CN112966277A - Webpage protection method and device, computer equipment and storage medium - Google Patents

Webpage protection method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112966277A
CN112966277A CN202011492072.4A CN202011492072A CN112966277A CN 112966277 A CN112966277 A CN 112966277A CN 202011492072 A CN202011492072 A CN 202011492072A CN 112966277 A CN112966277 A CN 112966277A
Authority
CN
China
Prior art keywords
watermark
target
client
webpage data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011492072.4A
Other languages
Chinese (zh)
Inventor
黄楠
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Yizhang Information Technology Co ltd
Original Assignee
Nanjing Yizhang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yizhang Information Technology Co ltd filed Critical Nanjing Yizhang Information Technology Co ltd
Priority to CN202011492072.4A priority Critical patent/CN112966277A/en
Publication of CN112966277A publication Critical patent/CN112966277A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a webpage protection method, a webpage protection device, webpage protection equipment and a storage medium. The method comprises the following steps: receiving an access request sent by a client, wherein the access request comprises a target access address; under the condition that the client has access authority to the target access address, acquiring original webpage data from the target access address; carrying out watermark protection processing on the original webpage data to generate target webpage data; and sending the target webpage data to the client. The embodiment of the invention can provide effective protection for the webpage data in the third-party server and avoid the webpage data from being randomly acquired, spread or abused, thereby improving the safety of the webpage data.

Description

Webpage protection method and device, computer equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a webpage protection method and device, computer equipment and a storage medium.
Background
Along with the rapid development of mobile office, enterprise employees can more and more rapidly acquire internal files of enterprises through mobile equipment, and store, look up and forward the files anytime and anywhere, so that the working efficiency is greatly improved. Meanwhile, the phenomenon that internal files of the enterprise are revealed by means of screen capture or screen recording at the mobile equipment end is more serious. For this problem, most enterprises have implemented security measures such as virus protection and identity authentication on data circulated inside the enterprise to protect the internal data from being leaked, but there are inevitable some third-party servers that do not protect the data provided by the third-party servers.
Disclosure of Invention
Embodiments of the present invention provide a method and an apparatus for protecting a web page, a computer device, and a storage medium, which provide effective protection for web page data in a third-party server, and avoid random acquisition, propagation, or misuse of the web page data, thereby improving security of the web page data.
In a first aspect, an embodiment of the present invention provides a method for protecting a web page, including:
receiving an access request sent by a client, wherein the access request comprises a target access address;
under the condition that the client has access authority to the target access address, acquiring original webpage data from the target access address;
carrying out watermark protection processing on the original webpage data to generate target webpage data;
and sending the target webpage data to the client.
In a second aspect, an embodiment of the present invention further provides a web page protection apparatus, including:
the access request receiving module is used for receiving an access request sent by a client, wherein the access request comprises a target access address;
the original webpage data acquisition module is used for acquiring original webpage data from the target access address under the condition that the client has access authority to the target access address;
the target webpage data generating module is used for carrying out watermark protection processing on the original webpage data to generate target webpage data;
and the webpage data sending module is used for sending the target webpage data to the client.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the web page protection method provided by any embodiment of the invention.
In a fourth aspect, an embodiment of the present invention further provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for protecting a web page provided in any embodiment of the present invention.
According to the embodiment of the invention, the access right of the client is identified when the access request of the client to the third-party server is received, the third-party server is accessed in an agent manner to obtain the webpage data requested by the client under the condition that the client is determined to have the access right, and the watermark protection processing is carried out on the webpage data before the webpage data are returned to the client, so that the right control of the client to access the third-party server is realized, meanwhile, the webpage obtained and displayed by the client has traceability under the condition that the third-party server is not required to be modified, effective protection is provided for the webpage data in the third-party server, the webpage data are prevented from being randomly obtained, spread or abused, and the safety of the webpage data is improved.
Drawings
Fig. 1 is a flowchart of a web page protection method according to an embodiment of the present invention.
Fig. 2 is a flowchart of a web page protection method according to a second embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a web page protection apparatus according to a third embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention.
It should be further noted that, for the convenience of description, only some but not all of the relevant aspects of the present invention are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 1 is a flowchart of a web page protection method according to an embodiment of the present invention, where this embodiment is applicable to a case where it is ensured that a web page is not acquired by an unauthorized client and the acquired web page is protected from a watermark, and this method may be executed by a web page protection apparatus provided in an embodiment of the present invention, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a computer device. Accordingly, as shown in fig. 1, the method comprises the following operations:
and S110, receiving an access request sent by the client.
Wherein, the access request comprises a target access address.
Specifically, the client may be a client of any application installed on the user terminal device. The access request can be a retrieval request for any web page provided by any server triggered by a user when using a client. The target access address may be an address of a web page that the user requests to retrieve.
Correspondingly, when the user uses the client on the terminal device, the user can trigger the acquisition request of any webpage, and the client can send the corresponding access request to the server. The access request may include a target access address corresponding to the web page, and the server for providing the web page may be accessed and web page data returned by the server may be acquired according to the target access address in the access request.
S120, under the condition that the client has the access right to the target access address, acquiring original webpage data from the target access address.
The access authority of the client to any target access address can be preset, and the access authority is used for ensuring that the webpage data is not acquired by the client without the authority. The original webpage data can be codes of webpages requested to be acquired by users through clients and can be provided by the server.
Correspondingly, the user can set the access rights of different clients in advance according to the requirements on data protection, for example, the access rights of the clients in the blacklist can be set to have no access rights to any target access address by setting a client blacklist and/or a white list, and/or the access rights of the clients in the white list can be set to have access rights to any target access address; and the access right setting and the like can be respectively carried out on the clients which are likely to generate the interaction. The embodiment of the invention does not limit the access authority setting of the client. After receiving the access request of the client, whether the client has the access right to the target access address in the access request can be judged according to the preset client access right.
For example, an enterprise data manager may preset an enterprise instant messaging client used in an enterprise to access a server providing an enterprise internal web page, and an employee personal instant messaging client and other communication application clients may not access the server, so as to ensure that enterprise employees can only browse the enterprise internal web page through the preset enterprise instant messaging client.
Further, under the condition that the client has the access right to the target access address, the corresponding server can be accessed according to the target access address, and the access request can be forwarded to the server to acquire the original webpage data returned by the server. The original webpage data can be webpage codes provided by the server, and the client can display the corresponding webpage on the display device of the user terminal device by running the original webpage data.
S130, performing watermark protection processing on the original webpage data to generate target webpage data.
The watermark protection process may be a process of adding watermark data to the original web page data. The target webpage data can be original webpage data successfully processed by watermark protection, and can be original webpage data with watermark marking data.
Correspondingly, the target webpage data can be obtained by successfully carrying out watermark protection processing on the original webpage data, so that after the target webpage data is operated by the client, the webpage displayed on the display device of the terminal device can be the webpage with the watermark and the original content of the webpage is not changed. Optionally, the original webpage data is subjected to watermark protection processing, which may be adding a watermark display script in the original webpage data to generate target webpage data. Specifically, the client may execute the watermark display script and display the corresponding watermark on the display device of the user terminal device.
S140, sending the target webpage data to the client.
Correspondingly, after receiving the target webpage data, the client can operate the codes in the target webpage data so as to display the watermark and the original webpage on the display equipment of the user terminal equipment in an overlapping manner, and the webpage with the watermark is provided for the user.
The embodiment of the invention provides a webpage protection method, which is characterized in that when an access request of a client to a third-party server is received, the access right of the client is identified, under the condition that the client has the access right, the third-party server is accessed in an agent mode to obtain webpage data requested by the client, and before the webpage data are returned to the client, the watermark protection processing is carried out on the webpage data, so that the right of the client to access the third-party server is controlled, meanwhile, under the condition that the third-party server is not required to be modified, the webpage obtained and displayed by the client has traceability, effective protection is provided for the webpage data in the third-party server, the webpage data are prevented from being obtained, spread or abused at will, and the safety of the webpage data is improved.
Example two
Fig. 2 is a flowchart of a web page protection method according to a second embodiment of the present invention. The embodiment of the present invention is embodied on the basis of the above-described embodiment, and in the embodiment of the present invention, a specific optional implementation manner is provided for performing watermark protection processing on the original webpage data, generating target webpage data, and preventing the watermark presentation script from being modified by the client.
As shown in fig. 2, the method of the embodiment of the present invention specifically includes:
s210, receiving an access request sent by a client.
Wherein, the access request comprises a target access address.
In an optional embodiment of the present invention, before receiving the access request sent by the client, the method further includes: receiving login information of a client; and acquiring target authority configuration information of the client in a preset access authority configuration rule according to the login information.
The login information may be information sent when the client requests to establish the communication connection, and may include any information that may function as a client identifier, for example, may be identity information of the client. The preset access right configuration rule may include a rule for configuring access rights for different clients, and may be preset and stored by a user according to a data protection requirement. The target authority configuration information of the client may include information whether the client has an access authority to a different target access address.
Accordingly, before the client sends the access request through network data communication, the communication connection can be established by sending login information. The identity of the client can be identified according to the login information, so that corresponding target authority configuration information is obtained in a preset access authority configuration rule, when an access request of the client is received, whether the client has access authority to a target access address in the access request can be judged according to the target authority configuration information, and whether the access request can be allowed or not is determined.
Illustratively, if the client sending the access request is determined to be a nailing client according to the login information of the client, the client can jump to a preset intermediate page, the intermediate page can introduce a nailing JSSDK to perform authentication interaction with a nail according to a preset access authority configuration rule, and if the authentication is successful, a valid bill can be obtained, the access request sent by the client can be received, so that the original webpage data can be obtained from a third-party server according to the access request. The preset access authority configuration rule in the authentication interaction can be a standard flow provided by nailing, and can be performed only at a nailing client side, so that the authentication interaction process is ensured safely.
The above embodiment obtains the target authority configuration information after receiving the login information of the client, so that when receiving the access request of the client, whether the access request is allowed or not can be determined according to the access authority of the client, the authority control of the client to access the server is realized, and the webpage provided by the server is ensured not to be obtained by the client without the authority.
S220, under the condition that the client has the access right to the target access address, acquiring original webpage data from the target access address.
In an optional embodiment of the present invention, the acquiring original webpage data from the target access address includes: sending the access request to a target third-party server; receiving response data fed back by the target third-party server aiming at the access request; and taking the response data as the original webpage data.
The target third-party server may be a server for providing a web page requested to be acquired by the client. The response data may be the code of the web page that the client requested to retrieve.
Correspondingly, under the condition that the client side is determined to have the access right to the target access address, the access request can be determined to be allowed, and then the target third-party server can be determined according to the target access address in the access request. And forwarding the access request to the target third-party server, so that the target third-party server can determine and feed back response data corresponding to the access request according to the relevant parameters in the access request. The response data may be web page code provided directly by the target third party server without any processing, and may be raw web page data.
In the embodiment, under the condition that the access request is allowed, the proxy client can send the access request to the target third-party server and acquire the original webpage data fed back by the server so as to finish the watermark protection processing before the client acquires the webpage.
And S230, performing watermark protection processing on the original webpage data to generate target webpage data.
In an optional embodiment of the present invention, S230 may specifically include:
and S231, generating a watermark display script corresponding to the client.
The watermark presentation script may be a code that can be executed by the client, and may include an instruction for setting watermark content or a watermark format and a watermark presentation instruction, so that the client may generate a watermark and present the watermark on a display device of the user terminal device by executing the watermark presentation script. The watermark showing script corresponding to the client may include a code for setting the watermark content and/or the watermark format according to the client, so that the watermark content and/or the watermark format generated and shown by the client executing the watermark showing script may correspond to the client.
In an optional embodiment of the invention, the access request further comprises: a user identification of the client; the generating of the watermark presentation script corresponding to the client may include: acquiring user information and user watermark configuration information according to the user identification in the access request; and generating a watermark display script according to the user information and the user watermark configuration information.
And the client is used for generating the target watermark identification according to the watermark display script.
Specifically, the user identifier may be any information that serves to identify a user logged in the client, and may be, for example, a user account. The user information may be personal information stored in the client server by the user through the client, and may be a user name, a personal signature, and the like. The user watermark configuration information may be watermark format description information that is set by the user through the client and stored in the client server, and may be, for example, a watermark font, a watermark color, a watermark display position, and the like. The user identification, the user information and the user watermark configuration information can be correspondingly stored in a server corresponding to the client.
Correspondingly, after the user identifier in the access request is obtained, the server corresponding to the client can be accessed, and the user information and the user watermark configuration information which are stored in correspondence to the user identifier are inquired, so that the user information can be used as a parameter of a watermark content setting instruction in the watermark display script, the user watermark configuration information can be used as a parameter of a watermark format setting instruction in the watermark display script, and the watermark display script corresponding to the client is generated. For example, in the above example of performing authentication interaction on the stapling client, the user information of the stapling client user may be acquired after the authentication is passed.
In the embodiment, the user information and the user watermark configuration information are inquired from the server corresponding to the client by acquiring the user identifier in the access request, so that the validity and the identifiability of the watermark content are realized, and the personalized customization of the watermark format is realized.
And S232, adding the watermark display script to the initial position of the original webpage data.
The starting position of the original network data may be a position that is read and operated first when the client executes the original network data, and may be, for example, the beginning of a web page code.
Correspondingly, the initial position of the original webpage data can be determined, and the watermark display script is inserted into the initial position.
And S233, generating the target webpage data according to the watermark display script and the original webpage data.
And the client is used for generating a target watermark identifier according to the watermark display script and generating a target webpage according to the target watermark identifier and the original webpage data.
Specifically, the target watermark identification may be a watermark whose content is user information and whose format is preset by a user. The target webpage can be a webpage displayed to the user by overlapping the original webpage and the target watermark identification.
Correspondingly, when the client runs the target webpage data, the watermark display script in the target webpage data can be executed firstly to generate a target watermark identifier, and after the target webpage data is completely run, the target watermark identifier and the original webpage are displayed on the display device of the user terminal device in an overlapping mode to generate the target webpage.
In the embodiment, the target webpage data is generated by generating the watermark display script corresponding to the client and adding the watermark display script to the initial position of the original webpage data, so that the client can preferentially execute the watermark display script when running the target webpage data, the original webpage data or other programs in the client are prevented from stopping the execution of the watermark display script, the target watermark identification can be ensured to be displayed to a user in a superposition manner with the original webpage, and the success rate of performing watermark protection processing on the webpage is ensured.
In an optional embodiment of the present invention, the watermark exhibiting script is configured to monitor a watermark removal event when being executed by the client, and restart the watermark exhibiting script when it is determined that the target watermark identifier is removed by the watermark removal event, so as to generate the target watermark identifier again according to the watermark exhibiting script.
The watermark removal event may be an action of the client performing illegal removal on the target watermark identifier, and optionally, the watermark removal event may include a removal event of a DOM (Document Object Model) corresponding to the target watermark identifier and child nodes thereof.
Correspondingly, the watermark display script may monitor a watermark removal event corresponding to the target watermark identifier, for example, the watermark removal event corresponding to the target watermark identifier may be monitored by using the MutationObserver class and DOM's observer method, and restarted when the watermark removal event is determined to occur, so that the client regenerates and displays the target watermark identifier.
In the embodiment, by monitoring the watermark removal event, the watermark can be immediately recreated when the watermark is removed, so that the watermark is prevented from being illegally removed, and the webpage can be protected by the watermark.
S240, adding a packaging protection script in the target webpage data.
And the packaging protection script is used for forbidding the client to modify the watermark display script.
Optionally, the package protection script may be Hook (Hook function) injection code to inject the code in the client, and the interception may be stopped when the client executes any script that modifies the target web page data. For example, the package protection script may package and protect a watermark removal event monitoring method of the watermark presentation script, first obtain definitions of a MutationObserver class and an observer method at the first time when a web page is opened, ensure that the two methods used subsequently are native implementations, and ensure that any code executed later cannot tamper with the original chain by using a defineProperty resetting method as a read-only property.
In the embodiment, the encapsulation protection script is added in the target webpage data, so that other running codes in the client cannot tamper the watermark display script, and the reinforcement of the target watermark identification, the content and the format thereof is realized.
And S250, sending the target webpage data to the client.
The embodiment of the invention provides a webpage protection method, which is characterized in that when an access request of a client to a third-party server is received, the access right of the client is identified, under the condition that the client has the access right, the third-party server is accessed in an agent manner to obtain webpage data requested by the client, and before the webpage data is returned to the client, the watermark protection processing is carried out on the webpage data, so that the right control of the client to access the third-party server is realized, meanwhile, under the condition that the third-party server is not required to be modified, the webpage obtained and displayed by the client has traceability, effective protection is provided for the webpage data in the third-party server, the webpage data is prevented from being obtained, spread or abused randomly, and the safety of the webpage data is improved; furthermore, by monitoring a watermark removal event and adding a package protection script, the watermark is prevented from being illegally removed or tampered, the watermark is reinforced, and the webpage can be further ensured to be in the protection of the target watermark identification.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a web page protection device according to a third embodiment of the present invention, and as shown in fig. 3, the device includes: an access request receiving module 310, an original webpage data obtaining module 320, a target webpage data generating module 330 and a webpage data transmitting module 340.
The access request receiving module 310 is configured to receive an access request sent by a client, where the access request includes a target access address.
And the original webpage data acquiring module 320 is configured to acquire original webpage data from the target access address when it is determined that the client has an access right to the target access address.
And the target webpage data generating module 330 is configured to perform watermark protection processing on the original webpage data to generate target webpage data.
A web page data sending module 340, configured to send the target web page data to the client.
In an optional implementation manner of the embodiment of the present invention, the original webpage data obtaining module 320 is specifically configured to: sending the access request to a target third-party server; receiving response data fed back by the target third-party server aiming at the access request; and taking the response data as the original webpage data.
In an optional implementation manner of the embodiment of the present invention, the target webpage data generating module 330 includes: the watermark display script generation submodule is used for generating a watermark display script corresponding to the client; the watermark display script adding submodule is used for adding the watermark display script to the initial position of the original webpage data; a target webpage data generating submodule for generating the target webpage data according to the watermark display script and the original webpage data; and the client is used for generating a target watermark identifier according to the watermark display script and generating a target webpage according to the target watermark identifier and the original webpage data.
In an optional implementation manner of the embodiment of the present invention, the access request further includes: a user identification of the client; the watermark display script generation submodule is specifically configured to: acquiring user information and user watermark configuration information according to the user identification in the access request; generating a watermark display script according to the user information and the user watermark configuration information; and the client is used for generating the target watermark identification according to the watermark display script.
In an optional implementation manner of the embodiment of the present invention, the watermark exhibiting script is configured to monitor a watermark removal event when being executed by the client, and restart the watermark exhibiting script when it is determined that the target watermark identifier is removed by the watermark removal event, so as to generate the target watermark identifier again according to the watermark exhibiting script.
In an optional implementation of the embodiment of the present invention, the apparatus further comprises: and the package protection script adding module is used for adding a package protection script in the target webpage data, wherein the package protection script is used for forbidding the client to modify the watermark display script.
In an optional implementation of the embodiment of the present invention, the apparatus further comprises: the login information receiving module is used for receiving login information of the client; and the right configuration information acquisition module is used for acquiring the target right configuration information of the client in a preset access right configuration rule according to the login information.
The device can execute the webpage protection method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the webpage protection method.
The embodiment of the invention provides a webpage protection device, which identifies the access authority of a client when receiving an access request of the client to a third-party server, performs proxy access to the third-party server to obtain webpage data requested by the client under the condition of determining that the client has the access authority, and performs watermark protection processing on the webpage data before returning the webpage data to the client, so that the authority control of the client to access the third-party server is realized, meanwhile, the webpage obtained and displayed by the client has traceability under the condition of not modifying the third-party server, effective protection is provided for the webpage data in the third-party server, the webpage data are prevented from being randomly obtained, spread or abused, and the safety of the webpage data is improved.
Example four
Fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention. FIG. 4 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in FIG. 4 is only one example and should not bring any limitations to the functionality or scope of use of embodiments of the present invention.
As shown in FIG. 4, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors 16, a memory 28, and a bus 18 that connects the various system components (including the memory 28 and the processors 16).
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, and commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 16 executes various functional applications and data processing by running the program stored in the memory 28, so as to implement the web page protection method provided by the embodiment of the present invention: receiving an access request sent by a client, wherein the access request comprises a target access address; under the condition that the client has access authority to the target access address, acquiring original webpage data from the target access address; carrying out watermark protection processing on the original webpage data to generate target webpage data; and sending the target webpage data to the client.
EXAMPLE five
Fifth, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for protecting a web page provided in the embodiment of the present invention is implemented: receiving an access request sent by a client, wherein the access request comprises a target access address; under the condition that the client has access authority to the target access address, acquiring original webpage data from the target access address; carrying out watermark protection processing on the original webpage data to generate target webpage data; and sending the target webpage data to the client.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or computer device. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method for protecting a web page, comprising:
receiving an access request sent by a client, wherein the access request comprises a target access address;
under the condition that the client has access authority to the target access address, acquiring original webpage data from the target access address;
carrying out watermark protection processing on the original webpage data to generate target webpage data;
and sending the target webpage data to the client.
2. The method of claim 1, wherein the obtaining raw web page data from the target access address comprises:
sending the access request to a target third-party server;
receiving response data fed back by the target third-party server aiming at the access request;
and taking the response data as the original webpage data.
3. The method of claim 1, wherein performing watermark protection processing on the original webpage data to generate target webpage data comprises:
generating a watermark display script corresponding to the client;
adding the watermark display script to the initial position of the original webpage data;
generating the target webpage data according to the watermark display script and the original webpage data;
and the client is used for generating a target watermark identifier according to the watermark display script and generating a target webpage according to the target watermark identifier and the original webpage data.
4. The method of claim 3, wherein the access request further comprises: a user identification of the client;
the generating of the watermark display script corresponding to the client comprises:
acquiring user information and user watermark configuration information according to the user identification in the access request;
generating a watermark display script according to the user information and the user watermark configuration information;
and the client is used for generating the target watermark identification according to the watermark display script.
5. The method of claim 3, wherein the watermark presentation script is configured to monitor a watermark removal event when executed by the client, and restart the watermark presentation script if it is determined that the watermark removal event removes the target watermark identifier, so as to generate the target watermark identifier again according to the watermark presentation script.
6. The method of claim 3, further comprising, after the performing the watermark protection process on the original webpage data to generate the target webpage data:
and adding a packaging protection script in the target webpage data, wherein the packaging protection script is used for forbidding the client to modify the watermark display script.
7. The method according to claim 1, further comprising, before the receiving the access request sent by the client:
receiving login information of a client;
and acquiring target authority configuration information of the client in a preset access authority configuration rule according to the login information.
8. A web page protection device, comprising:
the access request receiving module is used for receiving an access request sent by a client, wherein the access request comprises a target access address;
the original webpage data acquisition module is used for acquiring original webpage data from the target access address under the condition that the client has access authority to the target access address;
the target webpage data generating module is used for carrying out watermark protection processing on the original webpage data to generate target webpage data;
and the webpage data sending module is used for sending the target webpage data to the client.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method of web page protection as recited in any of claims 1-7.
10. A computer storage medium on which a computer program is stored, which program, when being executed by a processor, carries out the method for web page protection according to any one of claims 1 to 7.
CN202011492072.4A 2020-12-16 2020-12-16 Webpage protection method and device, computer equipment and storage medium Pending CN112966277A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011492072.4A CN112966277A (en) 2020-12-16 2020-12-16 Webpage protection method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011492072.4A CN112966277A (en) 2020-12-16 2020-12-16 Webpage protection method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112966277A true CN112966277A (en) 2021-06-15

Family

ID=76271479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011492072.4A Pending CN112966277A (en) 2020-12-16 2020-12-16 Webpage protection method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112966277A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417226A (en) * 2021-11-10 2022-04-29 北京字节跳动网络技术有限公司 Page generation method, display method, device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7360092B1 (en) * 2003-04-28 2008-04-15 Microsoft Corporation Marking and identifying web-based authentication forms
CN108388812A (en) * 2018-03-01 2018-08-10 西安交大捷普网络科技有限公司 A kind of webpage tamper detection method
CN110276175A (en) * 2019-06-27 2019-09-24 北京金山云网络技术有限公司 Watermark generation method, device, client and server in webpage
CN110909320A (en) * 2019-10-18 2020-03-24 北京字节跳动网络技术有限公司 Webpage watermark tamper-proofing method, device, medium and electronic equipment
CN111177664A (en) * 2019-12-27 2020-05-19 车智互联(北京)科技有限公司 Watermark information adding method, server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7360092B1 (en) * 2003-04-28 2008-04-15 Microsoft Corporation Marking and identifying web-based authentication forms
CN108388812A (en) * 2018-03-01 2018-08-10 西安交大捷普网络科技有限公司 A kind of webpage tamper detection method
CN110276175A (en) * 2019-06-27 2019-09-24 北京金山云网络技术有限公司 Watermark generation method, device, client and server in webpage
CN110909320A (en) * 2019-10-18 2020-03-24 北京字节跳动网络技术有限公司 Webpage watermark tamper-proofing method, device, medium and electronic equipment
CN111177664A (en) * 2019-12-27 2020-05-19 车智互联(北京)科技有限公司 Watermark information adding method, server and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114417226A (en) * 2021-11-10 2022-04-29 北京字节跳动网络技术有限公司 Page generation method, display method, device, electronic equipment and storage medium
WO2023155712A1 (en) * 2021-11-10 2023-08-24 北京字节跳动网络技术有限公司 Page generation method and apparatus, page display method and apparatus, and electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
CN108810006B (en) Resource access method, device, equipment and storage medium
CN105610810B (en) Data processing method, client and server
CN107077410B (en) Analyzing client application behavior to detect anomalies and prevent access
US20150026829A1 (en) Anti-keylog editor
CN111478910B (en) User identity authentication method and device, electronic equipment and storage medium
CN1752887A (en) Computer security system and method
US9560122B1 (en) Secure native application messaging with a browser application
EP3176719B1 (en) Methods and devices for acquiring certification document
CN111698312B (en) Service processing method, device, equipment and storage medium based on open platform
US20130104220A1 (en) System and method for implementing a secure USB application device
US11804958B2 (en) Method and system for initial secret delivery for scalable and restart-able collocated containers with shared resources
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN110070360B (en) Transaction request processing method, device, equipment and storage medium
CN113225351B (en) Request processing method and device, storage medium and electronic equipment
CN109088872B (en) Using method and device of cloud platform with service life, electronic equipment and medium
CN110995658A (en) Gateway protection method, device, computer equipment and storage medium
CN114048506A (en) Application control method, device, equipment and storage medium
US9275209B2 (en) Information processing device, control method therefor, program, and information storage medium
CN111901289B (en) Identity authentication method, device, equipment and storage medium
Vella et al. Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case study
CN112966277A (en) Webpage protection method and device, computer equipment and storage medium
CN112260983B (en) Identity authentication method, device, equipment and computer readable storage medium
CN111901290B (en) Identity authentication method and device
CN116827551A (en) Method and device for preventing global override

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination