CN112711692A - Webpage data anti-grabbing method and system and intelligent terminal - Google Patents

Webpage data anti-grabbing method and system and intelligent terminal Download PDF

Info

Publication number
CN112711692A
CN112711692A CN202110041088.1A CN202110041088A CN112711692A CN 112711692 A CN112711692 A CN 112711692A CN 202110041088 A CN202110041088 A CN 202110041088A CN 112711692 A CN112711692 A CN 112711692A
Authority
CN
China
Prior art keywords
font
data
webpage
characters
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110041088.1A
Other languages
Chinese (zh)
Inventor
邹文锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Foresight Information Co ltd
Original Assignee
Shenzhen Foresight Information Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Foresight Information Co ltd filed Critical Shenzhen Foresight Information Co ltd
Priority to CN202110041088.1A priority Critical patent/CN112711692A/en
Publication of CN112711692A publication Critical patent/CN112711692A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/109Font handling; Temporal or kinetic typography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/126Character encoding

Abstract

The application relates to a method, a system and an intelligent terminal for preventing data from being grabbed at a webpage end, belonging to the field of computer data security; according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data; and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client. Compared with the related art, the method and the device have the effect of improving the problem of large resource consumption of the server.

Description

Webpage data anti-grabbing method and system and intelligent terminal
Technical Field
The application relates to the field of computer data security, in particular to a method and a system for preventing data of a webpage from being grabbed and an intelligent terminal.
Background
Web crawlers, also known as web spiders and web robots, are programs or scripts that automatically capture web information according to certain rules. With the rapid development of networks, the world wide web becomes a carrier of a large amount of information, and more enterprises establish own websites for publicizing products, publishing information, customer service and the like. However, with the development of the crawler technology, the data of the web page of the enterprise has the risk of being captured, and an anti-capture method is urgently needed to protect the data.
Currently, the most common anti-seizing techniques are mainly of the following types: robots protocol; judging whether the request is a legal request or not through access frequency, IP, user agent, token and the like; thirdly, verifying whether the request is legal or not through verification of the verification code; and (IV) verifying whether the request is legal or not through js anti-capture.
For the related technologies, the inventor thinks that in the above anti-grab technology, it is mostly necessary to verify whether the client request is legal, and the verification process consumes server resources, resulting in large consumption of server resources.
Disclosure of Invention
In order to solve the problem of high resource consumption of a server, the application provides a method and a system for preventing data capture of a webpage end and an intelligent terminal.
In a first aspect, the present application provides a method for preventing data from being captured at a web page, which adopts the following technical scheme:
a method for preventing data from being grabbed by a webpage end comprises the following steps,
acquiring a client webpage access request;
according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relations between the characters corresponding to the fonts and the character codes; and the number of the first and second groups,
and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to a requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a client browser.
By adopting the technical scheme, after the access request occurs, the characters required to be protected in the webpage data required to be accessed are replaced by the character codes corresponding to the fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the client can analyze the replaced character codes in the received first webpage data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain the second webpage data which are normally displayed, namely the second webpage data are readable, the data captured by a crawler technology and the like are the replaced first webpage data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data is protected, and the process of verifying whether the access request is a legal request by a server is reduced, thereby being beneficial to improving the problem of larger resource consumption of the server.
Optionally, the font database includes a font table and a font mapping relationship table; wherein the content of the first and second substances,
the font table stores, but is not limited to, base64 character strings, font names and font formats of each font;
the font mapping relationship table stores, but is not limited to, the correspondence between each character and the character code in each font.
By adopting the technical scheme, the information of the fonts and the corresponding relation between each character in the fonts and the character codes can be stored in the database, and when the information needs to be applied to the fonts, the information in the database is directly called, so that the method is convenient and quick.
Optionally, the font database includes more than two font relationship tables, and each font relationship table stores a base64 character string, a font name, a font format of the font, and a correspondence between characters corresponding to the font and character codes.
By adopting the technical scheme, each font and the corresponding relation between the character corresponding to the font and the character code are stored in the font relation table together, when the font needs to be applied, one font is randomly called, and the corresponding relation between the corresponding character and the character code can be obtained conveniently and quickly.
Optionally, the characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters.
By adopting the technical scheme, the character coverage is wide, and the corresponding characters of a single font are covered as much as possible, so that the required characters can be quickly found when the database is called, and the problem of high resource consumption of the server is favorably solved.
Optionally, the font of the call is random.
Optionally, the font of the call is specified.
In a second aspect, the present application provides a web page data anti-capture system, which adopts the following technical scheme:
a webpage data anti-capture system comprises,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
By adopting the technical scheme, after the webpage access request acquisition module acquires the webpage access request, the anti-capture replacement module replaces the characters required to be protected in the webpage data required to be accessed with the character codes of the corresponding fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the client can analyze the replaced character codes in the received first webpage data according to the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain the second webpage data which are normally displayed, namely the second webpage data are readable, the captured data are the first webpage data after being replaced by crawler technology and the like, the effect of protecting the webpage data is achieved, and whether the access request is a legal request is not required to be verified while the data are protected, the data can be normally displayed, the process that whether the server verifies legal requests is reduced, and the problem of high resource consumption of the server is greatly improved.
In a third aspect, the present application provides an intelligent terminal, which adopts the following technical scheme:
an intelligent terminal comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and carry out the method according to any of the first aspects.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium storing a computer program capable of being loaded by a processor and performing a method as in any one of the first aspects.
Drawings
Fig. 1 is a flowchart of a method for preventing data capture at a web page according to an embodiment of the present application.
Fig. 2 is a block diagram of a flow of font talk of a web page data anti-capture method according to an embodiment of the present application.
Fig. 3 is a first composition diagram of a font database of the webpage data anti-crawling method according to the embodiment of the present application.
Fig. 4 is a second component diagram of the font database of the webpage data anti-crawling method according to the embodiment of the present application.
Fig. 5 is a flowchart of an application scenario of the web page data anti-capture method according to the embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-5.
The embodiment of the application discloses a method for preventing data of a webpage from being grabbed. Referring to fig. 1 and 2, the method for preventing data capture at the web site includes the following steps:
101. and acquiring a client webpage access request.
102. And calling fonts in a font database according to the webpage access request, and replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of the corresponding fonts to obtain the replaced first webpage data.
The font database stores fonts and corresponding relations between characters corresponding to the fonts and character codes. And a plurality of fonts are stored in the font database, the fonts can be any font types, namely newly created fonts and existing fonts, and can be created or edited by a font editing tool.
A font may include a plurality of characters, so that a single font has a one-to-one correspondence/one-to-one mapping relationship between a plurality of characters and a plurality of character codes, and the font database may be one or more than one.
It should be noted that the font to be called may be random or designated. And the corresponding relation between the characters corresponding to the fonts and the character codes is obtained after the fonts are called.
103. And sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client.
The client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, so that the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
It should be noted that, after receiving the first web page data, the called font and the corresponding relationship between the character and the character code corresponding to the font, the client parses the character code referring to the font CSS in the first web page data into the corresponding character according to the called font and the corresponding relationship between the character and the character code corresponding to the font, and renders the parsed first web page data to obtain the second web page data normally displayed on the browser of the client.
The second web page data displayed normally refers to a combination of fonts, numbers, pictures and the like which can be directly read by a person. CSS, a cascading style sheet, is a computer language used to represent file styles such as HTML and XML. The CSS can not only statically modify the web page, but also dynamically format elements of the web page in coordination with various scripting languages. HTML is one application of the standard generic markup language, and XML is a subset of the standard generic markup language. Rendering is a computer term, and refers to a process of generating an image from a model by using software in computer drawing, and in the technical field of computer software, a process of generating a webpage with readable information such as an image, a number, a font and the like from data by using software is also called rendering.
In the implementation mode of the webpage data anti-capture method, after an access request occurs, characters required to be protected in webpage data required to be accessed are replaced by character codes corresponding to fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that a client can analyze the replaced character codes in the received first webpage data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain normally displayed second webpage data, the data captured by a crawler technology and the like are the replaced first webpage data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data are protected, and the process of verifying whether the access request is a legal request by a server is reduced, thereby being beneficial to improving the problem of larger resource consumption of the server.
Referring to fig. 2 and 3, as an embodiment of the font database, the font database includes a font table and a font mapping relationship table, the base64 character string, the font name, the font format, and the like of each font are stored in the font table of the font database, and the corresponding relationship between the character corresponding to the font and the character code is stored in the font mapping relationship table of the font database.
Referring to fig. 2 and 4, as another embodiment of the font database, the font database includes more than two font relation tables, and each font relation table includes base64 character strings of the font, font names, font formats, and mapping relations of corresponding characters and character codes.
The characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters. The character coverage is wide, the corresponding characters of a single font are covered as much as possible, so that the required characters can be quickly found when the database is called, and the problem of high resource consumption of a server is favorably solved.
Referring to fig. 5, the method for preventing web page data from being grabbed provided by the present application is applied in an actual application scenario, where the application scenario of the present embodiment includes a server and a client, and a font database is configured on the server. The method comprises the steps that a client side sends an access request to a server, the server generates webpage data according to the access request, the server immediately obtains replaced first webpage data according to a font randomly obtained from a font database and the corresponding relation of characters and character codes corresponding to the font, the obtained font, the corresponding relation of the characters and the character codes corresponding to the font and the first webpage data are sent to the client side together, the client side analyzes the replaced character codes in the first webpage data according to the received font and font corresponding relation, the analyzed first webpage data are rendered, and then second webpage data normally displayed on the client side are obtained.
The embodiment also discloses a webpage data anti-crawling system, which comprises,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
It should be noted that, after receiving the first web page data, the called font and the corresponding relationship between the character and the character code corresponding to the font, the client parses the character code referring to the font CSS in the first web page data into the corresponding character according to the called font and the corresponding relationship between the character and the character code corresponding to the font, and renders the parsed first web page data to obtain the second web page data normally displayed on the browser of the client.
The second web page data displayed normally refers to a combination of fonts, numbers, pictures and the like which can be directly read by a person. CSS, a cascading style sheet, is a computer language used to represent file styles such as HTML and XML. The CSS can not only statically modify the web page, but also dynamically format elements of the web page in coordination with various scripting languages. HTML is one application of the standard generic markup language, and XML is a subset of the standard generic markup language. Rendering is a computer term, and refers to a process of generating an image from a model by using software in computer drawing, and in the technical field of computer software, a process of generating a webpage with readable information such as an image, a number, a font and the like from data by using software is also called rendering.
In the implementation manner of the above-mentioned web page data anti-crawling system, after the web page access request acquisition module acquires the web page access request, the anti-crawling replacement module replaces the characters to be protected in the web page data requested to be accessed with the character codes of the corresponding fonts to obtain the first web page data by means of the corresponding relations between the called fonts and the characters and the character codes corresponding to the fonts, the data transmission module transmits the first web page data, the called fonts and the characters and the character codes corresponding to the fonts and the corresponding relations between the characters and the character codes to the client side together, so that the client side can analyze the replaced character codes in the received first web page data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the first web page data is rendered to obtain the second web page data which is normally displayed, and the data crawled by crawler technology and the like is the replaced first web page data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data is protected, the process of verifying whether the access request is a legal request or not by the server is reduced, and the problem of high resource consumption of the server is greatly solved.
The application discloses a system of snatching is prevented to webpage end data can prevent effectively that the reptile from analyzing the webpage and acquireing data, both can protect data and do not influence the normal demonstration of second webpage data, can prevent to a certain extent that the reptile from directly acquireing data through analyzing the webpage. And whether the client request is legal or not does not need to be verified, so that the server resources are greatly saved. The protected data on the webpage is character codes of characters (Chinese characters, numbers, letters, symbols and other data) corresponding to fonts instead of real data. In addition, because the character code corresponding to the protected data changes along with the change of the font, the cracking difficulty is high.
The embodiment also discloses an intelligent terminal which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute any one of the methods such as the webpage data anti-capture method.
The embodiment also discloses a computer readable storage medium, which stores a computer program capable of being loaded by a processor and executing any one of the methods such as the webpage-side data anti-capture method.
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.

Claims (9)

1. A method for preventing data capture at a webpage end is characterized by comprising the following steps: the anti-grabbing method comprises the following steps of,
acquiring a client webpage access request;
according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relations between the characters corresponding to the fonts and the character codes; and the number of the first and second groups,
and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to a requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a client browser.
2. The web page side data anti-grab method of claim 1, wherein: the font database comprises a font table and a font mapping relation table; wherein the content of the first and second substances,
the font table stores, but is not limited to, base64 character strings, font names and font formats of each font;
the font mapping relationship table stores, but is not limited to, the correspondence between each character and the character code in each font.
3. The web page side data anti-grab method of claim 1, wherein: the font database comprises more than two font relation tables, and each font relation table stores the base64 character string, the font name, the font format of the font and the corresponding relation between the characters corresponding to the font and the character codes.
4. The web page data anti-grab method of claim 2 or 3, wherein: the characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters.
5. The web page side data anti-grab method of claim 1, wherein: the font of the call is random.
6. The web page side data anti-grab method of claim 1, wherein: the font of the call is specified.
7. The utility model provides a webpage end data prevents snatching system which characterized in that: the anti-grab system comprises a plurality of anti-grab systems,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
8. The utility model provides an intelligent terminal which characterized in that: comprising a memory and a processor, said memory having stored thereon a computer program which can be loaded by the processor and which performs the method of any of claims 1 to 6.
9. A computer-readable storage medium characterized by: a computer program which can be loaded by a processor and which executes the method according to any of claims 1 to 6.
CN202110041088.1A 2021-01-13 2021-01-13 Webpage data anti-grabbing method and system and intelligent terminal Pending CN112711692A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110041088.1A CN112711692A (en) 2021-01-13 2021-01-13 Webpage data anti-grabbing method and system and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110041088.1A CN112711692A (en) 2021-01-13 2021-01-13 Webpage data anti-grabbing method and system and intelligent terminal

Publications (1)

Publication Number Publication Date
CN112711692A true CN112711692A (en) 2021-04-27

Family

ID=75548923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110041088.1A Pending CN112711692A (en) 2021-01-13 2021-01-13 Webpage data anti-grabbing method and system and intelligent terminal

Country Status (1)

Country Link
CN (1) CN112711692A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818108A (en) * 2016-09-13 2018-03-20 阿里巴巴集团控股有限公司 A kind of webpage rendering intent, apparatus and system
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium
CN111539025A (en) * 2020-05-07 2020-08-14 北京五八信息技术有限公司 Page display method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818108A (en) * 2016-09-13 2018-03-20 阿里巴巴集团控股有限公司 A kind of webpage rendering intent, apparatus and system
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium
CN111539025A (en) * 2020-05-07 2020-08-14 北京五八信息技术有限公司 Page display method and device, electronic equipment and storage medium
CN111898152A (en) * 2020-05-07 2020-11-06 北京五八信息技术有限公司 Page display method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104766014B (en) For detecting the method and system of malice network address
CN109033115B (en) Dynamic webpage crawler system
US8949990B1 (en) Script-based XSS vulnerability detection
CN107341395B (en) Method for intercepting reptiles
CN110602052A (en) Micro-service processing method and server
CN106897251B (en) Rich text display method and device
CN110704381A (en) Data analysis method, device and storage medium
CN104063401A (en) Webpage style address merging method and device
CN110941950B (en) Interface document generation method, device, server and storage medium
CN113761514A (en) Cloud desktop multi-factor security authentication method and system
CN112364355A (en) Method for actively discovering distributed self-built system and scanning security vulnerability
CN111309578A (en) Method and device for identifying object
KR102533070B1 (en) Method for prioritizing resources based on dependency of web resources, recording medium and device for performing the method
CN110493250A (en) A kind of WEB front-end ARCGIS resource request processing method and processing device
CN112866279A (en) Webpage security detection method, device, equipment and medium
CN112711692A (en) Webpage data anti-grabbing method and system and intelligent terminal
Rey et al. Towards a Performance Optimization of Mobile Automated Fingerprint Identification System (MAFIS) for the Philippine National Police
CN113742631B (en) CDN-based website picture anti-theft chain method
CN115643054A (en) Identity information verification method, device, server, medium and product
CN109491647A (en) A kind of online pre- anti-attack method and electronic equipment of language based on programming
CN111783006A (en) Page generation method and device, electronic equipment and computer readable medium
CN103677951A (en) Method and system for controlling executing process of JavaScript
CN110209959B (en) Information processing method and device
CN102694802A (en) Method and device for recording network access information
CN111865977A (en) Information processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination