CN112711692A - Webpage data anti-grabbing method and system and intelligent terminal - Google Patents
Webpage data anti-grabbing method and system and intelligent terminal Download PDFInfo
- Publication number
- CN112711692A CN112711692A CN202110041088.1A CN202110041088A CN112711692A CN 112711692 A CN112711692 A CN 112711692A CN 202110041088 A CN202110041088 A CN 202110041088A CN 112711692 A CN112711692 A CN 112711692A
- Authority
- CN
- China
- Prior art keywords
- font
- data
- webpage
- characters
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000013507 mapping Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 6
- 238000013481 data capture Methods 0.000 claims description 4
- 239000000126 substance Substances 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 7
- 238000009877 rendering Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 241000270322 Lepidosauria Species 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010425 computer drawing Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 241000239290 Araneae Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/103—Formatting, i.e. changing of presentation of documents
- G06F40/109—Font handling; Temporal or kinetic typography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/126—Character encoding
Abstract
The application relates to a method, a system and an intelligent terminal for preventing data from being grabbed at a webpage end, belonging to the field of computer data security; according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data; and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client. Compared with the related art, the method and the device have the effect of improving the problem of large resource consumption of the server.
Description
Technical Field
The application relates to the field of computer data security, in particular to a method and a system for preventing data of a webpage from being grabbed and an intelligent terminal.
Background
Web crawlers, also known as web spiders and web robots, are programs or scripts that automatically capture web information according to certain rules. With the rapid development of networks, the world wide web becomes a carrier of a large amount of information, and more enterprises establish own websites for publicizing products, publishing information, customer service and the like. However, with the development of the crawler technology, the data of the web page of the enterprise has the risk of being captured, and an anti-capture method is urgently needed to protect the data.
Currently, the most common anti-seizing techniques are mainly of the following types: robots protocol; judging whether the request is a legal request or not through access frequency, IP, user agent, token and the like; thirdly, verifying whether the request is legal or not through verification of the verification code; and (IV) verifying whether the request is legal or not through js anti-capture.
For the related technologies, the inventor thinks that in the above anti-grab technology, it is mostly necessary to verify whether the client request is legal, and the verification process consumes server resources, resulting in large consumption of server resources.
Disclosure of Invention
In order to solve the problem of high resource consumption of a server, the application provides a method and a system for preventing data capture of a webpage end and an intelligent terminal.
In a first aspect, the present application provides a method for preventing data from being captured at a web page, which adopts the following technical scheme:
a method for preventing data from being grabbed by a webpage end comprises the following steps,
acquiring a client webpage access request;
according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relations between the characters corresponding to the fonts and the character codes; and the number of the first and second groups,
and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to a requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a client browser.
By adopting the technical scheme, after the access request occurs, the characters required to be protected in the webpage data required to be accessed are replaced by the character codes corresponding to the fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the client can analyze the replaced character codes in the received first webpage data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain the second webpage data which are normally displayed, namely the second webpage data are readable, the data captured by a crawler technology and the like are the replaced first webpage data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data is protected, and the process of verifying whether the access request is a legal request by a server is reduced, thereby being beneficial to improving the problem of larger resource consumption of the server.
Optionally, the font database includes a font table and a font mapping relationship table; wherein the content of the first and second substances,
the font table stores, but is not limited to, base64 character strings, font names and font formats of each font;
the font mapping relationship table stores, but is not limited to, the correspondence between each character and the character code in each font.
By adopting the technical scheme, the information of the fonts and the corresponding relation between each character in the fonts and the character codes can be stored in the database, and when the information needs to be applied to the fonts, the information in the database is directly called, so that the method is convenient and quick.
Optionally, the font database includes more than two font relationship tables, and each font relationship table stores a base64 character string, a font name, a font format of the font, and a correspondence between characters corresponding to the font and character codes.
By adopting the technical scheme, each font and the corresponding relation between the character corresponding to the font and the character code are stored in the font relation table together, when the font needs to be applied, one font is randomly called, and the corresponding relation between the corresponding character and the character code can be obtained conveniently and quickly.
Optionally, the characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters.
By adopting the technical scheme, the character coverage is wide, and the corresponding characters of a single font are covered as much as possible, so that the required characters can be quickly found when the database is called, and the problem of high resource consumption of the server is favorably solved.
Optionally, the font of the call is random.
Optionally, the font of the call is specified.
In a second aspect, the present application provides a web page data anti-capture system, which adopts the following technical scheme:
a webpage data anti-capture system comprises,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
By adopting the technical scheme, after the webpage access request acquisition module acquires the webpage access request, the anti-capture replacement module replaces the characters required to be protected in the webpage data required to be accessed with the character codes of the corresponding fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the client can analyze the replaced character codes in the received first webpage data according to the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain the second webpage data which are normally displayed, namely the second webpage data are readable, the captured data are the first webpage data after being replaced by crawler technology and the like, the effect of protecting the webpage data is achieved, and whether the access request is a legal request is not required to be verified while the data are protected, the data can be normally displayed, the process that whether the server verifies legal requests is reduced, and the problem of high resource consumption of the server is greatly improved.
In a third aspect, the present application provides an intelligent terminal, which adopts the following technical scheme:
an intelligent terminal comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and carry out the method according to any of the first aspects.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium storing a computer program capable of being loaded by a processor and performing a method as in any one of the first aspects.
Drawings
Fig. 1 is a flowchart of a method for preventing data capture at a web page according to an embodiment of the present application.
Fig. 2 is a block diagram of a flow of font talk of a web page data anti-capture method according to an embodiment of the present application.
Fig. 3 is a first composition diagram of a font database of the webpage data anti-crawling method according to the embodiment of the present application.
Fig. 4 is a second component diagram of the font database of the webpage data anti-crawling method according to the embodiment of the present application.
Fig. 5 is a flowchart of an application scenario of the web page data anti-capture method according to the embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-5.
The embodiment of the application discloses a method for preventing data of a webpage from being grabbed. Referring to fig. 1 and 2, the method for preventing data capture at the web site includes the following steps:
101. and acquiring a client webpage access request.
102. And calling fonts in a font database according to the webpage access request, and replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of the corresponding fonts to obtain the replaced first webpage data.
The font database stores fonts and corresponding relations between characters corresponding to the fonts and character codes. And a plurality of fonts are stored in the font database, the fonts can be any font types, namely newly created fonts and existing fonts, and can be created or edited by a font editing tool.
A font may include a plurality of characters, so that a single font has a one-to-one correspondence/one-to-one mapping relationship between a plurality of characters and a plurality of character codes, and the font database may be one or more than one.
It should be noted that the font to be called may be random or designated. And the corresponding relation between the characters corresponding to the fonts and the character codes is obtained after the fonts are called.
103. And sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client.
The client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, so that the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
It should be noted that, after receiving the first web page data, the called font and the corresponding relationship between the character and the character code corresponding to the font, the client parses the character code referring to the font CSS in the first web page data into the corresponding character according to the called font and the corresponding relationship between the character and the character code corresponding to the font, and renders the parsed first web page data to obtain the second web page data normally displayed on the browser of the client.
The second web page data displayed normally refers to a combination of fonts, numbers, pictures and the like which can be directly read by a person. CSS, a cascading style sheet, is a computer language used to represent file styles such as HTML and XML. The CSS can not only statically modify the web page, but also dynamically format elements of the web page in coordination with various scripting languages. HTML is one application of the standard generic markup language, and XML is a subset of the standard generic markup language. Rendering is a computer term, and refers to a process of generating an image from a model by using software in computer drawing, and in the technical field of computer software, a process of generating a webpage with readable information such as an image, a number, a font and the like from data by using software is also called rendering.
In the implementation mode of the webpage data anti-capture method, after an access request occurs, characters required to be protected in webpage data required to be accessed are replaced by character codes corresponding to fonts by means of the called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that a client can analyze the replaced character codes in the received first webpage data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, the first webpage data are rendered to obtain normally displayed second webpage data, the data captured by a crawler technology and the like are the replaced first webpage data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data are protected, and the process of verifying whether the access request is a legal request by a server is reduced, thereby being beneficial to improving the problem of larger resource consumption of the server.
Referring to fig. 2 and 3, as an embodiment of the font database, the font database includes a font table and a font mapping relationship table, the base64 character string, the font name, the font format, and the like of each font are stored in the font table of the font database, and the corresponding relationship between the character corresponding to the font and the character code is stored in the font mapping relationship table of the font database.
Referring to fig. 2 and 4, as another embodiment of the font database, the font database includes more than two font relation tables, and each font relation table includes base64 character strings of the font, font names, font formats, and mapping relations of corresponding characters and character codes.
The characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters. The character coverage is wide, the corresponding characters of a single font are covered as much as possible, so that the required characters can be quickly found when the database is called, and the problem of high resource consumption of a server is favorably solved.
Referring to fig. 5, the method for preventing web page data from being grabbed provided by the present application is applied in an actual application scenario, where the application scenario of the present embodiment includes a server and a client, and a font database is configured on the server. The method comprises the steps that a client side sends an access request to a server, the server generates webpage data according to the access request, the server immediately obtains replaced first webpage data according to a font randomly obtained from a font database and the corresponding relation of characters and character codes corresponding to the font, the obtained font, the corresponding relation of the characters and the character codes corresponding to the font and the first webpage data are sent to the client side together, the client side analyzes the replaced character codes in the first webpage data according to the received font and font corresponding relation, the analyzed first webpage data are rendered, and then second webpage data normally displayed on the client side are obtained.
The embodiment also discloses a webpage data anti-crawling system, which comprises,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
It should be noted that, after receiving the first web page data, the called font and the corresponding relationship between the character and the character code corresponding to the font, the client parses the character code referring to the font CSS in the first web page data into the corresponding character according to the called font and the corresponding relationship between the character and the character code corresponding to the font, and renders the parsed first web page data to obtain the second web page data normally displayed on the browser of the client.
The second web page data displayed normally refers to a combination of fonts, numbers, pictures and the like which can be directly read by a person. CSS, a cascading style sheet, is a computer language used to represent file styles such as HTML and XML. The CSS can not only statically modify the web page, but also dynamically format elements of the web page in coordination with various scripting languages. HTML is one application of the standard generic markup language, and XML is a subset of the standard generic markup language. Rendering is a computer term, and refers to a process of generating an image from a model by using software in computer drawing, and in the technical field of computer software, a process of generating a webpage with readable information such as an image, a number, a font and the like from data by using software is also called rendering.
In the implementation manner of the above-mentioned web page data anti-crawling system, after the web page access request acquisition module acquires the web page access request, the anti-crawling replacement module replaces the characters to be protected in the web page data requested to be accessed with the character codes of the corresponding fonts to obtain the first web page data by means of the corresponding relations between the called fonts and the characters and the character codes corresponding to the fonts, the data transmission module transmits the first web page data, the called fonts and the characters and the character codes corresponding to the fonts and the corresponding relations between the characters and the character codes to the client side together, so that the client side can analyze the replaced character codes in the received first web page data according to the received called fonts and the corresponding relations between the characters and the character codes corresponding to the fonts, so that the first web page data is rendered to obtain the second web page data which is normally displayed, and the data crawled by crawler technology and the like is the replaced first web page data, the effect of protecting the webpage data is achieved, the data can be normally displayed without verifying whether the access request is a legal request or not while the data is protected, the process of verifying whether the access request is a legal request or not by the server is reduced, and the problem of high resource consumption of the server is greatly solved.
The application discloses a system of snatching is prevented to webpage end data can prevent effectively that the reptile from analyzing the webpage and acquireing data, both can protect data and do not influence the normal demonstration of second webpage data, can prevent to a certain extent that the reptile from directly acquireing data through analyzing the webpage. And whether the client request is legal or not does not need to be verified, so that the server resources are greatly saved. The protected data on the webpage is character codes of characters (Chinese characters, numbers, letters, symbols and other data) corresponding to fonts instead of real data. In addition, because the character code corresponding to the protected data changes along with the change of the font, the cracking difficulty is high.
The embodiment also discloses an intelligent terminal which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute any one of the methods such as the webpage data anti-capture method.
The embodiment also discloses a computer readable storage medium, which stores a computer program capable of being loaded by a processor and executing any one of the methods such as the webpage-side data anti-capture method.
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are preferred embodiments of the present application, and the protection scope of the present application is not limited by the above embodiments, so: all equivalent changes made according to the structure, shape and principle of the present application shall be covered by the protection scope of the present application.
Claims (9)
1. A method for preventing data capture at a webpage end is characterized by comprising the following steps: the anti-grabbing method comprises the following steps of,
acquiring a client webpage access request;
according to the webpage access request, calling fonts in a font database, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relations between the characters corresponding to the fonts and the character codes; and the number of the first and second groups,
and sending the first webpage data, the called font and the corresponding relation between the characters and the character codes corresponding to the font to a requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a client browser.
2. The web page side data anti-grab method of claim 1, wherein: the font database comprises a font table and a font mapping relation table; wherein the content of the first and second substances,
the font table stores, but is not limited to, base64 character strings, font names and font formats of each font;
the font mapping relationship table stores, but is not limited to, the correspondence between each character and the character code in each font.
3. The web page side data anti-grab method of claim 1, wherein: the font database comprises more than two font relation tables, and each font relation table stores the base64 character string, the font name, the font format of the font and the corresponding relation between the characters corresponding to the font and the character codes.
4. The web page data anti-grab method of claim 2 or 3, wherein: the characters include, but are not limited to, data such as chinese characters, numbers, symbols, and letters.
5. The web page side data anti-grab method of claim 1, wherein: the font of the call is random.
6. The web page side data anti-grab method of claim 1, wherein: the font of the call is specified.
7. The utility model provides a webpage end data prevents snatching system which characterized in that: the anti-grab system comprises a plurality of anti-grab systems,
the webpage access request acquisition module is used for acquiring a client webpage access request;
the anti-capture replacement module is used for calling fonts in a font database according to the webpage access request, replacing characters needing to be protected in the webpage data which is requested to be accessed with character codes of corresponding fonts to obtain replaced first webpage data, wherein the font database stores the fonts and the corresponding relation between each character in the fonts and the character codes; and the number of the first and second groups,
and the data sending module is used for sending the first webpage data, the called font and the corresponding relation between the characters corresponding to the font and the character codes to the requesting client so that the client can analyze the replaced character codes according to the corresponding relation between the characters and the character codes, and the client can successfully render the first webpage data to obtain second webpage data normally displayed on a browser of the client.
8. The utility model provides an intelligent terminal which characterized in that: comprising a memory and a processor, said memory having stored thereon a computer program which can be loaded by the processor and which performs the method of any of claims 1 to 6.
9. A computer-readable storage medium characterized by: a computer program which can be loaded by a processor and which executes the method according to any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110041088.1A CN112711692A (en) | 2021-01-13 | 2021-01-13 | Webpage data anti-grabbing method and system and intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110041088.1A CN112711692A (en) | 2021-01-13 | 2021-01-13 | Webpage data anti-grabbing method and system and intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112711692A true CN112711692A (en) | 2021-04-27 |
Family
ID=75548923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110041088.1A Pending CN112711692A (en) | 2021-01-13 | 2021-01-13 | Webpage data anti-grabbing method and system and intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112711692A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818108A (en) * | 2016-09-13 | 2018-03-20 | 阿里巴巴集团控股有限公司 | A kind of webpage rendering intent, apparatus and system |
CN110166465A (en) * | 2019-05-27 | 2019-08-23 | 北京达佳互联信息技术有限公司 | Processing method, device, server and the storage medium of access request |
CN111008348A (en) * | 2019-11-28 | 2020-04-14 | 盛业信息科技服务(深圳)有限公司 | Anti-crawler method, terminal, server and computer readable storage medium |
CN111539025A (en) * | 2020-05-07 | 2020-08-14 | 北京五八信息技术有限公司 | Page display method and device, electronic equipment and storage medium |
-
2021
- 2021-01-13 CN CN202110041088.1A patent/CN112711692A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107818108A (en) * | 2016-09-13 | 2018-03-20 | 阿里巴巴集团控股有限公司 | A kind of webpage rendering intent, apparatus and system |
CN110166465A (en) * | 2019-05-27 | 2019-08-23 | 北京达佳互联信息技术有限公司 | Processing method, device, server and the storage medium of access request |
CN111008348A (en) * | 2019-11-28 | 2020-04-14 | 盛业信息科技服务(深圳)有限公司 | Anti-crawler method, terminal, server and computer readable storage medium |
CN111539025A (en) * | 2020-05-07 | 2020-08-14 | 北京五八信息技术有限公司 | Page display method and device, electronic equipment and storage medium |
CN111898152A (en) * | 2020-05-07 | 2020-11-06 | 北京五八信息技术有限公司 | Page display method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104766014B (en) | For detecting the method and system of malice network address | |
CN109033115B (en) | Dynamic webpage crawler system | |
US8949990B1 (en) | Script-based XSS vulnerability detection | |
CN107341395B (en) | Method for intercepting reptiles | |
CN110602052A (en) | Micro-service processing method and server | |
CN106897251B (en) | Rich text display method and device | |
CN110704381A (en) | Data analysis method, device and storage medium | |
CN104063401A (en) | Webpage style address merging method and device | |
CN110941950B (en) | Interface document generation method, device, server and storage medium | |
CN113761514A (en) | Cloud desktop multi-factor security authentication method and system | |
CN112364355A (en) | Method for actively discovering distributed self-built system and scanning security vulnerability | |
CN111309578A (en) | Method and device for identifying object | |
KR102533070B1 (en) | Method for prioritizing resources based on dependency of web resources, recording medium and device for performing the method | |
CN110493250A (en) | A kind of WEB front-end ARCGIS resource request processing method and processing device | |
CN112866279A (en) | Webpage security detection method, device, equipment and medium | |
CN112711692A (en) | Webpage data anti-grabbing method and system and intelligent terminal | |
Rey et al. | Towards a Performance Optimization of Mobile Automated Fingerprint Identification System (MAFIS) for the Philippine National Police | |
CN113742631B (en) | CDN-based website picture anti-theft chain method | |
CN115643054A (en) | Identity information verification method, device, server, medium and product | |
CN109491647A (en) | A kind of online pre- anti-attack method and electronic equipment of language based on programming | |
CN111783006A (en) | Page generation method and device, electronic equipment and computer readable medium | |
CN103677951A (en) | Method and system for controlling executing process of JavaScript | |
CN110209959B (en) | Information processing method and device | |
CN102694802A (en) | Method and device for recording network access information | |
CN111865977A (en) | Information processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |