples, the device further comprises: the recording module is used for recording an event which indicates that the media information sent by the server in response to the acquisition request is not received if the media information sent by the server in response to the acquisition request is not received; and the sending module is used for sending the event to a server.
In some examples, when the read result indicates that malicious media information does not exist, the presentation module presents the media content at a corresponding presentation position in the page.
In some examples, the presentation module presents, when the read result indicates that malicious media information exists, an installation control of a media tool and prompt information of the media tool for processing the malicious media information in the page; the apparatus further comprises: the response module is used for downloading and installing the media tool in response to the triggering operation of the installation control; the display module is used for displaying the media tool control in the page after the media tool is installed; the obtaining module is used for responding to the triggering operation of the media tool control to obtain the size of the display position so that the media tool can obtain a storage address of second media content corresponding to the size from a media content server; the receiving module receives the storage address of the second media content sent by the media tool.
in some examples, the page also presents hint information and media tool controls for media tools to handle malicious media information; the acquisition module responds to the triggering operation of the media tool control and acquires the storage address of the second media content through the media tool; the display module displays the second media content on the display position in the page according to the storage address.
In some examples, the obtaining module includes: the sending unit is used for sending an acquisition request to the media content server, wherein the acquisition request carries the size of the display position; a receiving unit that receives a storage address of the second media content corresponding to the size sent by the media content server in response to the acquisition request.
The embodiment of the application also provides an information display method, which comprises the following steps: receiving a reading message sent by a client, wherein the reading message carries a storage directory of media information; reading the media information according to the storage directory, wherein the media information comprises an acquisition address of the first media content; and when the read media information is malicious media information, sending a reading result indicating that the malicious media information exists to the client.
in some examples, the method further comprises: creating an identification list corresponding to the acquisition address of the secure media information; determining an identifier corresponding to the acquisition address of the first media content; when the identification corresponding to the acquisition address of the first media content is not stored in the identification list, reading the display position of the first media content; and executing the step of sending a reading result indicating that the malicious media information exists to the client, wherein the reading result carries the acquisition address and the display bit of the malicious media information.
in some examples, the method further comprises: and sending the acquisition address of the malicious media information to an information collection server.
The example of this application has still provided a display device of information, the device includes: the receiving module is used for receiving a reading message sent by the client, wherein the reading message carries a storage directory of the media information; the reading module reads the media information according to the storage directory, wherein the media information comprises an acquisition address of the first media content; and the sending module is used for sending a reading result indicating that the malicious media information exists to the client when the read media information is the malicious media information.
in some examples, the device further comprises: the creating module is used for creating an identification list corresponding to the acquisition address of the secure media information; the determining module is used for determining the identification corresponding to the acquisition address of the first media content; the reading module reads the display position of the first media content when the identification corresponding to the acquisition address of the first media content is not stored in the identification list; the sending module executes the step of sending the read result indicating that the malicious media information exists to the client, wherein the read result carries the acquisition address and the display bit of the malicious media information.
in some examples, the sending module sends the obtained address of the malicious media information to the information collecting server.
The examples of this application also provide a computing device comprising a memory, a processor, and a computer program stored on the memory and run on the processor; the processor, when executing the computer program, implements the method described above.
The present examples also provide a storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform the above-described method.
by applying the technical scheme of the invention, the malicious media information is determined by reading the malicious information (namely the malicious media information) in the page, and the second media content (such as beautiful pictures) is displayed on the display position corresponding to the malicious media information in the page, so that the malicious media information can be prevented from being triggered by a user, bad user experience caused by triggering the malicious media information is reduced, and meanwhile, benefits caused by triggering the malicious media information are reduced, and the malicious media information is provided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of a system architecture to which an information presentation method according to an embodiment of the present application is applied;
FIG. 2 is a flow chart of a method of presenting information according to an embodiment of the present application;
FIG. 3 is an interaction flow diagram of a method for presenting information according to an embodiment of the present application;
FIG. 4 is an example of an interface in a client for presenting media information in one example of the present application;
FIG. 5 is a flow chart of a method of presenting information according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a display device for displaying information according to an example of the present application;
FIG. 7 is a schematic structural diagram of a device for displaying information according to an example of the present application;
Fig. 8 is a schematic diagram of the hardware of a computing device according to an example of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
for simplicity and clarity of description, the invention will be described below by describing several representative embodiments. The numerous details of the examples are merely provided to assist in understanding the inventive arrangements. It will be apparent, however, that the invention may be practiced without these specific details. Some embodiments are not described in detail, but rather are merely provided as frameworks, in order to avoid unnecessarily obscuring aspects of the invention. Hereinafter, "including" means "including but not limited to", "according to … …" means "at least according to … …, but not limited to … … only". When the number of one component is not particularly specified hereinafter, it means that the component may be one or more, or may be understood as at least one.
fig. 1 shows a schematic structural diagram of a system 100 to which the information presentation method of the present application is applied. The system 100 comprises at least a terminal device 101, a first server 102, a second server 103, a third server 104, a fourth server 105 and a network 106.
The terminal device 101 refers to a device having a data calculation processing function, and includes but is not limited to a smart phone (equipped with a communication module), a palm computer, a tablet computer, and the like. The terminal device 101 has an operating system installed thereon, including but not limited to: the Android operating system, the Symbian operating system, the Windows mobile operating system, and the apple iPhone OS operating system, among others.
the first server 102 may be a server providing entertainment information, such as a video server, a news server, a music server, and the like, and the first server 102 is installed with application server software providing media information, such as application server software providing video, application server software providing news, application server software providing music, and the like.
The second server 103 may be a server providing media information, such as an advertisement server, and the second server 103 is installed with application server software providing media information, such as application server software providing advertisement material.
The third server 104 may be a server providing security, such as a security server, and the third server 104 is installed with application server software providing security, such as application server software providing security protection.
The fourth server 105 may be a server providing media content, such as a picture CDN server, and the fourth server 105 is installed with application server software providing media content, such as application server software providing pictures.
the terminal device 101 is installed with a client (e.g., a video web client) that performs information interaction with the first server 102 via the network 106, for example, the first server 102 receives a video acquisition request sent by the client and sends a corresponding video stream in response to the video acquisition request, so that the client plays the video; the client performs information interaction with the second server 103 through the network 106, for example, the second server 103 receives an advertisement acquisition request sent by the client, and sends corresponding advertisement media information in response to the advertisement acquisition request, so that the client displays the advertisement on a video playing page; the client performs information interaction with the third server 104 through the network 106, for example, the third server 104 receives a read message sent by the client, reads the advertisement media information according to an address in the read message, detects whether malicious advertisement media information exists in the advertisement media information, that is, malicious media information, and sends a detection result to the client, so that the client deletes the corresponding malicious media information; when malicious media information exists, the client performs information interaction with the fourth server 105 through the network 106, for example, the fourth client 105 receives a picture address acquisition request sent by the client and sends a storage address of a corresponding picture in response to the picture address acquisition request, so that the client displays the picture on an advertisement position maliciously intercepted on a video page.
the network 106 may be a wired network or a wireless network.
The second server 103 and the third server 104 may be one server, and the second server 103, the third server 104, and the fourth server 105 may be one server.
Based on the system 100, the example of the present application provides an information display method, which can be applied to a client, such as an advertisement module or an advertisement SDK in a video web client. As explained in conjunction with fig. 2 and 3, the method 200 includes the steps of:
step 201: and responding to the display operation of the page, and sending an acquisition request to the server.
Wherein the server may be a content delivery server, i.e. a second server 103, such as an advertisement server.
for example, a user triggers and opens a video web page client through the terminal device 101, and clicks the video with the name XX for viewing, the video web page client receives a viewing instruction of the user, and opens a presentation page in response to the viewing instruction, step 301: sending a video acquisition request to a video server (i.e. the first server 102), where the video acquisition request may carry an identification, such as a name and an ID, of a video, and meanwhile, step 303: an advertisement SDK at a video webpage client sends an advertisement acquisition request, i.e., an advertisement order acquisition request, to an advertisement server (i.e., the second server 103), where the advertisement acquisition request may carry information for determining the display page, such as an identifier of the display page, e.g., an ID, or video information to be played by the display page, and the advertisement server receives the advertisement acquisition request, and determines, according to the information for determining the display page, advertisement acquisition addresses corresponding to all advertisement slots in the display page, e.g., an advertisement material acquisition address url (uniform Resource locator); in response to the advertisement acquisition request, the advertisement server, step 304: and sending the advertisement acquisition addresses corresponding to all the advertisement positions in the display page to the video webpage client. In response to the video acquisition request, the video server, step 302: and sending the corresponding video stream to the video webpage client so that the video webpage client plays the video stream after receiving the video stream.
It should be noted that, in response to the advertisement acquisition request, the advertisement server may also send a format file, such as a JSON format file, for reporting information such as data (e.g., advertisement data) to the web page client, such as a video web page client.
In the technical scheme, the network request or the network data hijacked by the malicious hijacking platform can be transmitted in an HTTP (HyperText Transfer protocol) form or an HTTPS form.
in addition, when the content displayed on the webpage is delivered, for example, when the webpage advertisement is delivered, the delivered content (e.g., advertisement material) is uploaded to a content platform, for example, an advertisement platform, the content platform stores the delivered content, for example, in File-a, and generates a storage address URL-a, i.e., an acquisition address, and the advertisement platform can store the acquisition address in an advertisement server, so that the advertisement server sends the acquisition address to the webpage client.
The advertisement can be a banner advertisement, which is also called a banner advertisement, and is the earliest network advertisement form and the most common network advertisement form at present. It is a rectangular billboard that spans the web page and, when the user clicks on these banner advertisements, can typically link to the web page for that advertisement.
Banner advertisements are typically 7 inches long by 1 inch wide, or around 468 x 60 pixels. Its size may vary within certain limits. According to the specifications of the Interactive Advertising Bureau (Interactive Advertising Bureau), 468 × 60 pixels are called Full Banner advertisements (Full Banner), 234 × 60 pixels are called Half Banner advertisements (Half Banner), and 120 × 240 pixels are called Vertical Banner advertisements (Vertical Banner).
In terms of presentation, banner advertisements can be divided into three types: static banners, animated banners, interactive banners.
step 202: and receiving media information sent by the server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of the first media content.
Wherein, the first media content may be, but is not limited to: advertising material or advertising content.
The display position information represents a display position of the first media content in the webpage.
The server may be a content delivery server, i.e. a second server 103, such as an advertisement server.
for example, according to the foregoing, the advertisement SDK of the video web page client receives the advertisement obtaining address, such as the obtaining address "URL-a", of the advertisement media information corresponding to all advertisement slots in the display page sent by the advertisement server, and the corresponding display slot information "upper portion of the web page".
step 203: and sending a reading message to the server, wherein the reading message carries the storage directory of the media information, so that the server reads the media information according to the storage directory.
Wherein the server is a secure server, i.e. the third server 104.
For example, according to the foregoing, after the advertisement SDK of the video web page client receives the video stream sent by the video server and also receives the advertisement acquisition address and the corresponding advertisement display position sent by the advertisement server, the display page is to be displayed to the user according to the layout file of the current display page, in this case, step 305: sending a reading message to the security server by the advertisement SDK of the video webpage client, wherein the reading message carries a storage directory, and after receiving the reading message, the security server performs step 306: reading the storage file in the storage address, and scanning the advertisement acquisition address in the storage file, step 307: determining whether the advertisement acquisition address has a malicious advertisement acquisition address, step 308: and sending the scanning result, namely the reading result to an advertisement SDK of the video webpage client.
it should be understood that, when the storage directory stores the set of the acquisition addresses, the security server only scans the set of the acquisition addresses, which saves time and can quickly determine whether the acquisition addresses have malicious advertisement acquisition addresses; when the storage directory stores the layout file, the acquisition address is added to the layout file, and the security server scans the layout file, the layout file includes the acquisition address and other data, such as video stream display information and other data, so that the security server needs to determine which data in the layout file are advertisement acquisition addresses during scanning, and then determines whether malicious advertisement acquisition addresses exist in the advertisement acquisition addresses.
It should be noted that, when the advertisement server responds to the advertisement acquisition request, an advertisement acquisition address and a corresponding advertisement display position are sent to the advertisement SDK of the video webpage client, and when the advertisement acquisition address and the corresponding advertisement display position are subjected to network transmission, the malicious hijacking platform hijacks the advertisement acquisition address and the network data of the corresponding advertisement display position, replaces at least part of the advertisement acquisition address, and finally sends the replaced malicious advertisement acquisition address to the video webpage client;
among them, the situation of HTTP hijacking (non-dns (domain Name system)) advertisement push is very common, and most of the solutions can only be the value-added service department complained by the user, and further the ministry of industry and correspondence. However, this method is time-consuming and labor-consuming, and because the relevant answering personnel receiving the complaint do not know the specific malicious advertisement hijacking condition, many conditions are asked, and the problem of the complaint of the user cannot be really solved, even after the problem is solved, a period of time passes, the problem of the complaint recurs, even if the user complains, the HTTP hijacking of the operator is not converged, but the cost is increased, and a new pattern is played: such as activities intercepted by a user password via HTTP hijacking, situations where software downloaded by a user is replaced, and situations where a rebate is given to an operator after hijacking is achieved.
step 204: and receiving the reading result sent by the server.
Wherein the server is a secure server, i.e. the third server 104.
For example, according to the foregoing description, when the advertisement SDK of the video webpage client receives the reading result sent by the security server, the reading result may be represented as that there is no malicious advertisement obtaining address or that there is a malicious advertisement obtaining address.
Step 205: and when the reading result shows that the malicious media information exists, displaying the second media content on the display position corresponding to the malicious media information in the page.
in some examples, the method 200 further comprises: and storing the media information in a local storage directory.
the local storage directory may be, but is not limited to: the address of a storage file in the local of the webpage client is used for storing the acquired media information, such as an advertisement acquisition address and an advertisement position corresponding to the advertisement; the address of the storage file of the local webpage client where the layout file of the display page is located may also be the address of the storage file, where each of the received acquisition addresses has been added to the layout file of the display page.
For example, according to the foregoing, after receiving the advertisement acquisition address and the display position corresponding to the advertisement, the advertisement SDK of the video web client stores the advertisement acquisition address and the display position corresponding to the advertisement in the storage file of the video web client. Wherein, the second media content may be, but is not limited to: the format of the picture is not particularly limited.
in some examples, the method 200 further comprises: obtaining the obtaining address and the display bit information of the malicious media information from the reading result; determining a display bit according to the display bit information in the malicious media information; deleting the acquisition address under the storage directory; acquiring a storage address of the second media content; wherein, the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the second media content on the display position in the page according to the storage address.
For example, according to the foregoing, when the read result received by the advertisement SDK of the video web page client indicates that there is a malicious advertisement obtaining address, the read result also carries the malicious advertisement obtaining address, such as www.xxx.ad.com, and the advertisement slot information corresponding thereto, such as "upper part of web page", the advertisement SDK of the video web page client determines that the display slot is on the upper part of the web page according to the advertisement slot information, step 310: the malicious advertisement acquisition address under the local storage directory of the video webpage client is deleted, the size of the display position is determined according to the display position, a picture which is consistent with the size of the display position or a picture which is larger than the size and is in a certain threshold range can be searched from the local storage file of the video webpage client, the storage address of the picture is added to the corresponding position in the layout file to replace the malicious advertisement, and therefore the video webpage client displays the picture instead of displaying the malicious advertisement when displaying the display page.
It should be noted that, when the storage directory is the storage address of the layout file, the obtaining address for deleting the storage directory is the obtaining address for deleting the corresponding malicious advertisement in the layout file; when the storage directory is a storage address of an advertisement acquisition address set acquired from an advertisement server, and the acquisition address for deleting the storage directory is an acquisition address for deleting a malicious advertisement in the set, at this time, it should be understood that all advertisement acquisition addresses in the set have a mapping relationship with a data position to which an advertisement acquisition address should be added in the layout file, that is, when the layout file is displayed, the data position reads the advertisement acquisition address in the set through the mapping relationship.
The obtaining of the storage address of the second media content may include: and responding to the triggering operation of the media tool control, and acquiring the storage address of the second media content through the media tool.
For example, according to the foregoing, when a media tool, that is, a picture plug-in, is installed in a video webpage client, the video webpage client displays a control, such as an icon, of the media tool to a user during initialization, and when the user clicks the control, the picture plug-in sends an acquisition request to a media content server, that is, the fourth server 105, in response to a trigger operation of the icon, where the acquisition request carries a size of the display position; and receiving a storage address of the second media content matched with the size, namely a storage address of a picture, sent by the media content server in response to the acquisition request.
Before the picture plug-in sends the acquisition request, step 316: sending a message indicating the size of the acquired display position to an advertisement SDK of the video webpage client, and sending the determined size to the picture plug-in unit by the advertisement SDK of the video webpage client; after receiving the storage address of the picture, the storage address may be added to the corresponding position in the layout file.
The obtaining of the storage address of the second media content may further include: sending an acquisition request to a media content server, wherein the acquisition request carries the size of the display position; and receiving the storage address of the second media content corresponding to the size sent by the media content server in response to the acquisition request.
For example, according to the foregoing, when the video web page client has the above-mentioned picture plug-in function, the video web page client may also directly send an acquisition request to the media content server, that is, the fourth server 105, where the acquisition request carries the size of the display position; and receiving the second media content, namely the picture, sent by the media content server in response to the acquisition request, and after receiving the storage address of the picture, adding the storage address to the corresponding position in the layout file.
In some examples, the method 200 further comprises: and when the reading result shows that the malicious media information exists, displaying prompt information of malicious hijacking in the page.
For example, according to the foregoing, when the read result received by the advertisement SDK of the video web page client indicates that a malicious advertisement acquisition address exists, that is, a malicious advertisement exists, the video web page client displays the display page according to the layout file, where the display page displays the played video, in addition to the played video, in step 309: the information for prompting the malicious hijacking of the user is also displayed, for example, if the advertisement in the current page is replaced maliciously, the user is not required to click to prevent the privacy information from being stolen, so that the malicious advertisement displayed in the displayed page is guided not to be triggered by the user, the stealing of the privacy information and even the stealing of property safety caused by triggering the malicious advertisement by the user is reduced, and meanwhile, the use experience of the user is improved.
it should be noted that, in the above example, when it is determined that malicious media information exists, the second media content may be directly displayed by deleting and replacing the malicious media information in the page, the prompt information indicating the occurrence of malicious hijacking may also be directly displayed, and both the second media content and the prompt information indicating the occurrence of malicious hijacking may also be displayed;
The content delivery server and the security server may be one server or two servers.
in some examples, the page also presents hint information and media tool controls for media tools to handle malicious media information; the method 200 further comprises: and responding to the triggering operation of the media tool control, and acquiring the storage address of the second media content through the media tool. Wherein, the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the storage address of the second media content on the display position in the page according to the storage address.
for example, as described above, the presentation page may also present a control (e.g., icon) of a media tool (e.g., photo plug-in), and a hint message "trial photo plug-in handles malicious advertisements" that the media tool uses to handle malicious media information, when the user clicks on the control, step 315: the picture plug-in receives the trigger operation, responds to the trigger operation of the icon, and sends an acquisition request to a media content server, namely a fourth server 105, wherein the acquisition request carries the size of the display position; step 317: receiving a storage address, namely a storage address of a picture, which is sent by the media content server in response to the acquisition request and matches the size of the second media content; and adding the storage address of the picture into the corresponding position in the layout file to replace the malicious advertisement, so that the video webpage client displays the picture instead of the malicious advertisement when displaying the display page.
In some examples, the method 200 further comprises: when the reading result shows that malicious media information exists, displaying an installation control of a media tool and prompt information of the media tool for processing the malicious media information in the page; responding to the triggering operation of the installation control, and downloading and installing the media tool; and after the media tool is installed, displaying a media tool control in the page.
Wherein, the obtaining the second media content through the media tool in response to the triggering operation of the media tool control comprises: responding to the triggering operation of the media tool control, and acquiring the size of the display position so that the media tool acquires a storage address of second media content corresponding to the size from a media content server; wherein the method 200 further comprises: and receiving the storage address of the second media content sent by the media tool.
Wherein the installation control may be, but is not limited to, installing a pop-up window.
For example, according to the foregoing, when the read result received by the advertisement SDK of the video web page client indicates that there is a malicious advertisement acquisition address, when the user uses the video web page client for the first time, that is, when the user accesses the video web page client for the first time, or when the picture plug-in is not installed on the current video web page client, the video web page client, based on the read result, except for displaying information that there is malicious hijacking, step 311: still show the installation popup of this picture plug-in to and this picture plug-in is used for handling the tip information of this malicious advertisement, if "please install this picture plug-in, handle malicious advertisement", the user clicks this installation popup after seeing this tip information, step 312: the video web page client receives the trigger operation, and in response to the trigger operation of installing the popup window, the video web page client may acquire the installation package of the picture plug-in from the installation package providing server, that is, step 313: downloading the installation package, and after acquiring the installation package, step 313: the installation package is operated to install the picture plug-in, and after the picture plug-in is installed, step 314: displaying the icon of the picture plug-in a display page, prompting a user that the picture plug-in can process malicious advertisements, responding to the triggering operation of the icon when the user clicks the icon of the picture plug-in, acquiring the size from an advertisement SDK, and sending an acquisition request to a media content server, namely a fourth server 105, wherein the acquisition request carries the size of the display position; step 318: and receiving the storage address of the second media content (i.e. the storage address of the picture) corresponding to the size and sent by the media content server in response to the acquisition request. Step 319: the advertisement SDK receives the storage address of the picture sent by the picture plugin, so as to replace the picture with a malicious advertisement, step 320: and displaying the picture. Fig. 4 shows an example 400 of displaying an advertisement in a video web client, where when an advertisement of a display page of the video web client is not maliciously intercepted by an interface 401, a normal advertisement 404 and an interface 401 of a video are displayed on an advertisement space, where when an advertisement of a display page of the video web client is maliciously intercepted by an interface 402, a malicious advertisement 405 and an interface 402 of a video are displayed on an advertisement space, where when an advertisement of a display page of the video web client is maliciously intercepted by an interface 403, a beautification picture 406 is acquired through a picture plug-in, a malicious advertisement acquisition address is deleted, and a beautification picture 406 and an interface 406 of a video are displayed on an advertisement space.
In some examples, the method 200 further comprises: and when the reading result shows that the malicious media information does not exist, displaying the media content at the corresponding display position in the page.
For example, according to the foregoing, when the read result received by the advertisement SDK of the video web page client is that there is no malicious advertisement acquisition address, that is, there is no malicious advertisement, the video web page client directly displays the display page according to the layout file.
It should be understood that, in this example, when the video web page client displays the display page according to the layout file, it needs to determine whether the display can be currently performed, or whether a malicious advertisement exists in the current layout file, and this determination may send a notification message through the advertisement SDK to notify the video web page client whether the malicious advertisement exists in the current layout file, or whether the picture replacement has been completed in the current layout file.
In some examples, the method 200 further comprises: if the media information sent by the server in response to the acquisition request is not received, executing the step of sending the acquisition request to the server; and when receiving the media information sent by the server in response to the acquisition request, executing the step of sending a read message to the server.
specifically, the method 200 may further include: if the media information sent by the content delivery server in response to the acquisition request is not received, executing a step of sending the acquisition request to the content delivery server; and when receiving the media information sent by the content delivery server in response to the acquisition request, executing a step of sending a read message to the security server.
For example, according to the foregoing, after the advertisement SDK of the video web page client sends the acquisition request to the second server 103, if the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request are not received for the first time, the advertisement SDK repeatedly sends the acquisition request to the second server 103, and if the advertisement SDK receives the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request for the second time, the step of sending the read message to the third server 104 is executed.
In some examples, the method 200 further comprises: and if the first media information sent by the content delivery server in response to the acquisition request is not received, executing the step of displaying the second media content on the display position corresponding to the malicious media information in the page.
For example, as described above, after the advertisement SDK of the video web page client sends the second acquisition request to the second server 103, or does not receive the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request, it is determined that the response information of the second server 103 has been maliciously intercepted, the advertisement SDK sends a message to notify the video web page client, the video web page client directly displays the display page according to the layout file, at this time, the display page cannot display the advertisement because the acquisition address of the display advertisement is not received, the advertisement slot of the display page is blank, that is, there is no display information, the advertisement SDK may determine each display slot through the layout file, and determine the size of the display slot according to the display slot, and may search for a picture corresponding to the size of the display slot from the local storage file of the video web page client, or the picture with the size larger than the size and the part larger than the size is in a certain threshold range, and the storage address of the picture is added to the corresponding position in the layout file, so that the picture is displayed together when the display page is displayed, and the blank of the display position in the display page is filled. Or, sending an acquisition request to a media content server, that is, the fourth server 105, where the acquisition request carries the size of the display position; and receiving a storage address of the second media content matched with the size, namely a storage address of a picture, sent by the media content server in response to the acquisition request. And adding the storage address of the picture into the corresponding position in the layout file, so that the picture is displayed together when the display page is displayed, and the blank of the display position in the display page is filled.
It should be noted that, in this example, although the client does not receive the advertisement obtaining address and the corresponding advertisement slot information sent by the second server 103 in response to the obtaining request for the second time, it is considered that the response information is maliciously intercepted; the client may also regard that the client does not receive the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request at least twice in a very short time as the response information is maliciously intercepted; the very short time may be in the order of milliseconds, such as within 30 milliseconds.
In addition, if the first media information sent by the content delivery server in response to the acquisition request is not received, the step of displaying the prompt information that the malicious hijacking occurs in the page can also be executed; for example, the prompt information indicating that malicious hijacking exists is displayed in the display page, such as "the advertisement in the current page is maliciously hijacked and cannot be normally displayed".
In some examples, the method 200 further comprises: if the media information sent by the server in response to the acquisition request is not received, recording an event indicating that the media information sent by the server in response to the acquisition request is not received; and sending the event to the server.
Wherein the server may be a content delivery server.
For example, according to the foregoing, after the advertisement SDK of the video webpage client sends the acquisition request to the second server 103, if the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request are not received for the first time, and when the advertisement acquisition address and the corresponding advertisement slot information sent by the second server 103 in response to the acquisition request are received for the second time, the event is recorded, where the event may be represented as that the advertisement acquisition address and the corresponding advertisement slot information of the second server 103 in response to the acquisition request are not received, and the event is reported in the JSON format, that is, sent to the second server 103, so that relevant people can debug the fault of the second server 103 for the event.
It should be noted that the picture designed in the above example may be an artwork picture, so as to beautify the blank in the display page and ensure the integrity and the aesthetic property of the webpage display.
When a browser client of a user is connected with an accessed website server, namely the browser client sends an HTTP request, a router of an operator receives the HTTP request firstly, then bypass equipment of the router of the operator marks that the TCP connection is an HTTP protocol, then 302 codes of the HTTP protocol can be sent before the website server returns data for hijacking of downloaded software, the browser client jumps to an error software download address to download the software after receiving the 302 codes, and then real data of the website server is discarded after reaching the router of the operator. Or, after marking the TCP connection as the HTTP protocol, the bypass device directly returns the modified HTML code, so that the advertisement of the operator is inserted into the browser client, and then the real data of the website server finally gets discarded after reaching the router of the operator.
It can be seen that if HTTP hijacking is required, the access request first needs to be marked: if the access request is the HTTP protocol, hijacking is performed, otherwise, hijacking is not performed. While hijacking is now more difficult with websites heavily using the HTTPS protocol, once the HTTPS request is hijacked, the website becomes very influential to the user experience. Meanwhile, the advertisement put on the website by the advertiser becomes to provide traffic for hijackers to obtain benefits illegally, and the advertiser loses the advertisement putting effect. In this example, although the data returned by the website server is intercepted and the advertisement acquisition address in the data is replaced, bad experience is brought to the user, when the website advertisement cannot be hijacked in various defense measures, the hijacked advertisement is subjected to a remedial measure again, and the user can rapidly replace the hijacked advertisement with an artwork picture through a replacement tool provided by the website, so that the significance of the hijacked advertisement is lost, and the website is beautified. Finally, when the hijacking effect cannot be achieved, the hijacking cost is paid by the hijacking person, the result cannot be obtained, the value significance of the hijacking is lost, meanwhile, the artwork can make the world more beautiful, and the function of seeing and discovering the current emerging artist works while browsing the favorite website of the user is provided for the user who likes the aesthetics.
The content delivery server, the security server, and the media content server may be one server or three different servers.
Based on the above example, the example of the present application further provides an information displaying method, which is applied to a server (e.g., the third server 104); as shown in fig. 5, the method 500 includes the steps of:
Step 501: and receiving a reading message sent by the client, wherein the reading message carries the storage directory of the media information.
For example, according to the foregoing, the security server receives a read message sent by the video web page client, where the read message carries a storage address of the advertisement acquisition address.
Step 502: and reading the media information according to the storage directory, wherein the media information comprises an acquisition address of the first media content.
For example, according to the foregoing, the secure server reads the advertisement retrieval address in the storage address according to the storage address.
step 503: and when the read media information is malicious media information, sending a reading result indicating that the malicious media information exists to the client.
In some examples, the method 500 further comprises: creating an identification list corresponding to the acquisition address of the secure media information; determining an identifier corresponding to the acquisition address of the first media content; when the identification corresponding to the acquisition address of the first media content is not stored in the identification list, reading the display position of the first media content; and executing the step of sending a reading result indicating that the malicious media information exists to the client, wherein the reading result carries the acquisition address and the display bit of the malicious media information.
Wherein, the identification can be but is not limited to: a domain name.
for example, according to the foregoing, the security server creates a domain name white list, where a secure advertisement domain name is stored in the domain name white list, that is, a domain name in the advertisement acquisition address is in the domain name white list, and the advertisement acquisition address is a secure advertisement acquisition address and is a non-malicious advertisement; when the advertisement acquisition address read by the security server is a domain name corresponding to the read advertisement acquisition address, determining whether the domain name is in a domain name white list or not through analysis, when the domain name exists in the domain name white list, the advertisement acquisition address corresponding to the domain name is a normal advertisement acquisition address, and when the advertisement acquisition addresses read are all normal advertisement acquisition addresses, the security server sends a reading result without malicious advertisements to the advertisement SDK. When the domain name does not exist in the domain name white list, the advertisement acquisition address corresponding to the domain name is a malicious advertisement acquisition address, namely the advertisement is a malicious advertisement, the display position information corresponding to the malicious advertisement is determined according to the advertisement acquisition address, and the security server sends a reading result with the malicious advertisement to the advertisement SDK, wherein the reading result carries the acquisition address and the display position information of the malicious advertisement.
in some examples, the method 500 further comprises: and sending the acquisition address of the malicious media information to an information collection server.
For example, according to the foregoing, the security server collects the determined malicious advertisement acquisition address, and reports the malicious advertisement acquisition address to the malicious advertisement collection server, that is, the information collection server, so as to facilitate communication with an operator by legal means in the future.
Based on the above example, the present application further provides an information display apparatus, which is applied to a client, for example, an advertisement SDK in a web video client; as shown in fig. 6, the apparatus 600 includes: the sending module 601, the receiving module 602, and the display module 603: and the functions of the modules are as follows:
The sending module 601 sends the obtaining request to a server (e.g., a content delivery server) in response to the exposing operation on the page.
A receiving module 602, configured to receive media information sent by the server (e.g., a content delivery server) in response to the obtaining request, where the media information includes a obtaining address and showing position information of the first media content.
The sending module 601 sends a read message to a server (e.g., a security server), where the read message carries a storage directory of the media information, so that the server (e.g., the security server) reads the media information according to the storage directory.
The receiving module 602 receives the reading result sent by the server (e.g., a security server).
And the displaying module 603 is configured to, when the read result indicates that the malicious media information exists, display the second media content on a display position corresponding to the malicious media information in the page.
In some examples, the presentation module 603 presents, when the read result indicates that malicious media information exists, prompt information indicating that malicious hijacking occurs in the page.
in some examples, the device 600 further comprises: the storage module is used for storing the media information in a local storage directory; the acquisition module acquires an acquisition address and display bit information of the malicious media information from the reading result; the determining module is used for determining a display bit according to the display bit information in the malicious media information; the deleting module deletes the acquired address in the storage directory; the acquisition module acquires a storage address of the second media content; the presentation module 604 presents the second media content on the presentation position in the page according to the storage address.
in some examples, the obtaining module obtains, by the media tool, a storage address of the second media content in response to a triggering operation of the media tool control.
In some examples, if the media information sent by a server (e.g., a content delivery server) in response to the acquisition request is not received, the acquisition module executes a step of sending the acquisition request to the server; when media information sent by a server (e.g., a content delivery server) in response to the acquisition request is received, the sending module 601 performs a step of sending a read message to the server (e.g., a security server).
In some examples, if the first media information sent by a server (e.g., a content delivery server) in response to the obtaining request is not received, the presenting module 604 performs the step of presenting the second media content on the presentation position corresponding to the malicious media information in the page.
Or the display module 604 executes the step of displaying the prompt information of the malicious hijacking in the page, and the determination module determines the display position; and the presentation module 604 presenting the second media content at the presentation location.
In some examples, the device 600 further comprises: a recording module, configured to record, if media information sent by a server (e.g., a content delivery server) in response to the acquisition request is not received, an event indicating that the media information sent by the server (e.g., the content delivery server) in response to the acquisition request is not received; and the sending module 601, sending the event to a server (e.g., a content delivery server).
In some examples, when the read result indicates that malicious media information does not exist, the presentation module 604 presents the media content at a corresponding presentation position in the page.
in some examples, the presenting module 604 presents, when the read result indicates that malicious media information exists, an installation control of the media tool and prompt information of the media tool for processing the malicious media information in the page; the apparatus 600 further comprises: the response module is used for downloading and installing the media tool in response to the triggering operation of the installation control; the display module 604 displays the media tool control in the page after the media tool is installed; the obtaining module is used for responding to the triggering operation of the media tool control to obtain the size of the display position so that the media tool can obtain a storage address of second media content corresponding to the size from a media content server; the receiving module 602 receives a storage address of the second media content sent by the media tool.
In some examples, the page also presents hint information and media tool controls for media tools to handle malicious media information; and the acquisition module responds to the triggering operation of the media tool control and acquires the storage address of the second media content through the media tool.
In some examples, the obtaining module includes: the sending unit is used for sending an acquisition request to the media content server, wherein the acquisition request carries the size of the display position; a receiving unit that receives a storage address of the second media content corresponding to the size sent by the media content server in response to the acquisition request.
Based on the above example, the present application further provides an information display apparatus, which is applied to a server (e.g., the third server 104); as shown in fig. 7, the apparatus 700 includes: a receiving module 701, a reading module 702 and a sending module 703; and the functions of the modules are as follows:
The receiving module 701 receives a read message sent by a client, where the read message carries a storage directory of media information.
The reading module 702 reads the media information according to the storage directory, where the media information includes an acquisition address of the first media content.
The sending module 703 is configured to send, to the client, a read result indicating that malicious media information exists, when the read media information is malicious media information.
In some examples, the device 700 further comprises: the creating module is used for creating an identification list corresponding to the acquisition address of the secure media information; the determining module is used for determining the identification corresponding to the acquisition address of the first media content; the reading module 702 reads the display bit of the first media content when the identifier corresponding to the acquisition address of the first media content is not stored in the identifier list; the sending module 703 executes the step of sending the read result indicating that malicious media information exists to the client, where the read result carries the acquisition address and the display bit of the malicious media information.
in some examples, the sending module 703 sends the obtained address of the malicious media information to the information collecting server.
FIG. 8 illustrates a block diagram of the components of a computing device 800 in which presentation apparatus 600 and/or presentation apparatus 700 are located. This computing device 800 may be a server. As shown in fig. 8, the computing device includes one or more processors (CPUs) 802, a communication module 804, a memory 806, a user interface 810, and a communication bus 808 for interconnecting these components.
The processor 802 may receive and transmit data via the communication module 804 to enable network communications and/or local communications.
User interface 810 includes one or more output devices 812 including one or more speakers and/or one or more visual displays. The user interface 810 also includes one or more input devices 814, including, for example, a keyboard, a mouse, a voice command input unit or microphone, a touch screen display, a touch sensitive tablet, a gesture capture camera or other input buttons or controls, and the like.
the memory 806 may be high-speed random access memory, such as DRAM, SRAM, DDR RAM, or other random access solid state memory devices; or non-volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid-state storage devices.
The memory 806 stores a set of instructions executable by the processor 802, including:
An operating system 816, including programs for handling various basic system services and for performing hardware-related tasks;
The applications 818 include various applications for video playing, and such applications can implement the processing flow in the above examples, for example, the applications can include part or all of the modules in the presentation apparatus 600 shown in fig. 6, at least one of the modules 601 and 603 can store machine executable instructions, and the processor 802 can implement the functions of at least one of the modules 601 and 603 by executing the machine executable instructions in at least one of the modules 601 and 603 in the memory 806.
For example, the display device may include part or all of the modules in the display device 700 shown in fig. 7, at least one of the modules 701 and 703 may store machine executable instructions, and the processor 802 may implement the functions of at least one of the modules 701 and 703 by executing the machine executable instructions in at least one of the modules 701 and 703 in the memory 806.
It should be noted that not all steps and modules in the above flows and structures are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The division of each module is only for convenience of describing adopted functional division, and in actual implementation, one module may be divided into multiple modules, and the functions of multiple modules may also be implemented by the same module, and these modules may be located in the same device or in different devices.
The hardware modules in the embodiments may be implemented in hardware or a hardware platform plus software. The software includes machine-readable instructions stored on a non-volatile storage medium. Thus, embodiments may also be embodied as software products.
In various examples, the hardware may be implemented by specialized hardware or hardware executing machine-readable instructions. For example, the hardware may be specially designed permanent circuits or logic devices (e.g., special purpose processors, such as FPGAs or ASICs) for performing the specified operations. Hardware may also include programmable logic devices or circuits temporarily configured by software (e.g., including a general purpose processor or other programmable processor) to perform certain operations.
In addition, each example of the present application can be realized by a data processing program executed by a data processing apparatus such as a computer. It is clear that a data processing program constitutes the present application. Further, the data processing program, which is generally stored in one storage medium, is executed by directly reading the program out of the storage medium or by installing or copying the program into a storage device (such as a hard disk and/or a memory) of the data processing device. Such a storage medium therefore also constitutes the present application, which also provides a non-volatile storage medium in which a data processing program is stored, which data processing program can be used to carry out any one of the above-mentioned method examples of the present application.
Machine-readable instructions corresponding to the modules in fig. 6 and/or 7 may cause an operating system or the like operating on the computer to perform some or all of the operations described herein. The nonvolatile computer-readable storage medium may be a memory provided in an expansion board inserted into the computer or written to a memory provided in an expansion unit connected to the computer. A CPU or the like mounted on the expansion board or the expansion unit may perform part or all of the actual operations according to the instructions.
In addition, the devices and modules in the examples of the present application may be integrated into one processing unit, or each module may exist alone physically, or two or more devices or modules may be integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (15)
1. A method for displaying information, the method comprising:
Responding to the display operation of the page, and sending an acquisition request to a server;
Receiving media information sent by a server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of first media content;
Sending a reading message to a server, wherein the reading message carries a storage directory of the media information, so that the server reads the media information according to the storage directory;
receiving a reading result sent by a server; and
And when the reading result shows that the malicious media information exists, displaying the second media content on the display position corresponding to the malicious media information in the page.
2. The method of claim 1, further comprising: and when the reading result shows that the malicious media information exists, displaying prompt information of malicious hijacking in the page.
3. the method of claim 1, further comprising:
storing the media information in a local storage directory;
Obtaining the obtaining address and the display bit information of the malicious media information from the reading result;
Determining a display bit according to the display bit information in the malicious media information;
Deleting the acquisition address under the storage directory; and
Acquiring a storage address of the second media content;
Wherein the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the second media content on the display position in the page according to the storage address.
4. The method of claim 3, wherein obtaining the storage address of the second media content comprises:
and responding to the triggering operation of the media tool control, and acquiring the storage address of the second media content through the media tool.
5. The method of claim 1, further comprising:
if the media information sent by the server in response to the acquisition request is not received, executing a step of sending the acquisition request to the server;
And when receiving the media information sent by the server in response to the acquisition request, executing a step of sending a read message to the server.
6. The method of claim 5, further comprising:
And if the first media information sent by the server in response to the acquisition request is not received, executing the step of displaying the second media content on the display position corresponding to the malicious media information in the page.
7. The method of claim 1, further comprising:
and when the reading result shows that the malicious media information does not exist, displaying the media content at the corresponding display position in the page.
8. The method of claim 4, further comprising:
When the reading result shows that malicious media information exists, displaying an installation control of a media tool and prompt information of the media tool for processing the malicious media information in the page;
Responding to the triggering operation of the installation control, and downloading and installing the media tool; and
After the media tool is installed, displaying a media tool control in the page;
Wherein, the obtaining the storage address of the second media content through the media tool in response to the triggering operation of the media tool control comprises:
Responding to the triggering operation of the media tool control, and acquiring the size of the display position so that the media tool acquires a storage address of second media content corresponding to the size from a media content server;
Wherein the method further comprises:
And receiving the storage address of the second media content sent by the media tool.
9. the method of claim 1, wherein the page further presents hints information for media tools to handle malicious media information and media tool controls;
wherein the method further comprises: responding to the triggering operation of the media tool control, and acquiring a storage address of the second media content through the media tool;
Wherein the displaying the second media content on the display position corresponding to the malicious media information in the page includes: and displaying the second media content on the display position in the page according to the storage address.
10. the method of claim 3, wherein obtaining the storage address of the second media content comprises:
sending an acquisition request to a media content server, wherein the acquisition request carries the size of the display position;
And receiving the storage address of the second media content corresponding to the size, which is sent by the media content server in response to the acquisition request.
11. A method for displaying information, the method comprising:
receiving a reading message sent by a client, wherein the reading message carries a storage directory of media information;
Reading the media information according to the storage directory, wherein the media information comprises an acquisition address of the first media content;
and when the read media information is malicious media information, sending a reading result indicating that the malicious media information exists to the client.
12. The method of claim 11, further comprising:
Creating an identification list corresponding to the acquisition address of the secure media information;
Determining an identifier corresponding to the acquisition address of the first media content;
When the identification corresponding to the acquisition address of the first media content is not stored in the identification list, reading the display position of the first media content;
And executing the step of sending a reading result indicating that the malicious media information exists to the client, wherein the reading result carries the acquisition address and the display bit of the malicious media information.
13. An apparatus for displaying information, the apparatus comprising:
The sending module is used for responding to the display operation of the page and sending an acquisition request to the server;
the receiving module is used for receiving media information sent by the server in response to the acquisition request, wherein the media information comprises an acquisition address and display bit information of the first media content;
The sending module is used for sending a reading message to the server, wherein the reading message carries the storage directory of the media information, so that the server reads the media information according to the storage directory;
the receiving module is used for receiving a reading result sent by the server; and
And the display module displays second media content on a display position corresponding to the malicious media information in the page when the read result shows that the malicious media information exists.
14. An apparatus for displaying information, the apparatus comprising:
The receiving module is used for receiving a reading message sent by the client, wherein the reading message carries a storage directory of the media information;
The reading module reads the media information according to the storage directory, wherein the media information comprises an acquisition address of the first media content;
And the sending module is used for sending a reading result indicating that the malicious media information exists to the client when the read media information is the malicious media information.
15. a storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform the method of any of claims 1-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810487648.4A CN110580318B (en) | 2018-05-21 | 2018-05-21 | Information display method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810487648.4A CN110580318B (en) | 2018-05-21 | 2018-05-21 | Information display method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110580318A true CN110580318A (en) | 2019-12-17 |
CN110580318B CN110580318B (en) | 2023-09-29 |
Family
ID=68808729
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810487648.4A Active CN110580318B (en) | 2018-05-21 | 2018-05-21 | Information display method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110580318B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111405300A (en) * | 2020-02-28 | 2020-07-10 | 北京达佳互联信息技术有限公司 | Pendant display method and device, electronic equipment and computer readable storage medium |
CN111694629A (en) * | 2020-05-28 | 2020-09-22 | 北京字节跳动网络技术有限公司 | Information display method and device and electronic equipment |
CN112817850A (en) * | 2021-01-28 | 2021-05-18 | 北京达佳互联信息技术有限公司 | Information processing method, device, system, electronic equipment and storage medium |
CN112988263A (en) * | 2021-02-10 | 2021-06-18 | 青岛希望鸟科技有限公司 | Method and system for synchronizing web pages |
CN114281434A (en) * | 2021-12-15 | 2022-04-05 | 创优数字科技(广东)有限公司 | Applet user information management method, device, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767735A (en) * | 2011-04-29 | 2015-07-08 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN105376290A (en) * | 2014-09-02 | 2016-03-02 | 腾讯科技(北京)有限公司 | Network medium information displaying and issuing control method, apparatus and system |
CN106303654A (en) * | 2016-08-16 | 2017-01-04 | 腾讯科技(北京)有限公司 | The methods of exhibiting of a kind of media information, client, plug-in unit and system |
CN107508903A (en) * | 2017-09-07 | 2017-12-22 | 维沃移动通信有限公司 | The access method and terminal device of a kind of web page contents |
CN107634976A (en) * | 2016-07-18 | 2018-01-26 | 阿里巴巴集团控股有限公司 | Information push, acquisition, advertisement pushing, acquisition methods and device |
US20180041530A1 (en) * | 2015-04-30 | 2018-02-08 | Iyuntian Co., Ltd. | Method and system for detecting malicious web addresses |
-
2018
- 2018-05-21 CN CN201810487648.4A patent/CN110580318B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767735A (en) * | 2011-04-29 | 2015-07-08 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN105376290A (en) * | 2014-09-02 | 2016-03-02 | 腾讯科技(北京)有限公司 | Network medium information displaying and issuing control method, apparatus and system |
US20180041530A1 (en) * | 2015-04-30 | 2018-02-08 | Iyuntian Co., Ltd. | Method and system for detecting malicious web addresses |
CN107634976A (en) * | 2016-07-18 | 2018-01-26 | 阿里巴巴集团控股有限公司 | Information push, acquisition, advertisement pushing, acquisition methods and device |
CN106303654A (en) * | 2016-08-16 | 2017-01-04 | 腾讯科技(北京)有限公司 | The methods of exhibiting of a kind of media information, client, plug-in unit and system |
CN107508903A (en) * | 2017-09-07 | 2017-12-22 | 维沃移动通信有限公司 | The access method and terminal device of a kind of web page contents |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111405300A (en) * | 2020-02-28 | 2020-07-10 | 北京达佳互联信息技术有限公司 | Pendant display method and device, electronic equipment and computer readable storage medium |
CN111694629A (en) * | 2020-05-28 | 2020-09-22 | 北京字节跳动网络技术有限公司 | Information display method and device and electronic equipment |
CN112817850A (en) * | 2021-01-28 | 2021-05-18 | 北京达佳互联信息技术有限公司 | Information processing method, device, system, electronic equipment and storage medium |
CN112988263A (en) * | 2021-02-10 | 2021-06-18 | 青岛希望鸟科技有限公司 | Method and system for synchronizing web pages |
CN112988263B (en) * | 2021-02-10 | 2023-11-28 | 青岛希望鸟科技有限公司 | Webpage synchronization method and system |
CN114281434A (en) * | 2021-12-15 | 2022-04-05 | 创优数字科技(广东)有限公司 | Applet user information management method, device, computer equipment and storage medium |
CN114281434B (en) * | 2021-12-15 | 2022-11-29 | 创优数字科技(广东)有限公司 | Applet user information management method, apparatus, computer device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110580318B (en) | 2023-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110580318B (en) | Information display method, device and storage medium | |
US9553918B1 (en) | Stateful and stateless cookie operations servers | |
JP6062895B2 (en) | Content rendering control system and method | |
US9219787B1 (en) | Stateless cookie operations server | |
US8516601B2 (en) | Online privacy management | |
CN108073828B (en) | Webpage tamper-proofing method, device and system | |
US10095798B2 (en) | Method for displaying website authentication information and browser | |
CN107979632B (en) | Processing method, device and system for push information | |
KR102504075B1 (en) | Matching and attributes of user device events | |
CN101383842B (en) | System and method for displaying network information by computer background screen | |
CN104967542B (en) | A kind of test method, the device and system of the mobile terminal page | |
CN103473302A (en) | Lock screen information display method, device and system | |
CN104426925A (en) | Webpage resource obtaining method and apparatus | |
CN109766725B (en) | Data processing method, device, intelligent terminal and computer readable medium | |
WO2016107465A1 (en) | Method, device, and system for implementing card-type desktop | |
CN103873918A (en) | Picture processing method, device and terminal | |
CN104834588B (en) | The method and apparatus for detecting resident formula cross site scripting loophole | |
EP3528474B1 (en) | Webpage advertisement anti-shielding methods and content distribution network | |
CN110929183A (en) | Data processing method, device and machine readable medium | |
CN114692049A (en) | Browser-based screen recording method and device, electronic equipment and storage medium | |
CN111177623A (en) | Information processing method and device | |
JP5709448B2 (en) | Access analysis device, access analysis method, and access analysis program | |
CN105224611A (en) | Based on the operation processing method of browser, device and browser | |
CN103020528A (en) | Display method and display device for malicious acts of applications | |
CN110889057B (en) | Service data visualization method and service object visualization device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40018895 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |