CN113254820A - Webpage evidence storing method, device and system - Google Patents

Webpage evidence storing method, device and system Download PDF

Info

Publication number
CN113254820A
CN113254820A CN202110655964.XA CN202110655964A CN113254820A CN 113254820 A CN113254820 A CN 113254820A CN 202110655964 A CN202110655964 A CN 202110655964A CN 113254820 A CN113254820 A CN 113254820A
Authority
CN
China
Prior art keywords
webpage
evidence
screenshot
position information
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110655964.XA
Other languages
Chinese (zh)
Inventor
杨新颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110655964.XA priority Critical patent/CN113254820A/en
Publication of CN113254820A publication Critical patent/CN113254820A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Abstract

One or more embodiments of the present specification provide a method, an apparatus, and a system for webpage evidence storage. When the webpage evidence is required to be stored, the position information corresponding to the webpage area displaying the sensitive content in the webpage to be stored is determined, and the picture area with the same position information in the webpage screenshot of the webpage to be stored is covered. And carrying out block chaining evidence storage on the processed webpage screenshot.

Description

Webpage evidence storing method, device and system
Technical Field
One or more embodiments of the present disclosure relate to the field of terminal technologies, and in particular, to a method, an apparatus, and a system for storing a webpage certificate.
Background
The internet is the most important information carrier in modern society, and the web pages are the main form of the internet information carrier. In practical applications, there is a need for the storage of a web page. For example, a copyright owner of a novel work finds that a reading website illegally posts the novel work, and in such a case, the copyright owner often needs to store a certificate for a webpage that posts the novel work for subsequent right action.
Based on this, a method for storing the webpage certificate is needed.
Disclosure of Invention
In view of this, one or more embodiments of the present disclosure provide a method, an apparatus, and a system for web page authentication.
To achieve the above object, one or more embodiments of the present disclosure provide the following technical solutions:
according to a first aspect of one or more embodiments of the present specification, there is provided a method for webpage certification, including:
determining a webpage to be stored with evidence and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with the evidence;
acquiring a webpage screenshot of the webpage to be stored and certified, and masking a picture area corresponding to the position information in the webpage screenshot;
and carrying out block chain evidence storage on the processed webpage screenshot.
According to a second aspect of one or more embodiments of the present specification, there is provided a web page certification device including:
the determining module is used for determining a webpage to be stored with evidence and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with the evidence;
the acquisition module is used for acquiring a webpage screenshot of the webpage to be stored and shielding a picture area corresponding to the position information in the webpage screenshot;
and the evidence storage module is used for carrying out block chain evidence storage on the processed webpage screenshot.
According to a third aspect of one or more embodiments of the present specification, a web page evidence storing system is provided, which includes an evidence storing server, an evidence storing client and a trusted evidence obtaining device;
the certificate storing client sends the webpage address of the webpage to be subjected to certificate storing to the certificate storing server;
the evidence storing server side determines position information corresponding to a webpage area which displays sensitive content in the webpage to be stored with evidence; sending the webpage address and the position information to the evidence obtaining equipment; performing block chain evidence storage on the webpage screenshot received from the evidence obtaining equipment;
the evidence obtaining equipment is used for obtaining a webpage screenshot of the webpage to be subjected to evidence storage and shielding a picture area corresponding to the position information in the webpage screenshot; and sending the processed webpage screenshot to the evidence storage server.
In the technical scheme, when the webpage evidence is required to be stored, the position information corresponding to the webpage area displaying the sensitive content in the webpage to be stored with the evidence is determined, and the picture area with the same position information in the screenshot of the webpage to be stored with the evidence is subjected to covering processing. And carrying out block chaining evidence storage on the processed webpage screenshot.
By the technical scheme, the evidence of the webpage can be stored on the premise that sensitive content in the webpage is not used as part of evidence content.
Drawings
Fig. 1 is a schematic flow chart of a method for storing a webpage certificate provided in this specification.
Fig. 2 is a schematic flow chart of another method for storing a webpage certificate provided in this specification.
Fig. 3 is a schematic structural diagram of a web page deposit certificate system provided in this specification.
Fig. 4 is a schematic structural diagram of a web page evidence storing device provided in this specification.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
In one or more embodiments of the present description, a block chain technology is used to implement webpage evidence storage, specifically, a webpage screenshot of a webpage to be subjected to evidence storage is subjected to block chain evidence storage. In some embodiments, the web page screenshot of the to-be-stored web page may be used as a storage object, and the storage object is submitted to the blockchain system for storage. The evidence object may include other information, such as a forensic process record (or referred to as a forensic process log), a forensic timestamp, and the like, in addition to the web screenshot.
In other embodiments, the hash value of the credentialing object can also be submitted to the blockchain system for credentialing.
The block chain technique is described below.
Blockchains are generally divided into three types: public chain (Public Blockchain), Private chain (Private Blockchain) and alliance chain (Consortium Blockchain). Furthermore, there may be a combination of the above types, such as private chain + federation chain, federation chain + public chain, and so on.
Among them, the most decentralized is the public chain. Participants joining the public chain (also referred to as nodes in the blockchain) can read the data records on the chain, participate in transactions, compete for accounting rights for new blocks, and so on. Moreover, each node can freely join or leave the network and perform related operations.
Private chains are the opposite, with the network's write rights controlled by an organization or organization and the data read rights specified by the organization. Briefly, a private chain may be a weakly centralized system with strict restrictions on nodes and a small number of nodes. This type of blockchain is more suitable for use within a particular establishment.
A federation chain is a block chain between a public chain and a private chain, and "partial decentralization" can be achieved. Each node in a federation chain typically has a physical organization or organization corresponding to it; the nodes are authorized to join the network and form a benefit-related alliance, and block chain operation is maintained together.
Based on the basic characteristics of a blockchain, a blockchain is usually composed of several blocks. The time stamps corresponding to the creation time of the block are recorded in the blocks respectively, and all the blocks form a time-ordered data chain according to the time stamps recorded in the blocks strictly.
The data generated outside the chain can be constructed into a standard transaction (transaction) format supported by the blockchain, then the data is issued to the blockchain, the node devices in the blockchain perform consensus on the transaction, and after the consensus is achieved, the node devices serving as accounting nodes in the blockchain package the transaction into blocks, and the persistent evidence is stored in the blockchain.
The consensus algorithm supported in the blockchain may include:
the first kind of consensus algorithm, namely the consensus algorithm that the node device needs to contend for the accounting right of each round of accounting period; consensus algorithms such as Proof of Work (POW), Proof of equity (POS), Proof of commission rights (DPOS), etc.;
the second kind of consensus algorithm, namely the consensus algorithm which elects accounting nodes in advance for each accounting period (without competing for accounting right); for example, a consensus algorithm such as a Practical Byzantine Fault Tolerance (PBFT) is used.
In a blockchain network employing a first type of consensus algorithm, node devices competing for billing rights can execute a transaction upon receipt. One of the node devices competing for the accounting right may win in the process of competing for the accounting right in the current round, and become an accounting node. The accounting node may package the received transaction with other transactions to generate a candidate block and send the generated candidate block or a block header of the candidate block to other node devices for consensus.
In the block chain network adopting the second type of consensus algorithm, the node equipment with the accounting right is agreed before accounting in the current round. Thus, the node device, after receiving the transaction, may send the transaction to the accounting node if it is not the accounting node of its own round. For the accounting node of the current round, the transaction may be performed during or before packaging the transaction with other transactions to generate candidate blocks. After generating the candidate block, the accounting node may send the candidate block or a block header of the candidate block to other node devices for consensus.
As described above, regardless of which consensus algorithm is used by the blockchain, the accounting node of the current round may package the received transaction to generate a candidate block and send the generated candidate block or the block header of the candidate block to other node devices for consensus verification. If no problem is verified after the other node device receives the candidate block or the block header of the candidate block, the candidate block can be added to the end of the original block chain as the latest block, thereby completing the accounting process of the block chain. The transaction contained in the block may also be performed by other nodes in verifying the new block or block header sent by the accounting node.
The blockchain technology can make the stored data difficult to be tampered, and therefore can be used for meeting the data storage requirement.
Embodiments of the present description will be described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of a method for storing a webpage certificate provided in this specification, including the following steps:
s100: determining a webpage to be stored with evidence, and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with evidence.
The method shown in fig. 1 may be applied to a single execution subject, or may be applied to a system including a multi-side execution subject (e.g., a web page verification system described later).
S102: and acquiring a webpage screenshot of the webpage to be stored and certified, and masking a picture area corresponding to the position information in the webpage screenshot.
S104: and carrying out block chain evidence storage on the processed webpage screenshot.
In practical applications, a user who has a need for evidence of a web page generally does not want to include sensitive content in the web page into evidence content of the evidence.
The criteria for identifying sensitive content described herein can be set according to actual needs. In some embodiments, sensitive content may be defined as content that negatively impacts the effectiveness of evidence for the web page to be credited. For example, sensitive content may be advertising information, inaudible information, or other person privacy information that impairs the seriousness and legality of evidence (legitimacy of evidence acquisition pathways, affecting evidence qualification), and tends to negatively impact evidence effectiveness.
The position information corresponding to the web page area displaying the sensitive content in the to-be-certified web page may refer to horizontal and vertical coordinate information (for example, the x-th row to the y-th row, and the a-th column to the b-th column) of the web page area.
The webpage screenshot of the to-be-stored-certificate webpage is generally obtained by screenshot of the whole webpage of the to-be-stored-certificate webpage.
And masking the picture area corresponding to the position information in the webpage screenshot, so that sensitive content displayed in the webpage screenshot can be masked, and evidence content corresponding to the webpage screenshot does not contain the sensitive content.
The masking process may be, for example, to cover a mask on the picture area corresponding to the position information in the screenshot. In addition, the masking process may be accomplished in other ways.
In some embodiments of the present specification, the block chain verification is performed on the processed screenshot of the web page, and specifically, the processed screenshot of the web page may be submitted to a block chain system for storage. In other embodiments, the hash value corresponding to the processed web screenshot may also be submitted to the blockchain system for storage.
In addition, in some embodiments, the authentication server may receive the web page address of the to-be-authenticated web page sent by the authentication client, so that the authentication server may determine the to-be-authenticated web page, that is, step S100 is performed by the authentication server. The webpage address can be input to the evidence storing client by a user with a webpage evidence storing requirement.
The sensitive content in the hosted webpage may be user-specified. Specifically, the evidence storing client may render the to-be-stored webpage and provide a setting interface including the to-be-stored webpage to the user. And the evidence storing client monitors the area planning operation executed by the user in the page to be stored with evidence through the setting interface, and determines the webpage area planned by the user according to the monitoring result to be used as the webpage area displaying the sensitive content appointed by the user in the webpage to be stored with evidence. And the certificate storing client determines the position information corresponding to the webpage area and sends the position information to the certificate storing server.
In some embodiments, step S102 may be performed by the certificate authority. In other embodiments, step S102 may be performed by a trusted forensics device, considering that the forensics operation performed by the forensics service is not necessarily trusted. The trusted forensics device may be, for example, a forensics device of a notary institution.
The evidence-storing server side can send evidence-obtaining instructions to the credible evidence-obtaining equipment; the evidence obtaining instruction comprises the webpage address and the position information. The evidence obtaining device can access the webpage to be proved and obtain the webpage screenshot of the webpage to be proved, and the image area corresponding to the position information in the webpage screenshot is covered.
The evidence obtaining device can directly perform block chain evidence storage on the processed webpage screenshot, and also can send the processed webpage screenshot to an evidence storage server, and the evidence storage server executes the step S104.
Additionally, in some embodiments, the forensics device may also generate forensics process records. The evidence obtaining process records relevant information (such as operation content, operation time and other information) of each operation involved in the process of obtaining the processed webpage screenshot by the evidence obtaining device.
If the step S104 is performed by the forensics device, the forensics device may perform block chain forensics on the processed webpage screenshot and the forensics process record in an associated manner.
If the step S104 is executed by the evidence-storing service end, the evidence-storing service end may perform block chain evidence storing on the processed webpage screenshot and the evidence-taking process record in an associated manner.
It should be further noted that the block chain evidence storage is performed on the processed web page screenshot and the evidence obtaining process record in an associated manner, specifically, the processed web page screenshot and the evidence obtaining process record may be packaged into a compressed packet, and then the block chain evidence storage is performed, and the block chain system may store the compressed packet itself or the hash value of the compressed packet.
Fig. 2 is a schematic flow chart of another method for storing a webpage certificate provided in this specification. As shown in fig. 2, the web page evidence storing method is applied to a web page evidence storing system including an evidence storing client, an evidence storing server and a trusted evidence obtaining device. And the evidence storing client sends the webpage address of the webpage to be stored with evidence and the position information corresponding to the webpage area of the sensitive content displayed in the webpage to be stored with evidence to the evidence storing server. And the evidence storage server side sends the webpage address and the position information to the credible evidence obtaining equipment. And the evidence obtaining equipment accesses the webpage to be proved, obtains a webpage screenshot and carries out covering treatment on the picture area corresponding to the position information in the webpage screenshot. And then, the evidence obtaining equipment sends the processed webpage screenshot to an evidence storing server side. And the evidence storing server performs block chain evidence storing on the received webpage screenshot.
Fig. 3 is a schematic structural diagram of a web page deposit certificate system provided in this specification. The webpage evidence storing system comprises an evidence server, an evidence storing client and a credible evidence obtaining device.
The certificate storing client sends the webpage address of the webpage to be subjected to certificate storing to the certificate storing server;
the evidence storing server side determines position information corresponding to a webpage area which displays sensitive content in the webpage to be stored with evidence; sending the webpage address and the position information to the evidence obtaining equipment; performing block chain evidence storage on the webpage screenshot received from the evidence obtaining equipment;
the evidence obtaining equipment is used for obtaining a webpage screenshot of the webpage to be subjected to evidence storage and shielding a picture area corresponding to the position information in the webpage screenshot; and sending the processed webpage screenshot to the evidence storage server.
The certificate storing server receives the webpage address of the webpage to be certified, which is sent by the certificate storing client; the webpage address is input to the evidence storing client by the user.
The evidence storing client renders the webpage to be stored with evidence and provides a setting interface containing the webpage to be stored with evidence for the user; monitoring the region planning operation executed by the user in the page to be stored with evidence through the setting interface; determining a webpage area defined by the user according to a monitoring result, wherein the webpage area is used as a webpage area displaying sensitive content specified by the user in the to-be-stored-license webpage; and determining the position information corresponding to the webpage area and sending the position information to the evidence storage server.
The evidence storing server side sends evidence obtaining instructions to the credible evidence obtaining equipment; the evidence obtaining instruction comprises the webpage address and the position information;
the evidence obtaining device accesses the webpage to be subjected to evidence storage and obtains a webpage screenshot of the webpage to be subjected to evidence storage; and carrying out covering processing on a picture area corresponding to the position information in the webpage screenshot.
The trusted forensics device comprising: the equipment of collecting evidence of notarization mechanism.
And the evidence storing server receives the processed webpage screenshot returned by the evidence obtaining equipment and carries out block chain evidence storing on the processed webpage screenshot.
The evidence obtaining equipment generates an evidence obtaining process record; the evidence obtaining process record is used for recording relevant information of each operation involved in the process of obtaining the processed webpage screenshot by the evidence obtaining equipment;
performing block chaining evidence storage on the processed webpage screenshot, wherein the block chaining evidence storage comprises the following steps:
and performing block chain evidence storage on the processed webpage screenshot and the evidence obtaining process record in an associated mode.
The relevant information of each operation includes:
the operation content and the operation time of each operation.
The sensitive content comprises: and (c) content which negatively affects the evidence effectiveness of the web page to be certified.
And performing masking processing on a picture area corresponding to the position information in the webpage screenshot, wherein the masking processing comprises the following steps:
and covering a layer of mask on the picture area corresponding to the position information in the webpage screenshot.
In addition, fig. 4 is a schematic structural diagram of a web page evidence storing device provided in this specification, including:
the determining module is used for determining a webpage to be stored with evidence and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with the evidence;
the acquisition module is used for acquiring a webpage screenshot of the webpage to be stored and shielding a picture area corresponding to the position information in the webpage screenshot;
and the evidence storage module is used for carrying out block chain evidence storage on the processed webpage screenshot.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the various elements may be implemented in the same one or more software and/or hardware implementations of the present description.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.

Claims (12)

1. A webpage evidence storing method comprises the following steps:
determining a webpage to be stored with evidence and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with the evidence;
acquiring a webpage screenshot of the webpage to be stored and certified, and masking a picture area corresponding to the position information in the webpage screenshot;
and carrying out block chain evidence storage on the processed webpage screenshot.
2. The method of claim 1, wherein determining the web page to be credited comprises:
the certificate storing server receives a webpage address of a webpage to be certified, which is sent by the certificate storing client; the webpage address is input to the evidence storing client by the user.
3. The method of claim 2, wherein the step of determining the position information corresponding to the webpage area displaying the sensitive content specified by the user in the to-be-stored webpage by the certificate storing server comprises the following steps:
the evidence storing client renders the webpage to be stored with evidence and provides a setting interface containing the webpage to be stored with evidence for the user;
the evidence storing client monitors the region planning operation executed by the user in the page to be stored with evidence through the setting interface;
the evidence storing client determines a webpage area defined by the user according to a monitoring result, and the webpage area is used as a webpage area displaying sensitive content designated by the user in the webpage to be stored with evidence;
and the certificate storing client determines the position information corresponding to the webpage area and sends the position information to the certificate storing server.
4. The method of claim 2, wherein the step of obtaining the screenshot of the webpage to be stored and performing the masking processing on the picture area corresponding to the position information in the screenshot comprises the steps of:
the evidence-storing server side sends evidence-obtaining instructions to the credible evidence-obtaining equipment; the evidence obtaining instruction comprises the webpage address and the position information;
the evidence obtaining equipment accesses the webpage to be subjected to evidence storage and obtains a webpage screenshot of the webpage to be subjected to evidence storage;
and the evidence obtaining equipment carries out covering processing on the picture area corresponding to the position information in the webpage screenshot.
5. The method of claim 4, the trusted forensics device comprising: the equipment of collecting evidence of notarization mechanism.
6. The method of claim 4, performing block chaining verification on the processed screenshot of the webpage, comprising:
and the evidence storing server receives the processed webpage screenshot returned by the evidence obtaining equipment and carries out block chain evidence storing on the processed webpage screenshot.
7. The method of claim 4, further comprising:
the evidence obtaining equipment generates an evidence obtaining process record; the evidence obtaining process record is used for recording relevant information of each operation involved in the process of obtaining the processed webpage screenshot by the evidence obtaining equipment;
performing block chaining evidence storage on the processed webpage screenshot, wherein the block chaining evidence storage comprises the following steps:
and performing block chain evidence storage on the processed webpage screenshot and the evidence obtaining process record in an associated mode.
8. The method of claim 7, wherein the information related to each operation comprises:
the operation content and the operation time of each operation.
9. The method of claim 1, the sensitive content, comprising: and (c) content which negatively affects the evidence effectiveness of the web page to be certified.
10. The method of claim 1, wherein the masking of the picture region corresponding to the position information in the screenshot comprises:
and covering a layer of mask on the picture area corresponding to the position information in the webpage screenshot.
11. A web page evidence keeping apparatus comprising:
the determining module is used for determining a webpage to be stored with evidence and determining position information corresponding to a webpage area displaying sensitive content in the webpage to be stored with the evidence;
the acquisition module is used for acquiring a webpage screenshot of the webpage to be stored and shielding a picture area corresponding to the position information in the webpage screenshot;
and the evidence storage module is used for carrying out block chain evidence storage on the processed webpage screenshot.
12. A webpage evidence storing system comprises an evidence storing server side, an evidence storing client side and a credible evidence obtaining device;
the certificate storing client sends the webpage address of the webpage to be subjected to certificate storing to the certificate storing server;
the evidence storing server side determines position information corresponding to a webpage area which displays sensitive content in the webpage to be stored with evidence; sending the webpage address and the position information to the evidence obtaining equipment; performing block chain evidence storage on the webpage screenshot received from the evidence obtaining equipment;
the evidence obtaining equipment is used for obtaining a webpage screenshot of the webpage to be subjected to evidence storage and shielding a picture area corresponding to the position information in the webpage screenshot; and sending the processed webpage screenshot to the evidence storage server.
CN202110655964.XA 2021-06-11 2021-06-11 Webpage evidence storing method, device and system Pending CN113254820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110655964.XA CN113254820A (en) 2021-06-11 2021-06-11 Webpage evidence storing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110655964.XA CN113254820A (en) 2021-06-11 2021-06-11 Webpage evidence storing method, device and system

Publications (1)

Publication Number Publication Date
CN113254820A true CN113254820A (en) 2021-08-13

Family

ID=77187769

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110655964.XA Pending CN113254820A (en) 2021-06-11 2021-06-11 Webpage evidence storing method, device and system

Country Status (1)

Country Link
CN (1) CN113254820A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408686A (en) * 2014-10-31 2015-03-11 宇龙计算机通信科技(深圳)有限公司 Method, system and terminal for screen capturing
CN105787874A (en) * 2014-12-25 2016-07-20 深圳市腾讯计算机系统有限公司 Method and device used for mosaic processing of captured image
CN107145795A (en) * 2017-04-28 2017-09-08 广东欧珀移动通信有限公司 Screenshot method, device and computer equipment
CN110244896A (en) * 2019-06-24 2019-09-17 北京向上一心科技有限公司 Screenshot method, device, controller and storage medium in webpage
CN110334542A (en) * 2019-06-20 2019-10-15 阿里巴巴集团控股有限公司 Card method of calibration and device are deposited in a kind of network preservation of evidence, network evidence

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408686A (en) * 2014-10-31 2015-03-11 宇龙计算机通信科技(深圳)有限公司 Method, system and terminal for screen capturing
CN105787874A (en) * 2014-12-25 2016-07-20 深圳市腾讯计算机系统有限公司 Method and device used for mosaic processing of captured image
CN107145795A (en) * 2017-04-28 2017-09-08 广东欧珀移动通信有限公司 Screenshot method, device and computer equipment
CN110334542A (en) * 2019-06-20 2019-10-15 阿里巴巴集团控股有限公司 Card method of calibration and device are deposited in a kind of network preservation of evidence, network evidence
CN110244896A (en) * 2019-06-24 2019-09-17 北京向上一心科技有限公司 Screenshot method, device, controller and storage medium in webpage

Similar Documents

Publication Publication Date Title
CN111460511B (en) Federal learning and virtual object distribution method and device based on privacy protection
US20230162181A1 (en) Blockchain-based method and system for specifying the recipient of an electronic communication
CN112491551B (en) Data verification method and device based on block chain and electronic equipment
CN108182581B (en) Accounting method and device for block chain
JP2019511059A (en) Method and device for outputting risk information and constructing risk information
CN110189122B (en) Method and device for anchoring time for data on block chain and electronic equipment
CN105099675A (en) Method and device for generating authentication data for identity authentication and method and device for identity authentication
CN110765451B (en) Risk identification method and device and electronic equipment
CN111382168A (en) Node group creating method and node group-based transaction method in alliance chain network
CN110020854B (en) Data evidence storage method and system based on multiple block chain networks
CN109242677A (en) Object select method and device, electronic equipment
CN110020945B (en) Data reading method and system based on multiple block chain networks
US20200193430A1 (en) Determining generation time for blockchain data
US20240078551A1 (en) Blockchain-based user element authorization methods and apparatuses
CN114358764A (en) Privacy calculation method based on intelligent contracts in block chain and related equipment
CN112291321B (en) Service processing method, device and system
CN109818965B (en) Personal identity verification device and method
CN111899104B (en) Service execution method and device
CN113254820A (en) Webpage evidence storing method, device and system
CN106874184B (en) Java code detection method and device
CN111832862B (en) Flow management method and system based on block chain
CN110060152B (en) Data reading method and system based on multiple block chain networks
CN112434264A (en) Infringement processing method and device based on block chain and electronic equipment
CN113255008B (en) Method and system for outputting multimedia file
CN114297689B (en) Financial wind control method and device based on privacy calculation and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination