CN113553601B - Webpage content encryption method and equipment - Google Patents

Webpage content encryption method and equipment Download PDF

Info

Publication number
CN113553601B
CN113553601B CN202010328794.XA CN202010328794A CN113553601B CN 113553601 B CN113553601 B CN 113553601B CN 202010328794 A CN202010328794 A CN 202010328794A CN 113553601 B CN113553601 B CN 113553601B
Authority
CN
China
Prior art keywords
encryption
webpage
content
font
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010328794.XA
Other languages
Chinese (zh)
Other versions
CN113553601A (en
Inventor
高力
胡金涌
丁兆鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yundun Information Technology Co ltd
Original Assignee
Shanghai Yundun Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yundun Information Technology Co ltd filed Critical Shanghai Yundun Information Technology Co ltd
Priority to CN202010328794.XA priority Critical patent/CN113553601B/en
Publication of CN113553601A publication Critical patent/CN113553601A/en
Application granted granted Critical
Publication of CN113553601B publication Critical patent/CN113553601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application aims to provide a webpage content encryption method and equipment, and webpage content corresponding to an access request of a user is obtained; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for the visitor who normally visits through the browser, the visitor can see all content information presented on the webpage, and the user experience is improved.

Description

Webpage content encryption method and equipment
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for encrypting content of a web page.
Background
In the prior art, with the development of the internet, the number of netizens who use the internet to make shopping, trade, socialize, know news information and the like is increasing. The internet is also becoming an important way for economic development and social civilization construction. Meanwhile, under the drive of various benefits, mass data exposed on the Internet are subjected to website data crawling collection, sorting, analysis and calculation through unauthorized and targeted collection programs, and finally, the method is used for gaining violence through illegal competition, illegal stealing and the like. According to relevant statistics, approximately 80% of the traffic on the internet per day is initiated by the crawler software. Therefore, the website service and intellectual property can be effectively protected by identifying and protecting the crawler. However, the existing technologies for protecting the crawler are mostly temporary solution and permanent solution strategies, and still have a plurality of defects.
The existing scheme I is as follows: by accessing the frequency limit, crawling behavior is limited. There are the following disadvantages: 1. normal visitors are easy to kill by mistake, and a proper frequency threshold value is difficult to measure for distinguishing the access frequency of the normal visitors from the access frequency of the crawler; 2. the anti-crawler effect is not good, and crawler software can modulate the frequency and bypass the set access frequency limit. The existing scheme is as follows: and identifying crawler access through browser behavior verification, such as cookie verification, javascript verification, verification codes and other browser behavior verification strategies. There are the following disadvantages: 1. the verification strategy is easy to be bypassed by crawler software, and a plurality of crawler scripts or programs can have cookie verification, js verification functions and the like; in addition, a plurality of third-party services for cracking the verification codes are provided, so that the verification codes can be cracked conveniently. 2. When a user visits a website, the user can use the verification code additionally, so that poor physical examination is easily caused. The existing scheme is three: and comparing the IP of the accessed website with the constructed IP library (i.e. a crawler information library), and identifying the crawler IP (Internet Protocol) so as to realize protection. There are the following disadvantages: 1. the method completely depends on an IP library, and the information has certain delay, so that the crawler attack cannot be identified and protected in time. 2. Crawler IPs easily bypass the IP library, especially when the IP library is not healthy, and can be bypassed using various proxy IPs.
Therefore, an anti-crawling scheme capable of protecting key information data on the internet and not affecting normal visitors is urgently needed.
Disclosure of Invention
An object of the present application is to provide a method and device for encrypting content of a web page, so as to solve the problem in the prior art how to protect key data information on the web page in the internet, and at the same time, not affect the access of a normal visitor to the web page.
According to one aspect of the application, a method for encrypting webpage content is provided, which comprises the following steps:
acquiring webpage content corresponding to an access request of a user;
based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content;
randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content;
and replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type.
Further, the method for encrypting the webpage content further comprises the following steps:
acquiring the website service requirement of the user from user equipment;
and configuring the preset page encryption configuration information and a first enabling condition for the webpage to be acquired by the user according to the website service requirement.
Further, in the method for encrypting the content of the web page, obtaining the element locating position of the web page corresponding to the content of the web page, the method further includes:
and positioning the page encryption element on the webpage content to obtain an element positioning position.
Further, in the method for encrypting webpage content, before the acquiring webpage content corresponding to the access request of the user, the method further includes:
starting a content encryption function of the webpage which the user requests to access;
judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function;
and if so, carrying out condition matching on the webpage which the user requests to access and the configured first enabling condition.
Further, in the method for encrypting the content of the web page, the preset page encryption configuration information includes first page encryption element range configuration information and/or first font encryption type configuration information, where the positioning of the page encryption element on the content of the web page based on the preset page encryption configuration information to obtain an element positioning position and determining the font encryption type in the content of the web page includes:
judging whether the preset page encryption configuration information is configured with a page encryption element range or not,
if not, positioning the page encryption element of the webpage content according to the default second page encryption element range configuration information of the system to obtain an element positioning position,
if so, positioning page encryption elements on the webpage content according to the first page encryption element range configuration information to obtain element positioning positions;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
Further, in the method for encrypting content of a web page, the determining a font encryption type in the content of the web page based on the first font encryption type configuration information includes:
judging whether the preset page encryption configuration information is configured with a font encryption type or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content;
and if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content.
Further, the method for encrypting the webpage content further comprises the following steps:
and sending the new page content after the webpage content is replaced to user equipment corresponding to the user.
Further, the method for encrypting the webpage content further comprises the following steps:
and updating each font library in the preset font libraries in real time or periodically.
According to another aspect of the present application, there is also provided a computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of the above.
According to another aspect of the present application, there is also provided a web page content encryption apparatus, including:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method as in any one of the above.
Compared with the prior art, the method and the device have the advantages that the webpage content corresponding to the access request of the user is obtained; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, namely, the key data information (namely the page content) on the element positioning position of the webpage is replaced by the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, a crawler program is difficult to acquire the data of the webpage to be crawled, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for a visitor normally visiting through a browser, the visitor can see all content information presented on the webpage, and the user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
FIG. 1 illustrates a flow diagram of a method for encrypting content of a web page in accordance with an aspect of the subject application;
FIG. 2 illustrates a block diagram of an interaction of modules of a method for encrypting content of a web page according to an aspect of the subject application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached drawing figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or flash Memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase-Change RAM (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically erasable programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, compact Disc Read-Only Memory (CD-ROM), digital Versatile Disc (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 is a schematic flowchart illustrating a method for encrypting Content of a web page according to an aspect of the present application, where the method is applicable to various scenes of accessing a website based on the internet, and is applied to a website access cloud platform or a CDN (Content Delivery Network) system accessed by the website, where the method includes step S11, step S12, step S13, and step S14, where the method specifically includes:
s11, acquiring webpage content corresponding to an access request of a user; here, the specific step of acquiring the webpage content corresponding to the access request of the user may include the following steps: as shown in fig. 2, first, an access request of an access device is received; and then, forwarding the access request to a real website server based on the access request, wherein the real website server obtains website page content corresponding to the access request and sends the corresponding website page content to a cloud platform or a CDN system node so as to complete the acquisition of the website page content corresponding to the access request of the user.
And S12, based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, determining a font encryption type in the webpage content, and realizing the positioning of the element of the webpage content and the determination of the font encryption type.
Step S13, randomly selecting a target font library from the preset font libraries, and adding the target font library to the content of the web page, as shown in fig. 2, generating a preset font library for replacing the content of the web page by the custom font library generating module in the edge server, so as to randomly select a target font library from the preset font library for performing encryption replacement of the content of the web page to be encrypted when the content of the web page needs to be encrypted and replaced subsequently.
And S14, replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type. The target font library can normally render data information (namely page content on the element positioning position in the page content of the webpage) to be displayed on the browser in an image mode, and a crawler program acquires a string of random messy code data which cannot acquire correct data information, so that the aim of preventing crawlers from crawling data information is fulfilled, meanwhile, the access of normal visitors to websites is not influenced, and the crawlers are fundamentally prevented.
Through the steps S11 to S14, firstly, the web page content corresponding to the access request of the user is obtained; then based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; then randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; and finally, replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type. The key data information (namely page content) on the element positioning position of the webpage is replaced by using a target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, and the crawler program is difficult to acquire the data of the webpage to be crawled, so that the crawler-preventing effect is achieved.
For example: firstly, acquiring webpage content corresponding to an access request of a user; then, based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; then, randomly selecting a target font library from the preset font libraries, and adding the selected target font library information to the webpage content, such as: style label information, font library file link information, etc.; and finally, replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type, so as to realize replacement encryption processing on the webpage content to be encrypted in the webpage content accessed by the user.
An embodiment of the present application provides a method for encrypting web page content, further including:
acquiring a website service requirement of the user from user equipment;
and configuring the preset page encryption configuration information and a first enabling condition for the webpage to be acquired by the user according to the website service requirement. As shown in fig. 2, the preset page encryption configuration information and the first enabling condition are configured for the web page to be acquired by the user at the configuration console according to the web service requirement of the user, that is, the web configuration data is configured for the web page to be acquired by the user.
Here, the first enabling condition is configured according to User requirements, and includes but is not limited to a condition that specifies a font-based anti-crawler enabled URL (Uniform Resource Locator) or URL list (supporting exact match or fuzzy match), a Resource type, an IP or IP list, an IP type, a regional geographic location, a time range control, requested referrer information, requested User-Agent (User Agent), and the like; meanwhile, in an actual use scene, each condition in the first enabling condition can be used independently or in any combination, so that flexible and accurate configuration is realized.
For example, the user may perform targeted advanced configuration according to the actual service requirement of the website, including determining the requirements of resource type, IP or IP list, IP type, regional geographical location, time range control, requested referrer information, and the like. User equipment acquires the website service requirement of the user; the preset page encryption configuration information and the first enabling condition are configured for the webpage to be acquired by the user according to the website service requirement, so that the preset page encryption configuration information and the first enabling condition can be configured more flexibly and accurately, key information in webpage content can be protected more accurately through the configured preset page encryption configuration information and the first enabling condition, and a crawler-proof effect is achieved.
Next to the above embodiment of the present application, the obtaining, in step S12, the element positioning position of the webpage corresponding to the webpage content further includes: and positioning page encryption elements of the webpage content to obtain element positioning positions, so that the positioning of the page encryption elements of the webpage content is realized, and the font encryption type in the webpage content is further determined.
Following the above embodiment of the present application, before the step S11, the method further includes:
starting a content encryption function of the webpage which the user requests to access; the method can be directly developed based on a cloud platform or a CDN system to achieve the effect of rapid deployment, a website with the webpage content encryption function needs to be used, any secondary development is not needed, the webpage content encryption function can be seamlessly started only after the function is started in the corresponding cloud platform or the CDN system, and the method is more flexible.
Judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function; here, the second enabling condition may be a condition including, but not limited to, a default of the system, some passing condition or any condition that a web page can be accessed, and the like.
And if the webpage is configured, performing condition matching on the webpage requested to be accessed by the user and the configured first enabling condition, so that the webpage requested to be accessed by the user is more accurately protected, and resource waste caused by processing webpage content which does not need to be protected is avoided.
For example, first, a content encryption function of a web page to which the user requests access is turned on. When the webpage requested to be accessed by the user is not configured with the first enabling condition for starting the content encryption function, the system defaults that the webpage requested to be accessed by the user meets the second enabling condition for starting the content encryption function to output yes, and step S11 is executed to acquire webpage content corresponding to the access request of the user. When the webpage page which the user requests to access is configured with the first enabling condition for starting the content encryption function, the webpage page which the user requests to access is matched with the configured first enabling condition. If the webpage requested to be accessed by the user meets the first enabling condition, yes is output, and step S11 is executed to obtain webpage content corresponding to the access request of the user. If the webpage requested to be accessed by the user does not meet the first enabling condition, directly quitting the content encryption function of the webpage, realizing more accurate protection of the webpage requested to be accessed by the user, and simultaneously avoiding resource waste caused by processing the webpage content which does not need to be encrypted and protected.
Next to the above embodiments of the present application, the preset page encryption configuration information includes first page encryption element range configuration information and/or first font encryption type configuration information, where the first page encryption element range configuration information is set by a user according to an actual website business requirement of the user, and may include, but is not limited to, a web page element range that needs to be encrypted, where the web page element range includes, but is not limited to, a whole page element range, a specific web page element range, a specific tag, and a specific element, that is, an element that can be accurately located at a specific position on a page. For example, only the title of a web page is encrypted; encrypting the content in the < label > tag; and encrypting the content with the label attribute class value of btn, and the like. The first font encryption type configuration information is set by a user according to the actual website service requirement of the user, and can include but not limited to numbers, letters, common Chinese characters, any combination of the numbers, the letters and the Chinese characters and the like, so that the page elements and the font encryption types when the webpage needs to be encrypted are flexibly and accurately configured.
Wherein, the step S12 includes:
judging whether the preset page encryption configuration information is configured with a page encryption element range or not,
if not, positioning the page encryption elements of the webpage content according to the default second page encryption element range configuration information of the system to obtain element positioning positions; here, the second page encryption element range configuration information is default to the system, such as: if not, positioning is carried out according to the built-in second page encryption element range configuration information (the second page encryption element range configuration information includes but is not limited to the content in a default element range such as a < div > tag, and the built-in page encryption element range configuration information can be adjusted and is not limited to the conditions in the example).
If so, positioning the page encryption element of the webpage content according to the first page encryption element range configuration information to obtain an element positioning position;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
For example, before encrypting the web page corresponding to the access request, it is necessary to determine whether a page encryption element range is configured in the preset page encryption configuration information, and when a page encryption element range is configured in the preset page encryption configuration information, according to the first page encryption element range configuration information, the page encryption element is positioned on the content of the web page to obtain an element positioning position; and if the positioning fails, quitting the content encryption function of the webpage which the user requests to access. And if the positioning is successful, determining the font encryption type in the webpage content based on the first font encryption type configuration information. When the preset page encryption configuration information is not configured with a page encryption element range, positioning page encryption elements of the webpage content according to second page encryption element range configuration information which is default by a system to obtain an element positioning position, then determining font encryption types in the webpage content based on the first font encryption type configuration information, so that the element positioning position and the font encryption types are determined, so that the step S13 is continuously executed to randomly select a target font library from preset font libraries, and the target font library is added to the webpage content, thereby being beneficial to protecting key information of the webpage content and achieving an accurate and real anti-crawling effect.
Next to the foregoing embodiment of the present application, the determining, based on the first font encryption type configuration information in step S12, the font encryption type in the webpage content includes:
judging whether the font encryption type is configured in the preset page encryption configuration information or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content; here, the second font encryption type configuration information is default to the system, for example, if the specified protection font type is not configured, a built-in default protection font type, that is, the second font encryption type configuration information is used (where the default font protection type is, for example, a number or a number + letter, and the built-in font encryption type may be adjusted, but is not limited to the example).
And if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content, so that the determination of the font encryption type of the webpage content is realized.
For example, after the positioning of the page encryption element is performed on the webpage content in step S12, it is further determined whether a font encryption type is configured in the preset page encryption configuration information, and when the font encryption type is configured in the preset page encryption configuration information, the font encryption type configured in the first font encryption type configuration information is determined as the font encryption type in the webpage content, so that the key data information on the webpage is protected more accurately, and it is difficult for a crawler program to obtain data that is to be crawled, thereby achieving a crawler-resistant effect. And when the preset page encryption configuration information is not configured with the font encryption type, determining the font encryption type configured in the second font encryption type configuration information which is default by the system as the font encryption type in the webpage content, thereby realizing the determination of the font encryption type of the webpage content.
After determining the element positioning position and font encryption type of the page encryption element of the webpage content in step S12, step S13 randomly selects a target font library from a preset font library, and adds the selected target font library (such as style tag information, font library file link information, etc.) to the current webpage content; in the step S14, the font encryption type determined in the step S12 is combined to replace the page content at the element positioning position in the web page content with the content in the target font library, so that the content of the web page to be encrypted is replaced with the content expressed in the target font library selected from the customized preset font library, thereby encrypting the web page content and achieving the purpose of ensuring the security of the web page content requested to be accessed by the user.
Another embodiment of the present application provides a method for encrypting web page content, further including:
the new page content after the web page content replacement is sent to the user equipment corresponding to the user, so that in the process of obtaining the web page content requested to be accessed by the user equipment corresponding to the user, the obtained new web page content is new web page content information obtained after the web page content replacement encryption, namely, a crawler program obtains a string of random messy code data, the real information of the web page content requested to be accessed by the user cannot be stolen, the accurate encryption processing of the web page is realized, the key data information on the web page is protected more accurately, and the effect of preventing the crawler is achieved.
Another embodiment of the present application provides a method for encrypting web page content, further including:
and updating each font library in the preset font libraries in real time or periodically. Here, updating each font library in the preset font library in real time or periodically includes but is not limited to adding, deleting, and modifying data in a certain font library in the preset font library or adding, deleting, and modifying the font library to the whole preset font library, so that the preset font library is updated, the encryption effect of the webpage content is improved, the key data information on the webpage is protected more accurately, and the purpose of preventing crawlers is achieved.
For example, each font library in the preset font libraries is updated in real time or periodically and is finally synchronized to each cloud platform or CDN system node for use by each cloud platform or CDN system node, so that the updating of the preset font libraries is realized, the encryption effect of the web page content is improved, the key data information on the web page is protected more accurately, and the purpose of preventing crawlers is achieved.
According to another aspect of the present application, there is also provided a computer readable medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the method of controlling user base alignment as described above.
According to another aspect of the present application, there is also provided a web page content encryption apparatus, comprising:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement a method of controlling user base station on a device as described above.
Here, for details of each embodiment of the apparatus, reference may be specifically made to corresponding parts of the embodiment of the method for controlling user base alignment at the apparatus end, and details are not described here again.
In summary, the application obtains the webpage content corresponding to the access request of the user; based on preset page encryption configuration information, acquiring an element positioning position of a webpage corresponding to the webpage content, and determining a font encryption type in the webpage content; randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content; according to the font encryption type, the page content on the element positioning position in the webpage content is replaced by the content in the target font library, namely, the key data information (namely, the page content) on the element positioning position of the webpage is replaced by the target font library, so that the accurate encryption processing of the webpage is realized, the key data information on the webpage is accurately protected, a crawler program is difficult to acquire the data of the webpage to be crawled, the effect of preventing the crawler is achieved, meanwhile, the risk of mistaken killing does not exist for the visitor who normally visits through a browser, the visitor can see all content information presented on the webpage, and the user experience is improved.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (9)

1. A method for encrypting web page content, the method comprising:
acquiring webpage content corresponding to an access request of a user;
acquiring a website service requirement of the user from user equipment;
configuring preset page encryption configuration information and a first enabling condition for a webpage to be acquired by the user according to the website service requirement;
acquiring an element positioning position of a webpage corresponding to webpage content based on preset webpage encryption configuration information, and determining a font encryption type in the webpage content, wherein the preset webpage encryption configuration information is to configure encryption information for the webpage to be acquired by a user according to the website service requirement of the user, and the preset webpage encryption configuration information comprises first webpage encryption element range configuration information and/or first font encryption type configuration information;
randomly selecting a target font library from a preset font library, and adding the target font library to the webpage content;
and replacing the page content at the element positioning position in the webpage content with the content in the target font library according to the font encryption type.
2. The method of claim 1, wherein obtaining the element-locating position of the web page corresponding to the web page content further comprises:
and positioning the page encryption element on the webpage content to obtain an element positioning position.
3. The method according to claim 1, wherein before the obtaining of the content of the webpage corresponding to the access request of the user, the method further comprises:
starting a content encryption function of the webpage which the user requests to access;
judging whether the webpage which the user requests to access is configured with a first enabling condition for starting the content encryption function or not,
if not, the system defaults that the webpage page which the user requests to access meets a second enabling condition for starting the content encryption function;
and if so, performing condition matching on the webpage which the user requests to access and a configured first enabling condition.
4. The method of claim 1, wherein the obtaining an element positioning position of a web page corresponding to the web page content based on preset page encryption configuration information and determining a font encryption type in the web page content comprises:
judging whether a page encryption element range is configured in the preset page encryption configuration information or not,
if not, positioning the page encryption element of the webpage content according to the default second page encryption element range configuration information of the system to obtain an element positioning position,
if so, positioning the page encryption element of the webpage content according to the first page encryption element range configuration information to obtain an element positioning position;
and determining the font encryption type in the webpage content based on the first font encryption type configuration information.
5. The method of claim 4, wherein determining the font encryption type in the webpage content based on the first font encryption type configuration information comprises:
judging whether the font encryption type is configured in the preset page encryption configuration information or not,
if not, determining the font encryption type configured in the second font encryption type configuration information of the default system as the font encryption type in the webpage content;
and if so, determining the font encryption type configured in the first font encryption type configuration information as the font encryption type in the webpage content.
6. The method of any of claims 1-5, wherein the method further comprises:
and sending the new page content after the webpage content is replaced to user equipment corresponding to the user.
7. The method of any of claims 1-5, wherein the method further comprises:
and updating each font library in the preset font libraries in real time or periodically.
8. A computer readable medium having computer readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 7.
9. An apparatus for encryption of web page content, the apparatus comprising:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
CN202010328794.XA 2020-04-23 2020-04-23 Webpage content encryption method and equipment Active CN113553601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010328794.XA CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010328794.XA CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Publications (2)

Publication Number Publication Date
CN113553601A CN113553601A (en) 2021-10-26
CN113553601B true CN113553601B (en) 2023-04-18

Family

ID=78101124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010328794.XA Active CN113553601B (en) 2020-04-23 2020-04-23 Webpage content encryption method and equipment

Country Status (1)

Country Link
CN (1) CN113553601B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489839B (en) * 2022-01-12 2023-08-01 海南车智易通信息技术有限公司 Method and device for loading configuration data on page and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635622A (en) * 2008-07-24 2010-01-27 阿里巴巴集团控股有限公司 Method, system and equipment for encrypting and decrypting web page
CN109684843A (en) * 2018-12-25 2019-04-26 北京知道创宇信息技术有限公司 Data processing method and device
CN109862031A (en) * 2019-03-13 2019-06-07 娄奥林 A kind of methods of pair of anti-crawler of encryption
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN110990799A (en) * 2018-09-28 2020-04-10 北京国双科技有限公司 Data processing method, device and system for anti-crawler and storage medium
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635622A (en) * 2008-07-24 2010-01-27 阿里巴巴集团控股有限公司 Method, system and equipment for encrypting and decrypting web page
CN110990799A (en) * 2018-09-28 2020-04-10 北京国双科技有限公司 Data processing method, device and system for anti-crawler and storage medium
CN109684843A (en) * 2018-12-25 2019-04-26 北京知道创宇信息技术有限公司 Data processing method and device
CN109862031A (en) * 2019-03-13 2019-06-07 娄奥林 A kind of methods of pair of anti-crawler of encryption
CN110166465A (en) * 2019-05-27 2019-08-23 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of access request
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium

Also Published As

Publication number Publication date
CN113553601A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
US10491614B2 (en) Illegitimate typosquatting detection with internet protocol information
US20230231926A1 (en) Method and system for predicting a geographic location of a network entity
CN102594934B (en) Method and device for identifying hijacked website
ES2679286T3 (en) Distinguish valid users of robots, OCR and third-party solvers when CAPTCHA is presented
CN104584565B (en) Make the generaI investigation measurement data method and apparatus related to respondent&#39;s data
US9712532B2 (en) Optimizing security seals on web pages
CN109194671B (en) Abnormal access behavior identification method and server
US20140380477A1 (en) Methods and devices for identifying tampered webpage and inentifying hijacked web address
KR20180082504A (en) Methods and equipment for application information risk management
CN108282441B (en) Advertisement blocking method and device
CN107241292B (en) Vulnerability detection method and device
US10614417B2 (en) System and method for electronic lead verification
CN105897663A (en) Method for determining access authority, device and equipment
Kaur et al. Browser fingerprinting as user tracking technology
CA2855828C (en) Security systems and methods for encoding and decoding digital content
Franken et al. Exposing cookie policy flaws through an extensive evaluation of browsers and their extensions
CN113553601B (en) Webpage content encryption method and equipment
US20210176233A1 (en) Malicious website discovery using legitimate third party identifiers
US20140019575A1 (en) Maintaining Client-Side Persistent Data using Caching
KR100655492B1 (en) Web server vulnerability detection system and method of using search engine
CN104462392A (en) Statistical method and statistical device for sharing return traffic
CN111818038B (en) Network data acquisition and identification method and device
CN110598426B (en) Data communication method, device, equipment and storage medium based on information security
KR101978898B1 (en) Web scraping prevention system using characteristic value of user device and the method thereof
CN113609425A (en) Webpage data processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40062688

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant