[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113162887A - Browser interaction method, device, server, user terminal and storage medium - Google Patents

Browser interaction method, device, server, user terminal and storage medium Download PDF

Info

Publication number
CN113162887A
CN113162887A CN202010016874.1A CN202010016874A CN113162887A CN 113162887 A CN113162887 A CN 113162887A CN 202010016874 A CN202010016874 A CN 202010016874A CN 113162887 A CN113162887 A CN 113162887A
Authority
CN
China
Prior art keywords
webpage
browser
server
user terminal
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010016874.1A
Other languages
Chinese (zh)
Inventor
郑劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN202010016874.1A priority Critical patent/CN113162887A/en
Publication of CN113162887A publication Critical patent/CN113162887A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a browser interaction method, which comprises the following steps: a server acquires a webpage access request sent by a user terminal through a browser; loading the webpage resources requested by the webpage access request; rendering the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource; and sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser. The invention also discloses a browser interaction device, a server, a user terminal and a storage medium. According to the invention, attack surfaces such as rendering engines of the browser are isolated from the user terminal, so that the security is improved.

Description

Browser interaction method, device, server, user terminal and storage medium
Technical Field
The present invention relates to the field of browsers, and in particular, to a browser interaction method, apparatus, server, user terminal, and storage medium.
Background
The browser is a main tool for a user to access the internet through a user terminal and is a first line of defense needing important protection. The browser comprises a plurality of attack surfaces such as rendering engines and the like, and a network attacker can launch attacks to the user terminal through a webpage rendering program of the browser. Modern browsers guarantee the safety of the browsers through measures such as sandbox isolation, authority limitation and the like, however, by adopting the method, the attack surfaces of the browsers still exist in the user terminal, and the safety of the user terminal can be directly threatened when new bugs appear.
Therefore, the security of the current browser still needs to be improved.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a browser interaction method, a browser interaction device, a server, a user terminal and a storage medium, and aims to solve the technical problem that the safety of the current browser is not high enough.
In order to achieve the above object, the present invention provides a browser interaction method, including: a server acquires a webpage access request sent by a user terminal through a browser; loading the webpage resources requested by the webpage access request; rendering the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource; and sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser.
Optionally, the step of loading the webpage resource requested by the webpage access request specifically includes: accessing a website server pointed by the uniform resource locator according to the uniform resource locator carried by the webpage access request; and downloading the webpage resources corresponding to the uniform resource locator from the website server.
Optionally, the step of accessing, according to the uniform resource locator carried by the web page access request, the website server pointed by the uniform resource locator specifically includes: performing domain name resolution on the uniform resource locator carried by the webpage access request, and resolving to obtain a target IP address; and accessing the website server corresponding to the target IP address.
Optionally, the step of rendering the webpage resource by using a rendering engine in the server specifically includes: syntax analysis is carried out on the loaded webpage resources to obtain a corresponding data structure; constructing a rendering tree according to the data structure; and calculating the position and the size of each object in the rendering tree, and converting each object into pixel point information of a user interface according to the position and the size of each object so as to form webpage user interface data.
Optionally, after the step of obtaining, by the server, a web page access request sent by the user terminal through a browser, the browser interaction method further includes: carrying out threat detection on a uniform resource locator carried by the webpage access request, and judging whether a target webpage pointed by the uniform resource locator has a security threat or not; and if the target webpage has no security threat, executing the step of loading the webpage resources requested by the webpage access request.
Optionally, the step of performing threat detection on the uniform resource locator carried by the web page access request and determining whether a security threat exists in a target web page pointed by the uniform resource locator specifically includes: comparing the uniform resource locator with a preset white list; the preset white list comprises a plurality of trusted uniform resource locators; if the uniform resource locator is matched with the white list, judging that the uniform resource locator does not have security threat; and if the uniform resource locator is not matched with the white list, judging that the uniform resource locator has security threat.
Optionally, the step of performing threat detection on the uniform resource locator carried by the web page access request and determining whether a security threat exists in a target web page pointed by the uniform resource locator specifically includes: comparing the uniform resource locator with a preset baseline model; the baseline model is established according to a preset white list and a preset black list, the preset white list comprises a plurality of trusted uniform resource locators, and the preset black list comprises a plurality of uniform resource locators marked as threats; if the uniform resource locator is matched with a preset white list in the preset baseline model, judging that the uniform resource locator does not have security threat; and if the uniform resource locator is matched with a preset blacklist in the preset baseline model, judging that the uniform resource locator has security threat.
Optionally, after the step of comparing the uniform resource locator with the preset baseline model, the browser interaction method further includes: if the uniform resource locator is not matched with a preset white list and a preset black list in the preset baseline model, marking the uniform resource locator as a gray list; and carrying out cluster analysis on the uniform resource locators in the grey list so as to update the preset baseline model.
Optionally, after the step of loading the web page resource requested by the web page access request, the browser interaction method further includes: carrying out threat detection on the webpage resources, and judging whether the webpage resources have security threats or not; and if the webpage resources do not have security threats, executing the step of rendering the webpage resources by using a rendering engine in the server.
Optionally, the step of performing threat detection on the web resource and determining whether the web resource has a security threat specifically includes: comparing the webpage resources with a preset white list; the preset white list comprises trusted webpage resources; if the webpage resources are matched with the white list, judging that the webpage resources do not have security threats; and if the webpage resources have the resources which are not matched with the white list, judging that the webpage resources have security threats.
Optionally, before the step of rendering the web page resource by using the rendering engine in the server to obtain the web page user interface data corresponding to the web page resource, the browser interaction method further includes: if the webpage resources contain video uniform resource locators, acquiring corresponding video files according to the video uniform resource locators; and decoding the video file to obtain a decoded video, and taking the decoded video as a webpage resource to be rendered.
Optionally, the browser interaction method further includes: receiving a plug-in access request sent by the user terminal through a browser; responding to the plug-in access request by using the plug-in the server.
In addition, to achieve the above object, the present invention further provides a browser interaction apparatus, including: the acquisition module is used for acquiring a webpage access request sent by a user terminal through a browser; the loading module is used for loading the webpage resources requested by the webpage access request; the rendering module is used for rendering the webpage resources by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resources; and the sending module is used for sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser.
In addition, to achieve the above object, the present invention also provides a server, including: the system comprises a rendering engine, a memory, a processor and a browser interaction program stored on the memory and capable of running on the processor, wherein the browser interaction program realizes the steps of the browser interaction method when being executed by the processor.
In addition, in order to achieve the above object, the present invention further provides a storage medium, where a browser interaction program is stored, and when the browser interaction program is executed by a processor, the steps of the browser interaction method are implemented as described above.
In addition, in order to achieve the above object, the present invention further provides a browser interaction method, where the browser interaction method includes the following steps: a user terminal sends a webpage access request to a server through a browser so that the server loads a webpage resource requested by the webpage access request, a rendering engine in the server is used for rendering the webpage resource, and webpage user interface data corresponding to the webpage resource are obtained and fed back; displaying the web page user interface data within the browser.
Optionally, after the step of sending, by the user terminal, the web page access request to the server through the browser, the browser interaction method further includes: and if the webpage access request carries a user account and a user password, storing the user account, or storing the user account and the user password.
Optionally, after the step of displaying the web page user interface data in the browser, the browser interaction method further includes: and obtaining a cache object in the webpage user interface data, and caching the cache object.
In addition, to achieve the above object, the present invention further provides a browser interaction apparatus, including: the request module is used for sending a webpage access request to a server through a browser so as to enable the server to load webpage resources requested by the webpage access request, and rendering the webpage resources by using a rendering engine in the server to obtain and feed back webpage user interface data corresponding to the webpage resources; and the display module is used for displaying the webpage user interface data in the browser.
In addition, to achieve the above object, the present invention further provides a user terminal, including: the browser interaction program comprises a memory, a processor and a browser interaction program which is stored on the memory and can run on the processor, and the steps of the browser interaction method are realized when the browser interaction program is executed by the processor.
In addition, in order to achieve the above object, the present invention further provides a storage medium, where a browser interaction program is stored, and when the browser interaction program is executed by a processor, the steps of the browser interaction method are implemented as described above.
The invention provides a browser interaction method, a device, a server, a user terminal and a storage medium, wherein the server acquires a webpage access request sent by the user terminal through a browser, loads a webpage resource requested by the webpage access request, renders the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource, sends the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser, loads and renders the webpage resource in the server, then sends the rendered webpage user interface data to the user terminal to be directly displayed through a user interface of the browser, and the rendering engine has a network attack surface and is easy to be attacked by a network attacker and is arranged in the server, the method and the device are physically isolated from the user terminal, and the user terminal can be protected from being attacked by a network, so that the user privacy data of the user terminal are protected, and the safety of the browser is improved.
Drawings
FIG. 1 is a schematic diagram of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a functional block diagram of a hardware operating environment according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a server in a hardware operating environment according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a browser interaction method according to an embodiment of the present invention;
FIG. 5 is a detailed flowchart of step S406 of the browser interaction method in FIG. 4 according to an embodiment of the present invention;
FIG. 6 is a schematic flowchart illustrating another detailed process of step S406 of the browser interaction method in FIG. 4 according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating steps after step S402 of the browser interaction method of the embodiment of the present invention shown in FIG. 4;
FIG. 8 is a flowchart illustrating a detailed process of step S702 of the browser interaction method in FIG. 7 according to an embodiment of the present invention;
FIG. 9 is a schematic flowchart illustrating another detailed process of step S702 of the browser interaction method according to the embodiment of the present invention in FIG. 7;
FIG. 10 is a flowchart illustrating steps after step S902 of the browser interaction method of the embodiment of the present invention in FIG. 9;
FIG. 11 is a flowchart illustrating steps after step S404 of the browser interaction method according to the embodiment of the present invention shown in FIG. 4;
FIG. 12 is a flowchart illustrating a detailed process of step S1102 of the browser interaction method in FIG. 11 according to an embodiment of the present invention;
FIG. 13 is a flowchart illustrating steps before step S406 of the browser interaction method of the embodiment of the present invention shown in FIG. 4;
FIG. 14 is a flowchart illustrating another browser interaction method according to another embodiment of the present invention;
FIG. 15 is a block diagram of an embodiment of a browser interaction device;
fig. 16 is a schematic structural diagram of a user terminal in a hardware operating environment according to an embodiment of the present invention;
FIG. 17 is a flowchart illustrating another browser interaction method according to another embodiment of the present invention;
FIG. 18 is a block diagram of another browser interaction device according to another embodiment of the present invention.
The reference numbers illustrate:
reference numerals Name (R) Reference numerals Name (R)
101 User terminal 231 Browser host module
102 Server 232 Image processor host module
103 Website server 233 Plug-in host module
2001 User terminal 234 Rendering host module
2002 Server 235 Network module
210 Browser 236 Download threat defense module
211 User interface module 237 URL threat defense module
212 Cache module 240 Rendering module
213 Database module 241 Rendering engine
214 Download module 242 JS engine
220 Image processor 250 Plug-in module
230 Browser agent 251 Adobe Flash plug-in
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is a schematic diagram of a hardware operating environment according to an embodiment of the present invention. The user terminal 101 establishes a communication connection with the server 102 via a network, and the server 102 establishes a communication connection with the plurality of web servers 103 via a network. The user terminal 101 sends a web page access request to the web server 103 through the server 102, and after the server 102 proxies the web page access request, the corresponding web page resource in the web server 103 is rendered and then sent to the user terminal 101 for display.
The browser of the present invention is of a C/S (Client/Server) architecture, and a plurality of browser components are provided in the user terminal 101 and the Server 102, respectively. A browser is installed in the user terminal 101. In the embodiment of the present invention, a browser component having a network attack plane is disposed in the server 102, for example, a rendering engine, a JS engine, a plug-in, a video format parsing function module, and the like, so that the user terminal 101 installed with the browser can be isolated from the network attack planes, thereby protecting information security of the user terminal 101. The user terminal 101 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, electronic book readers, MP3(Moving Picture Experts Group Audio Layer III, mpeg Audio Layer 3) players, MP4(Moving Picture Experts Group Audio Layer IV, mpeg Audio Layer 4) players, portable computers, and other mobile user terminal devices having a display function. The server 102 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
Referring to fig. 2, a Browser component configured in a user terminal 2001 according to an embodiment of the present invention includes a Browser (Browser)210 and a Graphics Processing Unit (GPU) 220. The browser210 includes, but is not limited to, a user interface module 211, a Cookie (data stored on the user's local terminal) module 212, a DataBase (DataBase) module 213, and a download (download) module 214. The browser components configured within the server 2002 include a browser proxy (browser proxy)230, a render (render) module 240, and a plug-in (plugin) module 250. The browser agent 230 includes, but is not limited to, a browser host (browser host) module 231, a graphics processor host (gpuHost) module 232, a plug-in host (plugin host) module 233, a render host (render host) module 234, a network module 235, a Download threat defense (Download threat defense) module 236, and a URL threat defense (URL threat defense) module 237, etc. Rendering module 240 includes, but is not limited to, a rendering engine 241 and a js (javascript) engine 242, among others. The rendering engine 241 may be, for example, Webkit, Gecko (composition engine), Trident, EdgeHTML, and the like. The Webkit is the name of the version of the apple Mac OS X system engine framework, and is mainly used for a Safari browser, a Dashboard, a Mail and other Mac OS X programs. Gecko is mainly used for Mozilla Firefox browsers. Trident is mainly used for IE browsers. EdgeHTML is mainly used for Edge and other UWP (Universal Windows Platform, Windows Universal application Platform) browsers, where Edge is a browser kernel of an IE browser. The JS engine 242 may be, for example, a V8 engine. The plugin module 250 includes, but is not limited to, an Adobe Flash plug-in 251 for playing Flash files.
Note that the user terminal 2001 establishes a telecommunication connection with the server 2002 via a network. The Browser host module 231 in the server 2002 manages the Browser210 in the user terminal 2001 by RPC (Remote Procedure Call). The gpushost module 232 in the server 2002 manages the GPU220 in the user terminal 2001 through RPC. The plugin host module 233 in the server 2002 manages the plugin module 250 in the server 2002 by LPC (linear predictive coding). The renderHost module 234 in the server 2002 manages the render module 240 in the server 2002 through LPC.
Fig. 3 is a schematic structural diagram of a server in a hardware operating environment according to an embodiment of the present invention. The server may include: a processor 3001, e.g., a CPU, a network interface 3004, a user interface 3003, a memory 3005, a communication bus 3002. The communication bus 3002 is used to realize connection communication between these components. The user interface 3003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 3003 may also include a standard wired interface, a wireless interface. The network interface 3004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 3005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 3005 may alternatively be a storage device separate from the processor 3001.
Those skilled in the art will appreciate that the server architecture shown in FIG. 3 is not intended to be limiting of the servers of embodiments of the present invention and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
The memory 3005, which is a type of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a browser interaction program. In the server shown in fig. 3, the network interface 3004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 3003 is mainly used for connecting a client (user terminal) and performing data communication with the client; and the processor 3001 may be configured to invoke a browser interaction program stored in the memory 3005 and perform the following operations: a server acquires a webpage access request sent by a user terminal through a browser; loading the webpage resources requested by the webpage access request; rendering the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource; and sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the step of loading the webpage resource requested by the webpage access request specifically includes: accessing a website server pointed by the uniform resource locator according to the uniform resource locator carried by the webpage access request; and downloading the webpage resources corresponding to the uniform resource locator from the website server.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the step of accessing the website server pointed by the uniform resource locator according to the uniform resource locator carried by the webpage access request specifically includes: performing domain name resolution on the uniform resource locator carried by the webpage access request, and resolving to obtain a target IP address; and accessing the website server corresponding to the target IP address.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the step of rendering the webpage resource by using a rendering engine in the server specifically includes: syntax analysis is carried out on the loaded webpage resources to obtain a corresponding data structure; constructing a rendering tree according to the data structure; and calculating the position and the size of each object in the rendering tree, and converting each object into pixel point information of a user interface according to the position and the size of each object so as to form webpage user interface data.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: after the step of the server obtaining a web page access request sent by the user terminal through the browser, the browser interaction method further includes: carrying out threat detection on a uniform resource locator carried by the webpage access request, and judging whether a target webpage pointed by the uniform resource locator has a security threat or not; and if the target webpage has no security threat, executing the step of loading the webpage resources requested by the webpage access request.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the step of detecting a threat to the uniform resource locator carried by the web page access request and judging whether a target web page pointed by the uniform resource locator has a security threat specifically includes: comparing the uniform resource locator with a preset white list; the preset white list comprises a plurality of trusted uniform resource locators; if the uniform resource locator is matched with the white list, judging that the uniform resource locator does not have security threat; and if the uniform resource locator is not matched with the white list, judging that the uniform resource locator has security threat.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the step of detecting a threat to the uniform resource locator carried by the web page access request and judging whether a target web page pointed by the uniform resource locator has a security threat specifically includes: comparing the uniform resource locator with a preset baseline model; the baseline model is established according to a preset white list and a preset black list, the preset white list comprises a plurality of trusted uniform resource locators, and the preset black list comprises a plurality of uniform resource locators marked as threats; if the uniform resource locator is matched with a preset white list in the preset baseline model, judging that the uniform resource locator does not have security threat; and if the uniform resource locator is matched with a preset blacklist in the preset baseline model, judging that the uniform resource locator has security threat.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: after the step of comparing the uniform resource locator with the preset baseline model, the browser interaction method further includes: if the uniform resource locator is not matched with a preset white list and a preset black list in the preset baseline model, marking the uniform resource locator as a gray list; and carrying out cluster analysis on the uniform resource locators in the grey list so as to update the preset baseline model.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: after the step of loading the web page resource requested by the web page access request, the browser interaction method further includes: carrying out threat detection on the webpage resources, and judging whether the webpage resources have security threats or not; and if the webpage resources do not have security threats, executing the step of rendering the webpage resources by using a rendering engine in the server.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the steps of detecting the threat to the webpage resource and judging whether the webpage resource has a security threat specifically include: comparing the webpage resources with a preset white list; the preset white list comprises trusted webpage resources; if the webpage resources are matched with the white list, judging that the webpage resources do not have security threats; and if the webpage resources have the resources which are not matched with the white list, judging that the webpage resources have security threats.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: before the step of rendering the web page resource by using the rendering engine in the server to obtain the web page user interface data corresponding to the web page resource, the browser interaction method further includes: if the webpage resources contain video uniform resource locators, acquiring corresponding video files according to the video uniform resource locators; and decoding the video file to obtain a decoded video, and taking the decoded video as a webpage resource to be rendered.
Alternatively, the processor 3001 may call a browser interaction program stored in the memory 3005, and further perform the following operations: the browser interaction method further comprises the following steps: receiving a plug-in access request sent by the user terminal through a browser; responding to the plug-in access request by using the plug-in the server.
Referring to fig. 4, an embodiment of a browser interaction method includes:
step S402, a server acquires a webpage access request sent by a user terminal through a browser;
the browser type of the user terminal is not limited, and may be, for example, a 360-browser. The web page access request carries a Uniform Resource Locator (URL) input by the user. The user can manually input a URL in an address bar of a browser of the user terminal to send out a webpage access request, and can also send out the webpage access request by clicking a webpage hyperlink.
Step S404, loading the webpage resource requested by the webpage access request;
it should be noted that the server obtains the target web page requested by the web page access request, and loads the web page resource in the target web page. Specifically, the server accesses a web server corresponding to the target web page, and uses a web page resource for downloading the target web page from the web server. Specifically, the server downloads the web page resource of the target web page from the website server to the local by using the network module. The web page resources include, but are not limited to, HTML (HyperText Markup Language) files, JS files, CSS (Cascading Style Sheets) files, image files, and the like.
Step S406, rendering the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource;
it should be noted that, the server renders the web page resource by using a local rendering engine, and obtains the rendered web page User Interface (UI) data corresponding to the target web page. The webpage UI data is visual UI data of a target webpage, the webpage UI data is visual UI data of webpage resources on a browser user interface, and the server enables visualization
Step S408, sending the web page user interface data to the user terminal, so that the user terminal displays the web page user interface data in the browser.
It should be understood that the server transmits the web page UI data to the GPU of the user terminal through RPC using the GPUHost module. And after receiving the webpage UI data, the GPU of the user terminal outputs the webpage UI data to a user interface of the browser for display after carrying out graphical processing on the webpage UI data. At this point, the processing of the web page access request is completed through the interaction among the user terminal, the server and the website server.
In the embodiment, the server acquires a webpage access request sent by a user terminal through a browser, loads a webpage resource requested by the webpage access request, renders the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource, sends the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser, loads and renders the webpage resource in the server, then sends the rendered webpage user interface data to the user terminal to directly display through a user interface of the browser, the rendering engine has a network attack surface and is easy to be attacked by a network attacker, and the rendering engine is arranged in the server to be physically isolated from the user terminal so as to protect the user terminal from being attacked by the network, therefore, the user privacy data of the user terminal is protected, and the safety of the browser is improved.
Referring to fig. 5, in one embodiment, the step S406 specifically includes:
step S502, accessing a website server pointed by the uniform resource locator according to the uniform resource locator carried by the webpage access request;
in this embodiment, when acquiring the web page access request, the server first extracts the URL carried in the web page access request, and accesses the corresponding web server according to the URL.
In one embodiment, the step S502 specifically includes: performing domain name resolution on the uniform resource locator carried by the webpage access request, and resolving to obtain a target IP address; and accessing the website server corresponding to the target IP address.
It should be understood that a domain name resolution module is also provided in the server. The server in this embodiment obtains the target IP address mapped with the URL by analyzing the URL carried in the web page access request. It should be understood that each website server has a unique website space, and the IP address of the website space is the IP address of the website server, and other terminals or servers can directly access the website server through the IP address of the website server. The domain name resolution module of the server in this embodiment further includes an address mapping table, where the address mapping table includes a mapping relationship between a URL and an IP address, and the server queries the address mapping table by using the URL carried in the web access request as an index, and uses the found IP address as a target IP address. Further, the server accesses the website server corresponding to the target IP address.
Step S504, downloading the web page resource corresponding to the uniform resource locator from the website server.
It should be noted that, after the server accesses the web server, the URL carried in the web access request is used as an index to search the web resource library in the web server, and the searched web resource is downloaded.
The embodiment provides a specific implementation mode for loading the webpage resources, and the website server pointed by the URL is accessed according to the URL carried by the webpage access request, so that the webpage resources corresponding to the URL are downloaded from the website server, and the webpage resources to be accessed by the user can be accurately searched and downloaded. When the website server is accessed according to the URL, domain name resolution is carried out on the URL carried by the webpage access request, a target IP address is obtained through resolution, then the website server corresponding to the target IP address is accessed, and a domain name resolution function is set in the server, so that domain name resolution of the user terminal to the webpage of the browser is replaced, the user terminal can not be attacked by the threat URL, and the information safety of the user terminal is effectively protected.
Referring to fig. 6, in one embodiment, the step S406 specifically includes:
step S602, syntax analysis is carried out on the loaded webpage resources to obtain a corresponding data structure;
it should be noted that the server renders the webpage resource by using a rendering module, where the rendering module includes, but is not limited to, a rendering engine and a JS engine. Specifically, the server performs syntax parsing on the loaded webpage resource by using the rendering module to obtain a data structure of the webpage resource.
Step S604, constructing a rendering tree according to the data structure;
in this embodiment, the server constructs a rendering tree according to the obtained data structure by using the rendering module, where the rendering tree includes, but is not limited to, a DOM (Document Object Model) tree and a CSSOM (CSS Object Model).
Step S606, calculating the position and size of each object in the rendering tree, and converting each object into pixel point information of the user interface according to the position and size of each object, so as to form webpage user interface data.
It should be noted that, the server starts from the root node of the DOM tree, traverses all the visible nodes in the DOM tree, and ignores the invisible elements such as script tags and metadata tags. It should be noted that an element is an element node, and the element node may include a plurality of child nodes. In addition, the server ignores the element hidden by the CSS, for example, an element in which a property "display: none" is set to be displayed on the element. Further, the server searches the corresponding style rule from the CSSOM tree for each visual node obtained through traversal, and assigns values to each visual node. Further, the server performs page layout according to each visible node, calculates the exact position and size of each object, converts each object into a pixel point of the user interface according to the position and size of each object, obtains pixel point information of each object on the user interface, and forms the pixel point information into webpage UI data.
The embodiment provides a specific implementation mode for rendering webpage resources, which is to perform syntax parsing on loaded webpage resources to obtain a corresponding data structure, construct a rendering tree according to the data structure, then calculate the position and size of each object in the rendering tree, and convert each object into pixel point information of a user interface according to the position and size of each object to form webpage user interface data, thereby completing rendering of the webpage resources, and set a specific rendering function of the webpage resources in a server to replace a function of rendering in a user terminal by a traditional browser, so that a rendering module which is easily attacked by a network is extracted from the user terminal, and thus information security of the user terminal is protected.
Referring to fig. 7, in an embodiment, after the step S402, the browser interaction method further includes:
step S702, carrying out threat detection on the uniform resource locator carried by the webpage access request, and judging whether a target webpage pointed by the uniform resource locator has a security threat or not;
it should be noted that, the server of this embodiment further performs threat detection on each URL by using a local URL threat defense module to detect whether a webpage corresponding to the URL is a webpage with a threat, such as a phishing webpage or a trojan webpage, so as to prevent the user terminal from accessing the webpage and being threatened by information security. Specifically, the server performs threat detection on the URL carried by the web page access request, and determines whether a security threat exists in a target web page executed by the URL. The threat detection method of the embodiment may use a conventional method, for example, installing 360 security guards in the server to perform threat detection of URLs.
Step S704, if the target webpage does not have a security threat, step S404 is executed.
It should be understood that if the target webpage does not have a security threat, the next step, step S404, is executed. And if the security threat exists in the target webpage, sending out a threat warning and intercepting the URL.
In the embodiment, after the server acquires the webpage access request, the server carries out threat detection on the URL carried in the webpage access request, so that the user terminal can be further prevented from being attacked by a threatening webpage, the threat detection on the URL is arranged in the server, the user terminal is better isolated from a relevant module of the URL, and the information safety of the user terminal can be better protected.
Referring to fig. 8, in one embodiment, the step S702 specifically includes:
step S802, comparing the uniform resource locator with a preset white list; the preset white list comprises a plurality of trusted uniform resource locators;
it should be noted that the preset white list is preset in the server, and the preset white list includes multiple trusted uniform resource locators. The preset white list may be configured according to known secure web pages. And the server compares the URL obtained by analysis with a preset white list and judges whether the URL exists in the preset white list or not.
Step S802, if the uniform resource locator is matched with the white list, judging that the uniform resource locator has no security threat; and if the uniform resource locator is not matched with the white list, judging that the uniform resource locator has security threat.
It should be appreciated that if the URL matches the whitelist, i.e., the URL is a trusted URL, then it is determined that there is no security threat with the URL. If the URL is not matched with the white list, namely the URL is an untrusted URL, the URL is judged to have security threat.
In this embodiment, a specific implementation of threat detection is provided, where a URL is compared with a preset white list, and if the URL matches with the white list, it is determined that there is no security threat to the URL; if the URL is not matched with the white list, the URL is judged to have safety threat, and threat detection can be simply, conveniently and effectively realized.
Referring to fig. 9, in one embodiment, the step S702 specifically includes:
step S902, comparing the uniform resource locator with a preset baseline model; the baseline model is established according to a preset white list and a preset black list, the preset white list comprises a plurality of trusted uniform resource locators, and the preset black list comprises a plurality of uniform resource locators marked as threats;
it should be noted that the preset baseline model is a machine learning model, in this embodiment, the preset baseline model is established based on big data formed by a plurality of URLs, and a data set formed by the plurality of URLs is subjected to cluster analysis through machine learning to obtain the baseline model. The data set formed by the URLs comprises a preset white list and a preset black list. The preset white list comprises a plurality of trusted uniform resource locators, and the preset black list comprises a plurality of uniform resource locators marked as threats. That is, the data set of multiple URLs contains trusted secure URLs as well as threatening URLs. The baseline model may be established by learning a data set of multiple URLs.
Step S904, if the uniform resource locator is matched with a preset white list in the preset baseline model, judging that the uniform resource locator has no security threat; and if the uniform resource locator is matched with a preset blacklist in the preset baseline model, judging that the uniform resource locator has security threat.
It should be understood that, in this embodiment, if the URL obtained through the parsing matches with a preset white list in a preset baseline model, it is determined that there is no security threat to the URL, and if the URL matches with a preset black list in the preset baseline model, it is determined that there is a security threat to the uniform resource locator.
In this embodiment, a baseline model is introduced to detect the threats of the URLs, and the baseline model is established according to a preset white list and a preset black list, so that the threat capturing capability of detecting the threats according to the baseline model is higher.
Referring to fig. 10, in one embodiment, after the step S902, the browser interaction method further includes:
step S1002, if the uniform resource locator is not matched with a preset white list and a preset black list in the preset baseline model, marking the uniform resource locator as a grey list;
it should be noted that, in this embodiment, if the URL obtained through the analysis is not matched with the preset white list and the preset black list in the preset baseline model, the URL is regarded as a gray list, the URL is marked, and the alarm information of the unknown URL is output.
Step S1004, performing cluster analysis on the uniform resource locators in the gray list to update the preset baseline model.
In this embodiment, the server further performs cluster analysis on the URLs marked as the grey list to update the preset baseline model.
In this embodiment, the threat detection module is further improved, and when detecting a URL that is not matched with both the preset white list and the preset black list in the preset baseline model, the URL is learned, so that the preset baseline model is updated, the threat detection capability of the preset baseline model can be continuously improved, the threat capture capability is improved, and the security is higher.
Referring to fig. 11, in one embodiment, after the step 404, the browser interaction method further includes:
step S1102, carrying out threat detection on the webpage resources, and judging whether the webpage resources have security threats or not;
it should be noted that, in this embodiment, after the server loads the web resource, the server further performs threat detection on the loaded web resource to determine whether the web resource has a security threat, for example, whether the web resource carries a virus, a trojan, binding information, and the like.
Step S1104, if the webpage resource does not have a security threat, the step S406 is executed.
It should be understood that if the web page resource does not have a security threat, the next step, step S406, is executed. And if the webpage resources have security threats, sending out a threat warning and intercepting the webpage resources.
In the embodiment, after the server loads the webpage resources, the server performs threat detection on the webpage resources to judge whether the webpage resources have security threats or not, so that the user terminal can be further protected from being attacked by the compromised webpage resources, the threat detection on the webpage resources is arranged in the server, the user terminal is better isolated from relevant modules of the webpage resources, and the information security of the user terminal can be better protected.
Referring to fig. 12, in one embodiment, the step S1102 specifically includes:
step S1202, comparing the webpage resource with a preset white list; the preset white list comprises trusted webpage resources;
it should be noted that the preset white list in this embodiment includes trusted web page resources. The preset white list for threat detection on the webpage resource can be two independent white list files with the preset white list for threat detection on the URL, and can also be the same combined white list file. And if the same combined white list file is used, the preset white list comprises the trusted webpage resources and the trusted URLs.
It should be understood that the preset white list is preset in the server, and the preset white list may be configured according to known secure web page resources. And the server compares the loaded webpage resources with a preset white list and judges whether the webpage resources exist in the preset white list or not.
In one embodiment, the web page resources may also be compared using a preset baseline model. The preset baseline model comprises a preset white list and a preset black list, and the preset black list comprises the webpage resources marked as threats.
Step S1202, if the webpage resource is matched with the white list, judging that the webpage resource has no security threat; and if the webpage resources have the resources which are not matched with the white list, judging that the webpage resources have security threats.
It should be understood that if each element in the web resource matches the white list, each element in the web resource is a trusted URL, and it is determined that the web resource does not have a security threat. And if the webpage resources have the resources which are not matched with the white list, judging that the webpage resources have the security threat.
In this embodiment, a specific implementation manner of threat detection on a web resource is provided, in which the web resource is compared with a preset white list, and if the web resource is matched with the white list, it is determined that the web resource does not have a security threat; if the webpage resources have the resources which are not matched with the white list, the safety threat of the webpage resources is judged, and the threat detection of the webpage resources can be simply, conveniently and effectively realized.
Referring to fig. 13, in one embodiment, before the step S406, the browser interaction method further includes:
step S1302, if the webpage resource includes a video uniform resource locator, acquiring a corresponding video file according to the video uniform resource locator;
it should be noted that, after the server loads the web page resource, the server also analyzes the web page resource to determine whether a video URL exists in the web page resource. And if so, acquiring a corresponding video file according to the video URL. It should be understood that the acquired video file is a compression-encoded video stream.
Step S1304, decoding the video file to obtain a decoded video, and using the decoded video as a webpage resource to be rendered.
In this embodiment, the server decodes the acquired video file to obtain a decoded video, and then uses the decoded video as a webpage resource to be rendered, and uses the decoded video and other webpage resources together as a set of webpage resources to be rendered to execute the next step, so as to render the set of webpage resources to be rendered, and obtain webpage UI data.
In this embodiment, the server further decodes the video file in the web resource before rendering the web resource, and the video decoding process that is easily attacked by the network is isolated from the user terminal by setting the parsing function of the video file in the server, thereby further protecting the information security of the user terminal.
Referring to fig. 14, in one embodiment, the browser interaction method further includes:
step S1402, receiving a plug-in access request sent by the user terminal through a browser;
in step S1404, the plug-in the server is used to respond to the plug-in access request.
It should be noted that the user terminal may also issue a plug-in access request through the server. Plug-ins of the browser include, but are not limited to, Adobe Flash, a translation plug-in, a screenshot plug-in and the like. Extending browser functionality through plug-ins is a widely used way today, but these plug-ins add to the browser's attack surface. In this embodiment, the plug-in component of the browser is set in the server to be isolated from the user terminal, thereby protecting the information security of the user terminal.
In this embodiment, the server receives a plug-in access request, such as a screenshot plug-in, sent by the user terminal through the browser, then performs a function response to the plug-in access request in the server, and sends response information to the user terminal so that the user terminal can directly use the function of the plug-in.
In the embodiment, the server receives the plug-in access request sent by the user terminal through the browser and responds, so that the access and response processes of the plug-in are carried out in the server, the increase of an attack face brought by the user terminal to the browser plug-in is avoided, and the information security of the user terminal is further protected.
In addition, referring to fig. 15, an embodiment of the present invention further provides a browser interaction apparatus, where the browser interaction apparatus includes:
an obtaining module 1501, configured to obtain a web access request sent by a user terminal through a browser;
a loading module 1502, configured to load a web resource requested by the web access request;
the rendering module 1503 is configured to render the web resource by using a rendering engine in the server to obtain web user interface data corresponding to the web resource;
a sending module 1504, configured to send the web page user interface data to the user terminal, so that the user terminal displays the web page user interface data in the browser.
Optionally, each functional module is further configured to implement each step of the browser interaction method embodiment, which is not described herein again.
In addition, an embodiment of the present invention further provides a server, where the server includes: the system comprises a rendering engine, a memory, a processor and a browser interaction program stored on the memory and capable of running on the processor, wherein the browser interaction program realizes the steps of the browser interaction method embodiment as described above when being executed by the processor.
In addition, an embodiment of the present invention further provides a storage medium, where a browser interaction program is stored on the storage medium, and the browser interaction program, when executed by a processor, implements the steps of the browser interaction method embodiment as described above.
In addition, the embodiment of the invention also provides a browser interaction method, and the execution main body of the browser interaction method is the user terminal. Fig. 16 is a schematic diagram of a user terminal structure of a hardware operating environment according to an embodiment of the present invention. The user terminal in the embodiment of the present invention may be a PC, or may be a mobile terminal device having a display function, such as a smart phone, a tablet computer, an e-book reader, an MP3(Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4) player, a portable computer, or the like.
As shown in fig. 16, the user terminal may include: a processor 1601, such as a CPU, a network interface 1604, a user interface 1603, memory 1605, and a communication bus 1602. Optionally, the user terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again. Those skilled in the art will appreciate that the user terminal architecture shown in fig. 16 is not intended to be limiting of user terminals and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
The processor 1601 may be configured to invoke a browser interaction program stored in the memory 1605 and perform the following operations: a user terminal sends a webpage access request to a server through a browser so that the server loads a webpage resource requested by the webpage access request, a rendering engine in the server is used for rendering the webpage resource, and webpage user interface data corresponding to the webpage resource are obtained and fed back; displaying the web page user interface data within the browser.
Alternatively, the processor 1601 may call a picture processing program stored in the memory 1605, and further perform the following operations: and if the webpage access request carries a user account and a user password, storing the user account, or storing the user account and the user password.
Alternatively, the processor 1601 may call a picture processing program stored in the memory 1605, and further perform the following operations: and taking a cache object in the webpage user interface data, and caching the cache object.
Referring to fig. 17, an embodiment of a browser interaction method includes the following steps:
step 1701, a user terminal sends a webpage access request to a server through a browser so that the server loads a webpage resource requested by the webpage access request, and a rendering engine in the server is used for rendering the webpage resource to obtain and feed back webpage user interface data corresponding to the webpage resource;
step 1702, displaying the web page user interface data in the browser.
It should be noted that, after receiving the web page UI data fed back by the server, the user terminal performs graphical processing by the GPU and outputs the graphical processing to the user interface of the browser for display.
In the embodiment, a user terminal sends a webpage access request to a server through a browser so as to enable the server to load webpage resources requested by the webpage access request, a rendering engine in the server is utilized to render the webpage resources to obtain webpage user interface data corresponding to the webpage resources, the webpage user interface data are sent to the user terminal, the user terminal displays the webpage UI data in the browser after receiving the webpage UI data, the webpage access request is sent to the server to load and render the webpage resources in the server, and then the rendered webpage user interface data are fed back to the user terminal, so that the user terminal directly displays the webpage UI data through a user interface of the browser, and the rendering engine has a network attack surface and is easy to be attacked by a network attacker by arranging the rendering engine in the server, the method and the device are physically isolated from the user terminal, and the user terminal can be protected from being attacked by a network, so that the user privacy data of the user terminal are protected, and the safety of the browser is improved.
In one embodiment, after step S1701, the browser interaction method further includes: and if the webpage access request carries a user account and a user password, storing the user account, or storing the user account and the user password.
It should be noted that, if the user also inputs a user account and a user password when accessing the web page, and requests the browser to record the user account or record the user account and the user password at the same time, the user terminal stores the user account or the user account and the user password in the database of the browser, so that the user account can be directly and automatically input or login can be directly performed according to the stored user account and the stored user password when subsequently accessing the website server again.
In this embodiment, the browser sets the storage function for the user data, that is, the user account and the user password, in the user terminal instead of storing the user data in the server, so that the user terminal stores the user data, the server processes the website access work of the browser, and isolates the user data from the website access process of the browser, thereby effectively protecting the user information security of the user terminal.
In one embodiment, after step S1701, the browser interaction method further includes: and obtaining a cache object in the webpage user interface data, and caching the cache object.
It should be noted that, the Browser cache (Browser Caching) is to save resources of the network and accelerate browsing, the Browser stores the recently requested document on the user disk, and when the visitor requests the page again, the Browser can display the document from the local disk, so that browsing of the page can be accelerated. In this embodiment, the user terminal caches the cache object in the UI data of the web page through the browser.
In the embodiment, the webpage caching is carried out on the browser at the user terminal, the access speed of the browser can be accelerated by caching the browser data at the user terminal, and meanwhile, the browser cache is arranged in the user terminal and is isolated from the website access process of the server and the browser, so that the information safety of the user terminal can be effectively protected.
In addition, referring to fig. 18, an embodiment of the present invention further provides a browser interaction apparatus, where the browser interaction apparatus includes:
a request module 1801, configured to send a web page access request to a server through a browser, so that the server loads a web page resource requested by the web page access request, and renders the web page resource by using a rendering engine in the server, to obtain and feed back web page user interface data corresponding to the web page resource;
a display module 1802 configured to display the web page user interface data in the browser.
Optionally, each functional module is further configured to implement each step of the browser interaction method embodiment, which is not described herein again.
In addition, an embodiment of the present invention further provides a user terminal, where the user terminal includes: the browser interaction program comprises a memory, a processor and a browser interaction program which is stored on the memory and can run on the processor, and the steps of the browser interaction method embodiment are realized when the browser interaction program is executed by the processor.
In addition, an embodiment of the present invention further provides a storage medium, where a browser interaction program is stored on the storage medium, and the browser interaction program, when executed by a processor, implements the steps of the browser interaction method embodiment as described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a server or a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A browser interaction method is characterized by comprising the following steps:
a server acquires a webpage access request sent by a user terminal through a browser;
loading the webpage resources requested by the webpage access request;
rendering the webpage resource by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resource;
and sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser.
2. The browser interaction method of claim 1, wherein before the step of rendering the web page resource by using the rendering engine in the server to obtain the web page user interface data corresponding to the web page resource, the browser interaction method further comprises:
if the webpage resources contain video uniform resource locators, acquiring corresponding video files according to the video uniform resource locators;
and decoding the video file to obtain a decoded video, and taking the decoded video as a webpage resource to be rendered.
3. The browser interaction method of claim 1, further comprising:
receiving a plug-in access request sent by the user terminal through a browser;
responding to the plug-in access request by using the plug-in the server.
4. A browser interaction apparatus, comprising:
the acquisition module is used for acquiring a webpage access request sent by a user terminal through a browser;
the loading module is used for loading the webpage resources requested by the webpage access request;
the rendering module is used for rendering the webpage resources by using a rendering engine in the server to obtain webpage user interface data corresponding to the webpage resources;
and the sending module is used for sending the webpage user interface data to the user terminal so that the user terminal displays the webpage user interface data in the browser.
5. A server, characterized in that the server comprises: rendering engine, memory, processor and a browser interaction program stored on the memory and executable on the processor, the browser interaction program when executed by the processor implementing the steps of the browser interaction method of any one of claims 1 to 3.
6. A storage medium having a browser interaction program stored thereon, wherein the browser interaction program, when executed by a processor, implements the steps of the browser interaction method according to any one of claims 1 to 3.
7. A browser interaction method is characterized by comprising the following steps:
a user terminal sends a webpage access request to a server through a browser so that the server loads a webpage resource requested by the webpage access request, a rendering engine in the server is used for rendering the webpage resource, and webpage user interface data corresponding to the webpage resource are obtained and fed back;
displaying the web page user interface data within the browser.
8. A browser interaction apparatus, comprising:
the request module is used for sending a webpage access request to a server through a browser so as to enable the server to load webpage resources requested by the webpage access request, and rendering the webpage resources by using a rendering engine in the server to obtain and feed back webpage user interface data corresponding to the webpage resources;
and the display module is used for displaying the webpage user interface data in the browser.
9. A user terminal, characterized in that the user terminal comprises: a memory, a processor and a browser interaction program stored on the memory and executable on the processor, the browser interaction program when executed by the processor implementing the steps of the browser interaction method of claim 7.
10. A storage medium having a browser interaction program stored thereon, wherein the browser interaction program, when executed by a processor, implements the steps of the browser interaction method according to claim 7.
CN202010016874.1A 2020-01-07 2020-01-07 Browser interaction method, device, server, user terminal and storage medium Pending CN113162887A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010016874.1A CN113162887A (en) 2020-01-07 2020-01-07 Browser interaction method, device, server, user terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010016874.1A CN113162887A (en) 2020-01-07 2020-01-07 Browser interaction method, device, server, user terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113162887A true CN113162887A (en) 2021-07-23

Family

ID=76882251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010016874.1A Pending CN113162887A (en) 2020-01-07 2020-01-07 Browser interaction method, device, server, user terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113162887A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114390340A (en) * 2021-12-30 2022-04-22 北京鸿合爱学教育科技有限公司 Video playing method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561915A (en) * 2009-06-05 2009-10-21 阿里巴巴集团控股有限公司 Plug-in unit acquiring method, system and device thereof
CN103607385A (en) * 2013-11-14 2014-02-26 北京奇虎科技有限公司 Method and apparatus for security detection based on browser
CN104035984A (en) * 2014-05-29 2014-09-10 北京奇虎科技有限公司 Method for blocking popup windows in browser and device for blocking popup windows
CN104615776A (en) * 2015-02-27 2015-05-13 北京奇艺世纪科技有限公司 Method and device for providing information to be displayed
CN108366058A (en) * 2018-02-07 2018-08-03 平安普惠企业管理有限公司 Method, apparatus, equipment and the storage medium for preventing advertisement operators flow from kidnapping
CN110221871A (en) * 2019-04-22 2019-09-10 腾讯科技(深圳)有限公司 Webpage acquisition methods, device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561915A (en) * 2009-06-05 2009-10-21 阿里巴巴集团控股有限公司 Plug-in unit acquiring method, system and device thereof
CN103607385A (en) * 2013-11-14 2014-02-26 北京奇虎科技有限公司 Method and apparatus for security detection based on browser
CN104035984A (en) * 2014-05-29 2014-09-10 北京奇虎科技有限公司 Method for blocking popup windows in browser and device for blocking popup windows
CN104615776A (en) * 2015-02-27 2015-05-13 北京奇艺世纪科技有限公司 Method and device for providing information to be displayed
CN108366058A (en) * 2018-02-07 2018-08-03 平安普惠企业管理有限公司 Method, apparatus, equipment and the storage medium for preventing advertisement operators flow from kidnapping
CN110221871A (en) * 2019-04-22 2019-09-10 腾讯科技(深圳)有限公司 Webpage acquisition methods, device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114390340A (en) * 2021-12-30 2022-04-22 北京鸿合爱学教育科技有限公司 Video playing method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN108989266B (en) Processing method for preventing webpage hijacking, client and server
CN102629273B (en) Advertising information pushing method based on browser, device and browser system
CN102917074B (en) A kind of method realizing server-side browser and server
US20140325323A1 (en) Online video playing method and apparatus and computer readable medium
JP2014203464A (en) Client based local malware detection method
CN111737692B (en) Application program risk detection method and device, equipment and storage medium
CN102981705B (en) Server-side browser implementation method and server
KR101689745B1 (en) Web browsing system and method for rendering dynamic resource URI of script
CN109672658B (en) JSON hijacking vulnerability detection method, device, equipment and storage medium
RU2628253C2 (en) Method and device for terminal marking
WO2014176906A1 (en) Online video playing method and apparatus and computer readable medium
CN104980404A (en) Method and system for protecting account information security
CN111163095A (en) Network attack analysis method, network attack analysis device, computing device, and medium
US11477158B2 (en) Method and apparatus for advertisement anti-blocking
CN104468459B (en) A kind of leak detection method and device
US10664648B2 (en) Webpage rendering using a remotely generated layout node tree
CN102929489B (en) Client browser implementation method and client browser
US11870808B1 (en) Mobile device security application for malicious website detection based on representative image
JP5604016B1 (en) Script caching method and information processing apparatus using the same
CN113162887A (en) Browser interaction method, device, server, user terminal and storage medium
CN112749351B (en) Link address determination method, device, computer readable storage medium and equipment
US9444831B1 (en) Malicious script detection using context-dependent script emulation
US20160127445A1 (en) Methods and devices for identifying terminal
US8676884B2 (en) Security configuration
CN113987472B (en) Webpage browsing security detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination