CN114553519A - Webpage encryption method and device, electronic equipment and storage medium - Google Patents

Webpage encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114553519A
CN114553519A CN202210151436.5A CN202210151436A CN114553519A CN 114553519 A CN114553519 A CN 114553519A CN 202210151436 A CN202210151436 A CN 202210151436A CN 114553519 A CN114553519 A CN 114553519A
Authority
CN
China
Prior art keywords
webpage
resources
encryption
web page
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210151436.5A
Other languages
Chinese (zh)
Other versions
CN114553519B (en
Inventor
罗紫林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An International Smart City Technology Co Ltd
Original Assignee
Ping An International Smart City Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An International Smart City Technology Co Ltd filed Critical Ping An International Smart City Technology Co Ltd
Priority to CN202210151436.5A priority Critical patent/CN114553519B/en
Publication of CN114553519A publication Critical patent/CN114553519A/en
Application granted granted Critical
Publication of CN114553519B publication Critical patent/CN114553519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of artificial intelligence, and provides a webpage encryption method, which comprises the steps of firstly obtaining a webpage request command of a trusted communication terminal, analyzing the webpage request command to obtain a webpage response flow, calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background; and then, resource hiding is carried out on the webpage resources in the temporary background to form encrypted resources, then, the encrypted resources are deployed and encrypted again through a preset complex encryption program to form deployed resources, and the deployed resources are deployed in the webpage to complete webpage encryption response.

Description

Webpage encryption method and device, electronic equipment and storage medium
Technical Field
The invention relates to the field of artificial intelligence, relates to an encryption method, and particularly relates to a webpage encryption method, a webpage encryption device, electronic equipment and a computer-readable storage medium.
Background
In the big data era, data becomes a core competitiveness of enterprises, and some key data on webpages, such as information of commodity prices, transaction amounts, user contact ways and the like in shopping websites, are convenient for users to browse and simultaneously become targets for malicious crawlers to capture. How to prevent key data in a web page from being crawled by a crawler has become one of the primary tasks of a website.
The conventional webpage crawler-prevention method mainly carries out crawler identification by delaying loading of webpage contents and setting an access key, but often faces the problem that a user cannot be accurately identified as a normal access request or false user access of a crawler when facing an agent and a simulation kernel, if the normal user is easily identified as an illegal access user by mistake in a mode of intercepting the access user, and the normal loading speed of the webpage is influenced by setting the access key for identification. In addition, in theory, no matter what kind of change the webpage undergoes, the browser can be used for obtaining the complete content of the webpage, including texts and pictures and various webpage resources, essentially by the user, and a malicious user can always realize technical detection so as to obtain data on the webpage.
Therefore, a web page encryption method, apparatus, electronic device and storage medium capable of preventing a user from crawling information are needed.
Disclosure of Invention
The invention provides a webpage encryption method, a webpage encryption device, electronic equipment and a storage medium capable of preventing a user from crawling information, and aims to solve the problems that the conventional webpage crawler-prevention method mainly performs crawler identification by delaying loading of webpage contents and setting of an access key, but always faces the problem that the user cannot be accurately identified as a normal access request or a false user access of a crawler when facing agents and a simulation kernel, and if the normal user is easily identified as an illegal access user by mistake in a way of intercepting the access user, the normal loading speed of a webpage is influenced by setting of the access key for identification. In addition, in theory, no matter what kind of change the webpage undergoes, the browser can be used for obtaining the complete content of the webpage, including texts and pictures and various webpage resources, essentially by the user, and a malicious user can always realize technical detection so as to obtain the data on the webpage.
In order to achieve the above object, the present invention provides a web page encryption method, including:
acquiring a webpage request command of a trusted communication terminal, and analyzing the webpage request command to acquire a webpage response flow;
calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background;
hiding the resources of the webpage in the temporary background to form encrypted resources;
and deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and deploying the deployed resources in the webpage to complete webpage encryption response.
Optionally, the obtaining a web page request command of the trusted communication terminal, and parsing the web page request command to obtain a web page response procedure includes:
carrying out security verification on the communication terminal, and if the communication terminal passes the security verification, taking the communication terminal as a trusted communication terminal;
receiving a webpage request command sent by the trusted communication terminal;
splitting the webpage request command to acquire a command execution object and a command action;
and carrying out corresponding and sequencing on the command execution object and the command action to acquire a webpage response flow.
Optionally, the performing security verification on the communication terminal includes:
extracting information from the communication terminal to judge whether an encryption symbol or a token is added on the communication terminal; wherein,
if no encryption symbol or token is added on the communication end, acquiring a communication address of the communication end, and judging whether the communication address is in a preset communication range; if the communication address is within the preset communication range, the communication end passes the safety verification;
if the communication terminal is additionally provided with the encryption symbol and the token, judging whether the encryption symbol is matched with a preset encryption key or not, or judging whether the token is legal or not, and if the encryption symbol is matched with the preset encryption key or the token combination rule passes safety verification.
Optionally, the invoking a corresponding web resource according to the web response procedure and deploying the web resource in a temporary background includes:
calling corresponding resources in a webpage resource database according to the webpage response flow to form a response file;
dividing the response file according to functions to form webpage resources;
deploying the webpage resources on a preset temporary background; the temporary background is a temporary database preset between the webpage resource database and the webpage.
Optionally, the resource hiding the webpage resource in the temporary background to form an encrypted resource includes:
decomposing the webpage resources into a text area and an image area, wherein the text area bears the text resources, and the image area bears the picture resources;
connecting the character area through a preset special-shaped plug-in unit, enabling the special-shaped plug-in unit to generate special-shaped characters, and replacing the character resources through the special-shaped characters to form encrypted character sentences; connecting the image area through a preset image conversion plug-in unit so that the image conversion plug-in unit converts the pictures in the picture resources into point information pictures;
and compressing the point information picture to form an image easy to transmit, and taking the image easy to transmit and the encrypted text statement as encryption resources.
Optionally, the special-shaped plug-in is a True Type word-making plug-in; the image conversion plug-in is a two-dimensional lattice plug-in.
Optionally, the deploying complex encryption on the encrypted resource through a preset complex encryption program to form a deployed resource, and deploying the deployed resource in the web page to complete a web page encryption response includes:
transmitting the encrypted resources to a webpage, and carrying out complex encryption on the encrypted resources based on a secondary encryption symbol or block through a preset complex encryption program in the transmission process to form deployment resources;
and cracking the deployment resource added with the secondary encryption symbol or the block, and if the cracking is successful, displaying the deployment resource in the webpage through a preset verification program in the webpage to finish webpage encryption response.
In order to solve the above problem, the present invention further provides a web page encryption apparatus, including:
the command analysis unit is used for acquiring a webpage request command of a trusted communication terminal and analyzing the webpage request command to acquire a webpage response flow;
the resource calling unit is used for calling corresponding webpage resources according to the webpage response flow and deploying the webpage resources in a temporary background;
the resource encryption unit is used for hiding the resources of the webpage in the temporary background to form encrypted resources;
and the encryption deployment unit is used for deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployment resources, and deploying the deployment resources in the webpage to complete webpage encryption response.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the steps in the webpage encryption method.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the above-mentioned web page encryption method.
The method comprises the steps of firstly obtaining a webpage request command of a trusted communication terminal, analyzing the webpage request command to obtain a webpage response flow, calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background; and then, resource hiding is carried out on the webpage resources in the temporary background to form encrypted resources, then, the encrypted resources are deployed and encrypted again through a preset complex encryption program to form deployed resources, and the deployed resources are deployed in the webpage to complete webpage encryption response.
Drawings
Fig. 1 is a schematic flowchart of a web page encryption method according to an embodiment of the present invention;
fig. 2 is a schematic block diagram of a web page encryption apparatus according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an internal structure of an electronic device implementing a web page encryption method according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The conventional webpage crawler-prevention method mainly carries out crawler identification by delaying loading of webpage contents and setting an access key, but often faces the problem that a user cannot be accurately identified as a normal access request or false user access of a crawler when facing an agent and a simulation kernel, if the normal user is easily identified as an illegal access user by mistake in a mode of intercepting the access user, and the normal loading speed of the webpage is influenced by setting the access key for identification. In addition, in theory, no matter what kind of change the webpage undergoes, the browser can be used for obtaining the complete content of the webpage, including texts and pictures and various webpage resources, essentially by the user, and a malicious user can always realize technical detection so as to obtain data on the webpage.
In order to solve the above problems, the present invention provides a web page encryption method. Fig. 1 is a schematic flow chart of a web page encryption method according to an embodiment of the present invention. The method may be performed by an apparatus, which may be implemented by software and/or hardware.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
In this embodiment, the web page encryption method includes:
s1: acquiring a webpage request command of a trusted communication terminal, and analyzing the webpage request command to acquire a webpage response flow;
s2: calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background;
s3: hiding the resources of the webpage in the temporary background to form encrypted resources;
s4: and deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and deploying the deployed resources in the webpage to complete webpage encryption response.
In the embodiment shown in fig. 1, step S1 is a process of acquiring a web page request command of a trusted communication terminal, and parsing the web page request command to acquire a web page response flow, and includes:
s11: carrying out security verification on the communication terminal, and if the communication terminal passes the security verification, taking the communication terminal as a trusted communication terminal;
s12: receiving a webpage request command sent by the trusted communication terminal;
s13: splitting the webpage request command to acquire a command execution object and a command action;
s14: and carrying out corresponding and sequencing on the command execution object and the command action to acquire a webpage response flow.
The step S11 is a process of performing security verification on the communication terminal, including:
s111: extracting information from the communication terminal to judge whether an encryption symbol or a token is added on the communication terminal;
s112: if no encryption symbol or token is added, acquiring a communication address of the communication terminal, and judging whether the communication address is in a preset communication range; if the communication address is within the preset communication range, the communication end passes the safety verification; if the communication terminal is additionally provided with an encryption symbol and a token, judging whether the encryption symbol is matched with a preset encryption key or not, or judging whether the token is legal or not, and if the encryption symbol is matched with the preset encryption key or the token combination rule passes safety verification;
specifically, step S11 is a process of performing security verification on the communication end, and if the communication end passes the security verification, the communication end is used as a trusted communication end, where multiple encryption manners with encryption property verification, such as a key, an encryption symbol, a token, and the like, may be used for performing the security verification, and if the key is used, the communication end with the authority needs to be obtained in advance, and the encryption symbol is set on the communication end with the authority, and the web server end is provided with a key that can be matched with the encryption symbol; if the token is adopted, firstly, sending an instruction to a webpage server by a communication terminal, then judging whether the instruction carries the token, and if the instruction carries an access token, judging whether the token is qualified; if the token is qualified, the command is sent to a webpage server so that the webpage server marks the communication section and the communication end passes the security verification; the communication end passing the security verification is used as a trusted communication end;
step S12 is a process of receiving a web page request command sent by a trusted communication terminal, where the web page request command may be a command for sending an operation request to any internet friend, a web page turning request, or a connection request of any clickable button in the web page, and is not limited herein;
step S13 is a process of splitting the web page request command to obtain a command execution object and a command action, that is, parsing and splitting the web page request command to split the web page request command into a command execution object and a command action, where the command execution object refers to an object in the web page request command, for example, if the web page request command is to open a shopping web page, the object of the web page request command is to open the shopping web page, and if the web page request command is to close the shopping web page, the command action in the web page request command is to open the shopping web page, and if the web page request command is to close the command action;
step S14 is to perform correspondence and sorting on the command execution object and the command action to obtain a web page response flow, that is, to comb the command execution object and the command action from the perspective of the web server to form a smooth web page response flow, for example, what the web server needs to do in the first step, what the web server needs to do in the second step, and so on.
In the embodiment shown in fig. 1, step S2 is a process of calling a corresponding web resource according to the web response flow, and deploying the web resource in a temporary background, where the process includes:
s21: calling corresponding resources in a webpage resource database according to the webpage response flow to form a response file;
s22: dividing the response file according to functions to form webpage resources; the web page resources at least comprise picture resources and character resources and also comprise block resources (not described too much) according to the functional division;
s23: deploying the webpage resources on a preset temporary background; the temporary background is a temporary database preset between a webpage resource database and a webpage;
specifically, step S21 is a process of calling a preset resource in a web resource database according to a web response procedure to form a response file, where the corresponding file includes all data that can complete a web request, load, and correspond to the web request command, but the data is corresponding to the web request command and is not unified with a format of web deployment, so that the response file needs to be divided according to functions to form web resources through step S22, where the web resources include picture resources, text resources, and block resources, that is, the response file is combed according to functions, and thus the response file is converted into a network resource divided according to functions; then step S23 is executed to deploy the network resource directly in the temporary background.
In the embodiment shown in fig. 1, step S3 is a process of resource hiding the web page resource in the temporary background to form an encrypted resource, where the process includes:
s31: decomposing the webpage resources into a text area and an image area, wherein the text area bears the text resources, and the image area bears the picture resources;
s32: connecting the character area through a preset special-shaped plug-in unit to enable the special-shaped plug-in unit to generate special-shaped characters, and replacing the character resources with the special-shaped characters to form encrypted character sentences; connecting the image area through a preset image conversion plug-in unit so that the image conversion plug-in unit converts the pictures in the picture resources into point information pictures; the special-shaped plug-in is a True Type word-making plug-in; the image conversion plug-in is a two-dimensional lattice plug-in;
s33: compressing the point information picture to form an image easy to transmit, and taking the image easy to transmit and the encrypted text statement as encryption resources;
further comprising: establishing a corresponding relation between the special-shaped words and the word resources, and storing the corresponding relation into a preset word library, namely considering the transmission performance problem, different strategies need to be executed for different webpage resources, for example, a text can be formed into a font library or an entire library of pages in the compiling process by picture type, so that the time of the transmission process is reduced by multiplexing;
specifically, step S31 is to decompose the web page resource into a text area and an image area, where the text area bears text resources, the image area bears picture resources, the text resources are sentences or text paragraphs, and the picture resources are image contents related to the web page;
step S32 is to make the special-shaped plug-in generate special-shaped words and replace the word resources by the special-shaped words to form encrypted word sentences; in the process of converting the picture in the picture resource into the point information picture by the image conversion plug-in, for the encrypted character statement, the non-text abnormity can be carried out on the character Type resource in a SVG (scalable vector graphics) or a True Type word making mode in Windows; for pictures, picture type resources can be converted in an SVG form, the pictures are converted into point information of the SVG and displayed, the awkward situation that real picture addresses are needed and cannot be hidden can be abandoned in the mode, and for the picture format, SVG data can be compressed in a compiling period due to the fact that the standard SVG format is large in size; moreover, pictures or characters are determined and can be pixelated, and the position information of the css layout can be ignored in the compiling process by considering hiding the details of the webpage, and a block pixelated dot information stream which is further latticed is directly formed by compiling the plug-in. In the webpage loading process, text transmission and picture transmission do not exist, and only the pixel stream of the informationized module is transmitted.
In the embodiment shown in fig. 1, step S4 is a process of deploying complex encryption on the encrypted resource by a preset complex encryption program to form a deployed resource, and deploying the deployed resource in a web page to complete a web page encryption response, where the process includes:
s41: transmitting the encrypted resources to a webpage, and carrying out complex encryption on the encrypted resources based on a secondary encryption symbol or block through a preset complex encryption program in the transmission process to form deployment resources;
s42: cracking the deployment resource added with the secondary encryption symbol or the block, and if the cracking is successful, displaying the deployment resource in the webpage through a preset verification program in the webpage to finish webpage encryption response; the cracking mode is not specifically limited, and may be a mode in which a user inputs a password, a mode in which a user inputs a password to convert the password into a key, or a mode in which automatic cracking is performed based on a host IP, which is not described herein again.
Because the resource encryption is carried out, text transmission and picture transmission do not exist any more in the webpage loading process, only information module pixel stream transmission exists, encryption or malicious and useless blocks can be added in the stream transmission process, malicious interception and use are prevented from being carried out midway, cracking verification is carried out before display, after the block stream is received, the specified position is analyzed through pixels, and no characters and pictures are transmitted in the whole process, so that a terminal user does not have text and picture contents which can be recognized by human eyes and machines when requesting webpage resources through conversion carried out in the compiling process, the safety is fundamentally improved, and if the process is matched with doped encryption of identity verification, the safety and the performance are better cooperated. Therefore, the performance and the safety of the webpage content can be dynamically adjusted, the overall performance exceeds the original performance, the communication end user cannot acquire text and picture type resources, the crawler loses the armed place, the identity of the target user can be verified, the communication end user still needs to pass the logic of verification decryption after acquiring the webpage data, the display effect better than the original webpage can be formed by multiplexing and compressing the pages with more pictures and text contents, the vector effect can be thought of through two-dimensionality, and the theoretical picture definition can be higher.
As described above, in the webpage encryption method in the embodiment of the present invention, a webpage request command of a trusted communication terminal is first obtained, and the webpage request command is analyzed to obtain a webpage response flow, and then a corresponding webpage resource is called according to the webpage response flow, and the webpage resource is deployed in a temporary background; and then, resource hiding is carried out on the webpage resources in the temporary background to form encrypted resources, then, the encrypted resources are deployed and encrypted again through a preset complex encryption program to form deployed resources, and the deployed resources are deployed in the webpage to complete webpage encryption response.
As mentioned above, in the embodiment shown in fig. 1, the method provided by the present invention has the following advantages:
1. if the security verification is passed, the communication end is used as a trusted communication end, if a secret key is adopted, the communication end with the authority needs to be obtained in advance, an encryption symbol is set on the communication end with the authority, and the secret key which can be matched with the encryption symbol is set on the webpage server end; if the token is adopted, firstly, sending an instruction to a webpage server by a communication terminal, then judging whether the instruction carries the token, and if the instruction carries an access token, judging whether the token is qualified; if the token is qualified, the command is sent to a webpage server so that the webpage server marks the communication section and the communication end passes the security verification; the communication end which passes the safety verification is used as a trusted communication end, so that a first protection barrier is established, and information crawling by a crawler is prevented;
2. converting the response file into network resources divided according to functions; then, network resources are directly deployed in a temporary background, so that a terminal user cannot acquire text and picture type resources, and a crawler loses the armed place;
3. in the temporary background, hiding the resources of the webpage resources to form encrypted resources; specifically, the word resources are replaced by the special-shaped words to form encrypted word sentences; in the process of converting the picture in the picture resource into the point information picture by the image conversion plug-in, for the encrypted character statement, the non-text abnormity can be carried out on the character Type resource in a SVG (scalable vector graphics) or a True Type word making mode in Windows; for pictures, converting picture type resources in an SVG form, and converting the pictures into point information of the SVG for displaying;
4. because the resource encryption is carried out, text transmission and picture transmission do not exist any more in the webpage loading process, only information module pixel stream transmission exists, encryption or malicious and useless blocks can be added based on a preset complex encryption program in the stream transmission process, malicious interception and use are prevented in the midway, namely, the encrypted resources are encrypted again based on the secondary encryption symbol or the block through a preset re-encryption program to form deployment resources, then the deployment resources added with the secondary encryption symbol or the block are cracked, if the cracking is successful, the deployment resource is displayed in the web page through a verification program preset in the web page to complete verification of the web page encryption response before display, and thus, the user performs the complex encryption before acquiring the webpage content, and no characters and pictures are transmitted in the whole process, so that the safety of webpage display is further improved.
As shown in fig. 2, the present invention provides a web page encryption apparatus 100, which can be installed in an electronic device. According to the implemented functions, the web page encryption device 100 may include a command parsing unit 101, a resource calling unit 102, a resource encryption unit 103, and an encryption deployment unit 104. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the command analysis unit 101 is configured to obtain a web page request command of a trusted communication terminal, and analyze the web page request command to obtain a web page response procedure;
the resource calling unit 102 is configured to call a corresponding web resource according to the web response flow, and deploy the web resource in a temporary background;
the resource encryption unit 103 is configured to perform resource hiding on the web page resource in the temporary background to form an encrypted resource;
and the encryption deployment unit 104 is configured to deploy complex encryption on the encrypted resource through a preset complex encryption program to form a deployment resource, and deploy the deployment resource in the webpage to complete a webpage encryption response.
The process of acquiring a web page request command of a trusted communication terminal and analyzing the web page request command to acquire a web page response procedure by the command analyzing unit 101 includes:
s11: carrying out security verification on the communication terminal, and if the communication terminal passes the security verification, taking the communication terminal as a trusted communication terminal;
s12: receiving a webpage request command sent by the trusted communication terminal;
s13: splitting the webpage request command to acquire a command execution object and a command action;
s14: and carrying out corresponding and sequencing on the command execution object and the command action to acquire a webpage response flow.
The step S11 is a process of performing security verification on the communication terminal, including:
s111: extracting information from the communication terminal to judge whether an encryption symbol or a token is added on the communication terminal;
s112: if no encryption symbol or token is added, acquiring a communication address of the communication end, and judging whether the communication address is in a preset communication range; if the communication address is within the preset communication range, the communication end passes the safety verification; if the communication terminal is additionally provided with the encryption symbol and the token, judging whether the encryption symbol is matched with a preset encryption key or not, or judging whether the token is legal or not, and if the encryption symbol is matched with the preset encryption key or the token combination rule passes safety verification.
The process that the resource calling unit 102 calls the corresponding webpage resource according to the webpage response flow and deploys the webpage resource in a temporary background includes:
s21: calling a preset resource in a webpage resource database according to the webpage response flow to form a response file;
s22: dividing the response file according to functions to form webpage resources; the web page resources at least comprise picture resources and text resources and also can comprise block resources (not described too much herein) according to the functional division;
s23: and deploying the webpage resources on a preset temporary background, wherein the temporary background is a temporary database preset between a webpage resource database and a webpage.
The process of hiding the resources of the web page in the temporary background by the resource encryption unit 103 to form encrypted resources includes:
s31: decomposing the webpage resources into a text area and an image area, wherein the text area bears the text resources, and the image area bears the picture resources;
s32: connecting the character area through a preset special-shaped plug-in unit, enabling the special-shaped plug-in unit to generate special-shaped characters, and replacing the character resources through the special-shaped characters to form encrypted character sentences; connecting the image area through a preset image conversion plug-in unit so that the image conversion plug-in unit converts the pictures in the picture resources into point information pictures; the special-shaped plug-in is a True Type word-making plug-in; the image conversion plug-in is a two-dimensional lattice plug-in;
s33: compressing the point information picture to form an image easy to transmit, and taking the image easy to transmit and the encrypted text statement as encryption resources;
further comprising: and establishing a corresponding relation between the special-shaped words and the word resources, and storing the corresponding relation into a preset word library, namely considering the transmission performance problem, different strategies need to be executed for different webpage resources, for example, a text can form a font library or an entire library of pages in the compiling process by using the picture type, so that the time for reusing and reducing the transmission process is formed.
Specifically, step S31 is to decompose the web page resource into a text area and an image area, where the text area bears text resources, the image area bears picture resources, the text resources are sentences or text paragraphs, and the picture resources are image contents related to the web page;
step S32 is to make the special-shaped plug-in generate special-shaped words and replace the word resources by the special-shaped words to form encrypted word sentences; in the process of converting the picture in the picture resource into the point information picture by the image conversion plug-in, for the encrypted character statement, the non-text abnormity can be carried out on the character Type resource in a SVG (scalable vector graphics) or a True Type word making mode in Windows; for pictures, picture type resources can be converted in an SVG form, the pictures are converted into point information of the SVG and displayed, the awkward situation that real picture addresses are needed and cannot be hidden can be abandoned in the mode, and for the picture format, SVG data can be compressed in a compiling period due to the fact that the standard SVG format is large in size; moreover, pictures or characters are determined and can be pixelated, and the position information of the css layout can be ignored in the compiling process by considering hiding the details of the webpage, and a block pixelated dot information stream which is further latticed is directly formed by compiling the plug-in. In the webpage loading process, text transmission and picture transmission do not exist, and only the pixel stream of the informationized module is transmitted.
The process that the encryption deployment unit 104 deploys the complex encryption on the encrypted resource through a preset complex encryption program to form a deployment resource, and deploys the deployment resource in the webpage to complete the webpage encryption response includes:
s41: transmitting the encrypted resources to a webpage, and carrying out complex encryption on the encrypted resources based on a secondary encryption symbol or block through a preset complex encryption program in the transmission process to form deployment resources;
s42: and cracking the deployment resource added with the secondary encryption symbol or the block, and if the cracking is successful, displaying the deployment resource in the webpage through a preset verification program in the webpage to finish webpage encryption response.
The specific implementation steps refer to the specific embodiment of the above-mentioned web page encryption method, and are not described herein again.
As described above, in the web page encryption apparatus 100 provided by the present invention, first, the command parsing unit 101 obtains the web page request command of the trusted communication terminal, and parses the web page request command to obtain the web page response flow, and then the resource calling unit 102 calls the corresponding web page resource according to the web page response flow, and deploys the web page resource in the temporary background; then, resource hiding is carried out on the webpage resources in the temporary background based on the resource encryption unit 103 to form encrypted resources, then the encryption deployment unit 104 is used for deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and the deployed resources are deployed in the webpage to complete webpage encryption response, so that a communication end user cannot directly obtain text and picture type resources, and a crawler loses the use of the resources.
The webpage encryption device provided by the invention has the following advantages: 1. if the security verification is passed, the communication end is used as a trusted communication end, if a secret key is adopted, the communication end with the authority needs to be obtained in advance, an encryption symbol is set on the communication end with the authority, and the secret key which can be matched with the encryption symbol is set on the webpage server end; if the token is adopted, firstly, sending an instruction to a webpage server by a communication terminal, then judging whether the instruction carries the token, and if the instruction carries an access token, judging whether the token is qualified; if the token is qualified, the command is sent to a webpage server so that the webpage server marks the communication section and the communication end passes the security verification; the communication end which passes the safety verification is used as a trusted communication end, so that a first protection barrier is established, and information crawling by a crawler is prevented; 2. converting the response file into network resources divided according to functions; then, network resources are directly deployed in a temporary background, so that a terminal user cannot acquire text and picture type resources, and a crawler loses the armed place; 3. replacing the word resources by the special-shaped words to form encrypted word sentences; in the process of converting the picture in the picture resource into the point information picture by the image conversion plug-in, for the encrypted character statement, the non-text abnormity can be carried out on the character Type resource in a SVG (scalable vector graphics) or a True Type word making mode in Windows; for pictures, converting picture type resources in an SVG form, and converting the pictures into point information of the SVG for displaying; 4. due to resource encryption, text transmission and picture transmission do not exist any more in the webpage loading process, only information module pixel stream transmission exists, encryption or malicious and useless blocks can be added in the stream transmission process, malicious interception and use are prevented midway, verification is performed before display, after the block stream is received, the block stream is analyzed to a designated position through pixels, no characters and pictures are transmitted in the whole process, and the webpage display safety is further improved.
As shown in fig. 3, the present invention provides an electronic device 1 for a web page encryption method.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus, and may further comprise a computer program, such as a web page encryption program 12, stored in the memory 11 and executable on said processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as a web page encrypted code, etc., but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (e.g., web page encryption programs, etc.) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 3 shows only an electronic device with components, and it will be understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The web page encryption program 12 stored in the memory 11 of the electronic device 1 is a combination of instructions, which when executed in the processor 10, can implement:
s1: acquiring a webpage request command of a trusted communication terminal, and analyzing the webpage request command to acquire a webpage response flow;
s2: calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background;
s3: hiding the resources of the webpage in the temporary background to form encrypted resources;
s4: and deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and deploying the deployed resources in the webpage to complete webpage encryption response.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again. It should be emphasized that, in order to further ensure the privacy and security of the encryption of the web page, the encrypted data of the web page is stored in the node of the blockchain where the server cluster is located.
The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
An embodiment of the present invention further provides a computer-readable storage medium, where the storage medium may be nonvolatile or volatile, and the storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements:
s1: acquiring a webpage request command of a trusted communication terminal, and analyzing the webpage request command to acquire a webpage response flow;
s2: calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background;
s3: hiding the resources of the webpage in the temporary background to form encrypted resources;
s4: and deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and deploying the deployed resources in the webpage to finish webpage encryption response.
Specifically, the specific implementation method of the computer program when being executed by the processor may refer to the description of the relevant steps in the webpage encryption method in the embodiment, which is not described herein again.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for encrypting a web page, comprising:
acquiring a webpage request command of a trusted communication terminal, and analyzing the webpage request command to acquire a webpage response flow;
calling corresponding webpage resources according to the webpage response flow, and deploying the webpage resources in a temporary background;
hiding the resources of the webpage in the temporary background to form encrypted resources;
and deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployed resources, and deploying the deployed resources in the webpage to finish webpage encryption response.
2. The web page encryption method according to claim 1, wherein the obtaining of the web page request command of the trusted communication terminal and the parsing of the web page request command to obtain the web page response flow comprises:
carrying out security verification on the communication terminal, and if the communication terminal passes the security verification, taking the communication terminal as a trusted communication terminal;
receiving a webpage request command sent by the trusted communication terminal;
splitting the webpage request command to acquire a command execution object and a command action;
and carrying out corresponding and sequencing on the command execution object and the command action to acquire a webpage response flow.
3. The web page encryption method according to claim 2, wherein the performing security authentication on the communication terminal comprises:
extracting information from the communication terminal to judge whether an encryption symbol or a token is added on the communication terminal; wherein,
if no encryption symbol or token is added on the communication end, acquiring a communication address of the communication end, and judging whether the communication address is in a preset communication range; if the communication address is within the preset communication range, the communication end passes the safety verification;
if the communication terminal is additionally provided with the encryption symbol and the token, judging whether the encryption symbol is matched with a preset encryption key or not, or judging whether the token is legal or not, and if the encryption symbol is matched with the preset encryption key or the token combination rule passes safety verification.
4. The web page encryption method according to claim 1, wherein the calling the corresponding web page resource according to the web page response flow and deploying the web page resource in a temporary background comprises:
calling corresponding resources in a webpage resource database according to the webpage response flow to form a response file;
dividing the response file according to functions to form webpage resources;
deploying the webpage resources on a preset temporary background; the temporary background is a temporary database preset between the webpage resource database and the webpage.
5. The web page encryption method of claim 1, wherein resource hiding the web page resources in the temporary background to form encrypted resources comprises:
decomposing the webpage resource into a text area and an image area, wherein the text area bears the text resource, and the image area bears the picture resource;
connecting the character area through a preset special-shaped plug-in unit, enabling the special-shaped plug-in unit to generate special-shaped characters, and replacing the character resources through the special-shaped characters to form encrypted character sentences; connecting the image area through a preset image conversion plug-in unit so that the image conversion plug-in unit converts the pictures in the picture resources into point information pictures;
and compressing the point information picture to form an image easy to transmit, and taking the image easy to transmit and the encrypted text sentence as encryption resources.
6. The web page encryption method of claim 5, wherein resource hiding the web page resources in the temporary background to form encrypted resources comprises:
the special-shaped plug-in is a True Type word-making plug-in; the image conversion plug-in is a two-dimensional lattice plug-in.
7. The web page encryption method according to claim 1, wherein the deploying complex encryption on the encrypted resource by a preset complex encryption program to form a deployed resource, and deploying the deployed resource in the web page to complete a web page encryption response comprises:
transmitting the encrypted resources to a webpage, and carrying out complex encryption on the encrypted resources through a preset complex encryption program based on a secondary encryption symbol or block in the transmission process to form deployment resources;
and cracking the deployment resource added with the secondary encryption symbol or the block, and if the cracking is successful, displaying the deployment resource in the webpage through a preset verification program in the webpage to finish webpage encryption response.
8. An apparatus for encrypting a web page, the apparatus comprising:
the command analysis unit is used for acquiring a webpage request command of a trusted communication terminal and analyzing the webpage request command to acquire a webpage response flow;
the resource calling unit is used for calling corresponding webpage resources according to the webpage response flow and deploying the webpage resources in a temporary background;
the resource encryption unit is used for hiding the resources of the webpage in the temporary background to form encrypted resources;
and the encryption deployment unit is used for deploying complex encryption on the encrypted resources through a preset complex encryption program to form deployment resources, and deploying the deployment resources in the webpage to complete webpage encryption response.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the steps in the web page encryption method of any one of claims 1 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the web page encryption method according to any one of claims 1 to 7.
CN202210151436.5A 2022-02-18 2022-02-18 Webpage encryption method and device, electronic equipment and storage medium Active CN114553519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210151436.5A CN114553519B (en) 2022-02-18 2022-02-18 Webpage encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210151436.5A CN114553519B (en) 2022-02-18 2022-02-18 Webpage encryption method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114553519A true CN114553519A (en) 2022-05-27
CN114553519B CN114553519B (en) 2024-07-05

Family

ID=81675856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210151436.5A Active CN114553519B (en) 2022-02-18 2022-02-18 Webpage encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114553519B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6938170B1 (en) * 2000-07-17 2005-08-30 International Business Machines Corporation System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme
KR20070049792A (en) * 2005-11-09 2007-05-14 노용숙 Transmitting and receiving system for transforming encoding and decoding multimedia contents produced in a terminal and the method for the same
US20140143539A1 (en) * 2011-06-28 2014-05-22 Connet D.O.O. Web tokens with a signature of a web page visitor
CN104217136A (en) * 2013-06-05 2014-12-17 北京齐尔布莱特科技有限公司 Method and system for preventing web page text message from being captured automatically
US9736130B1 (en) * 2013-07-05 2017-08-15 Sonus Networks, Inc. Communications methods and apparatus related to web initiated sessions
CN107220291A (en) * 2017-04-25 2017-09-29 深圳中兴网信科技有限公司 The method and system of the anti-crawl of web data
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system
CN110363117A (en) * 2019-06-28 2019-10-22 深圳数位传媒科技有限公司 A kind of method and device that encrypted random coded character file is parsed
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium
CN111859853A (en) * 2020-08-04 2020-10-30 浪潮卓数大数据产业发展有限公司 Webpage text encryption and decryption method based on random font

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6938170B1 (en) * 2000-07-17 2005-08-30 International Business Machines Corporation System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme
KR20070049792A (en) * 2005-11-09 2007-05-14 노용숙 Transmitting and receiving system for transforming encoding and decoding multimedia contents produced in a terminal and the method for the same
US20140143539A1 (en) * 2011-06-28 2014-05-22 Connet D.O.O. Web tokens with a signature of a web page visitor
CN104217136A (en) * 2013-06-05 2014-12-17 北京齐尔布莱特科技有限公司 Method and system for preventing web page text message from being captured automatically
US9736130B1 (en) * 2013-07-05 2017-08-15 Sonus Networks, Inc. Communications methods and apparatus related to web initiated sessions
CN107220291A (en) * 2017-04-25 2017-09-29 深圳中兴网信科技有限公司 The method and system of the anti-crawl of web data
CN110321673A (en) * 2018-03-28 2019-10-11 北京京东尚科信息技术有限公司 Information ciphering method and device, information decryption method and device, security system
CN110363117A (en) * 2019-06-28 2019-10-22 深圳数位传媒科技有限公司 A kind of method and device that encrypted random coded character file is parsed
CN111008348A (en) * 2019-11-28 2020-04-14 盛业信息科技服务(深圳)有限公司 Anti-crawler method, terminal, server and computer readable storage medium
CN111859853A (en) * 2020-08-04 2020-10-30 浪潮卓数大数据产业发展有限公司 Webpage text encryption and decryption method based on random font

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王勇: "高效恶意网页检测技术研究与应用", 中国优秀硕士学位论文全文数据库 信息科技辑, 15 January 2022 (2022-01-15), pages 139 - 314 *

Also Published As

Publication number Publication date
CN114553519B (en) 2024-07-05

Similar Documents

Publication Publication Date Title
CN110602052B (en) Micro-service processing method and server
CN113806806B (en) Desensitization and restoration method and system for webpage screenshot
CN104766001A (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
JP7077425B2 (en) Checking the display of third-party content on client devices
CN113704614A (en) Page generation method, device, equipment and medium based on user portrait
CN114844792B (en) Dynamic monitoring method, device, equipment and storage medium based on LUA language
CN112506779A (en) Software interface testing method and device, electronic equipment and storage medium
CN114626079A (en) File viewing method, device, equipment and storage medium based on user permission
CN113810375B (en) Webshell detection method, device and equipment and readable storage medium
CN113779528A (en) Multi-system front-end page integration method, device, equipment and medium
CN114553519B (en) Webpage encryption method and device, electronic equipment and storage medium
CN115016754A (en) Method and device for synchronously displaying pages among devices, electronic device and medium
CN108052842A (en) Storage, verification method and the device of signed data
CN114625700A (en) Authority-based file display method, device, equipment and storage medium
CN114826725A (en) Data interaction method, device, equipment and storage medium
CN115001768A (en) Data interaction method, device and equipment based on block chain and storage medium
CN113989548A (en) Certificate classification model training method and device, electronic equipment and storage medium
CN111679862A (en) Cloud host shutdown method and device, electronic equipment and medium
CN113703995B (en) Front-end and back-end data interaction method and device, electronic equipment and storage medium
CN113791695B (en) Password input method, device, electronic equipment and storage medium
CN114417195A (en) Data processing method, device, equipment and medium based on two-dimension code
CN112632431B (en) Content sharing method, device and computer readable storage medium
KR102629560B1 (en) Method and system for OCR processing of document having transfer-prohibited information
CN110046508B (en) Service code value processing method, device and equipment
CN106997521A (en) Insure information processing method and device based on API

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant