CN115221442A - Webpage loading method and device, computer equipment and computer readable storage medium - Google Patents

Webpage loading method and device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN115221442A
CN115221442A CN202210910961.0A CN202210910961A CN115221442A CN 115221442 A CN115221442 A CN 115221442A CN 202210910961 A CN202210910961 A CN 202210910961A CN 115221442 A CN115221442 A CN 115221442A
Authority
CN
China
Prior art keywords
information
loading
webpage
target user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210910961.0A
Other languages
Chinese (zh)
Inventor
唐冬雪
赵书军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202210910961.0A priority Critical patent/CN115221442A/en
Publication of CN115221442A publication Critical patent/CN115221442A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching

Abstract

The invention relates to an artificial intelligence technology and discloses a webpage loading method, a device, computer equipment and a computer readable storage medium, wherein the webpage loading method comprises the following steps: the method comprises the steps of obtaining identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user, carrying out security verification on the identity information when the identity information is determined not to be related to the webpage information, generating authority information according to the identity information passing the security verification, obtaining a loading requirement of the target user, generating a loading flow according to the loading requirement and the authority information, and loading webpage content corresponding to the webpage information through the loading flow. The webpage loading method provided by the invention generates the corresponding authority information by carrying out the security verification without perception on the unassociated users, and realizes the personalized and intelligent webpage loading effect according to the authority information, thereby improving the security and convenience of user registration and login and the personalized and intelligent degree of webpage loading.

Description

Webpage loading method and device, computer equipment and computer readable storage medium
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to a webpage loading method and device, computer equipment and a computer readable storage medium.
Background
At present, a user can log in a plurality of different website accounts, specifically, when the user registers and logs in a website to be loaded, the user can generate corresponding identity information according to an account corresponding to the user on another website, and register and log in the website to be loaded with the identity information, and the website to be loaded can load corresponding content after the login is determined to be completed.
However, for a website to be loaded, it is difficult to ensure the authenticity of identity information by registering a user according to the identity information of an account on another website, so that a certain potential safety hazard exists.
Therefore, how to improve the security and the rapidity of web page loading is a hot topic that those skilled in the art are studying.
Disclosure of Invention
The embodiment of the invention provides a webpage loading method, a webpage loading device, computer equipment and a computer readable storage medium, aiming at improving the security and the convenience of user registration and login before webpage loading, the personalization and the intelligence during webpage loading and realizing the security authentication of a user without perception.
In a first aspect, an embodiment of the present invention provides a method for loading a web page, including:
acquiring identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user;
when the identity information is determined not to be related to the webpage information, carrying out security verification on the identity information;
generating authority information corresponding to the webpage information according to the identity information passing the safety verification;
acquiring a loading requirement of a target user, and generating a loading flow according to the loading requirement and authority information;
and loading the webpage content corresponding to the webpage information through a loading process.
In some embodiments, securely verifying identity information includes:
querying a historical request record of a target user requesting to load a webpage in a preset time period;
determining an operation safety factor of a target user according to the historical request record;
and when the operation safety factor is greater than the preset threshold value, determining that the corresponding identity information passes the safety verification.
In some embodiments, the history request record at least includes network address information used when the target user inputs a login request in a preset time period, and the operation safety factor of the target user is determined according to the history request record, including:
analyzing the historical request record to obtain contact information and an identity character string used by a target user when the target user requests to load a webpage;
determining a first safety factor corresponding to the contact information and a second safety factor corresponding to the identity character string according to the network address information;
and generating an operation safety factor according to the first safety factor and the second safety factor.
In some embodiments, determining a first security factor for the contact information includes:
acquiring single contact information of a target user according to the network address information and the contact information, and determining the repeated use times of the single contact information in a preset time period;
determining common contact information and non-common contact information in single contact information based on the repeated use times;
calculating the sample proportion of the common contact information in the contact information, and determining the sample quantity of the non-common contact information;
and determining a first safety factor according to the sample proportion of the common contact information and the sample number of the non-common contact information.
In some embodiments, determining a second security factor corresponding to the identity string comprises:
calling a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples;
inquiring an identity character string sample matched with the identity character string in the identity character string sample set, and extracting a corresponding network address information sample;
a geographical span of the network address information samples is calculated to determine a second safety factor.
In some embodiments, generating a loading flow according to a loading requirement and authority information includes:
determining the user level of the target user according to the authority information;
and matching optional flows corresponding to the user levels in a preset operation authority library, and determining a loading flow in the optional flows according to loading requirements.
In some embodiments, loading web page content corresponding to the web page information through a loading process includes:
acquiring pre-loading information of the webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to an operable control and a second position of a popup area corresponding to a popup in the webpage information;
determining the sequence between the loading control area and the loading popup area according to the loading process;
loading an operable control at a first position in the case of a control region being loaded first;
and correcting the second position according to the first position to obtain a third position, and loading the pop-up window at the third position.
In a second aspect, an embodiment of the present invention further provides a web page loading apparatus, including:
the request processing module is used for acquiring the identity information of the target user and the webpage information requested to be logged in by the target user according to the webpage login request input by the target user;
the safety verification module is used for performing safety verification on the identity information when the identity information does not relate to the webpage information;
the authority information generating module is used for generating authority information corresponding to the webpage information according to the identity information passing the security verification;
the loading flow generation module is used for acquiring the loading requirement of the target user and generating a loading flow according to the loading requirement and the authority information;
and the loading execution module is used for loading the webpage content corresponding to the webpage information through a loading process.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes a memory and a processor;
a memory for storing a computer program;
a processor, configured to execute the computer program and, when executing the computer program, implement any one of the web page loading methods provided in this specification.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the processor is enabled to implement any one of the web page loading methods provided in the embodiments of the present specification.
The embodiment of the invention provides a webpage loading method, a webpage loading device, computer equipment and a computer readable storage medium, wherein the webpage loading method comprises the following steps: the method comprises the steps of obtaining identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user, carrying out security verification on the identity information when the identity information is determined not to be related to the webpage information, generating authority information corresponding to the webpage information according to the identity information passing the security verification, obtaining a loading requirement of the target user, generating a loading flow according to the loading requirement and the authority information, and loading webpage content corresponding to the webpage information through the loading flow. The webpage loading method provided by the invention generates the corresponding authority information by carrying out security verification on the unassociated users, and realizes the personalized and intelligent webpage loading effect according to the authority information.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart illustrating steps of a web page loading method according to an embodiment of the present invention;
FIG. 2 is a schematic flowchart illustrating a security verification step in the web page loading method of FIG. 1;
FIG. 3 is a schematic flow chart of the operational factor of safety generation step of the security verification step illustrated in FIG. 2;
FIG. 4 is a flowchart illustrating a loading flow generation step in the webpage loading method of FIG. 1;
FIG. 5 is a flowchart illustrating a step of loading web page contents in the web page loading method of FIG. 1;
fig. 6 is a schematic block diagram of a web page loading apparatus according to an embodiment of the present invention;
fig. 7 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
The flowcharts shown in the figures are illustrative only and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution order may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
At present, a user can log in a plurality of different website accounts, specifically, when the user registers and logs in a website to be loaded, the user can generate corresponding identity information according to an account corresponding to the user on another website, and register and log in the website to be loaded with the identity information, and the website to be loaded can load corresponding content after the login is determined to be completed. However, for a website to be loaded, it is difficult to ensure the authenticity of identity information when registering a user according to the identity information of an account on another website, so that certain potential safety hazards exist.
Based on this, embodiments of the present invention provide a method and an apparatus for loading a web page, a computer device, and a computer-readable storage medium, which are intended to improve security and convenience of user registration and login before loading a web page and intelligence during loading a web page, and to implement unaware user security authentication. The web page loading method may be applied to electronic devices such as a computer, an intelligent robot, an independent server or a server cluster, and is not limited herein.
In this embodiment, the web page loading method is described as being applied to an independent server, but the web page loading method is not limited to be applied to an independent server.
In the following, some embodiments of the invention will be described in detail with reference to the accompanying drawings, and features in the following examples and examples may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating steps of a web page loading method according to an embodiment of the present invention, where the method includes the following steps S1 to S5.
S1, acquiring identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user.
The target user inputs the web page login request, specifically, the target user uses the corresponding device to send the web page login request to the server executing the web page loading method, or the target user clicks a preset control to generate the web page login request. After determining to receive a webpage login request input by a target user, acquiring identity information of the target user and webpage information requested to be logged in by the target user according to the webpage login request.
Specifically, the webpage login request input by the target user at least comprises identity information of the target user and webpage information requested to be logged in by the target user, wherein the webpage information requested to be logged in by the target user at least comprises a website address of a target website requested to be logged in by the target user and webpage content to be loaded in the target website.
Illustratively, the identity information of the target user includes an identity string of the target user, network address information, and registration information. It should be understood that the identification string corresponds to the target user individually, such as an identification number; the network address information may be a network address used by the target user when inputting the web page login request, and corresponds to the network device used by the target user when inputting the web page login request; the registration information may be contact information used by the target user when the target user requests to log in the web page information, such as a telephone number, a mailbox, or a home address.
In some embodiments, obtaining identity information of a target user according to a webpage login request input by the target user includes: analyzing a webpage login request input by a target user to acquire an identity character string corresponding to the target user, and calling corresponding network address information and registration information in a preset identity information base according to the identity character string. It should be understood that, the preset identity information base is configured with the identity character strings of several users, the information such as the network address information and the registration information, and the corresponding relationship among the above-mentioned multiple groups of information in advance, for example, the identity character string of one user may correspond to several network address information and several registration information, and thus, the corresponding network address information and the registration information may be called in the preset identity information base according to the identity character strings.
Further, the information such as the pre-configured identity string, the network address information, and the registration information in the identity information base may be shared by a preset external website, for example. The method comprises the steps that webpage information contained in a webpage login request corresponds to a target website requested to be logged in by a target user, a preset external website can be another webpage except the target website, under the condition that the target website is associated with the external website in advance, information such as an identity character string, network address information and registration information used when the user registers on the external website can be obtained, the corresponding network address information and the registration information are called according to the identity character string, so that the identity information of the target user is obtained, then the target website is registered and logged in through the identity information, and the target website can load corresponding content after the target website is confirmed to be logged in. The webpage loading registration, login and loading are faster.
In some embodiments, after acquiring the identity information of the target user and the webpage information requested to log in by the target user according to the webpage login request input by the target user, the method further includes: it is determined whether the identity information is associated with web page information. Specifically, the server executing the method traverses the pre-configured association relationship between the identity information and the webpage information to determine whether the identity information is associated with the webpage information, wherein the association between the identity information and the webpage information represents that the identity information passes the security verification of the target website, and the non-association between the identity information and the webpage information represents that the identity information does not pass the security verification or the security verification.
It should be understood that, if the corresponding network address information and the registration information are directly called according to the identity character string to obtain the identity information of the target user, and the identity information is used to register in the target website, certain security risks can be brought to the target website and the target user. Based on this, when acquiring the identity information and the webpage information, it is required to determine whether the identity information is associated with the webpage information, and when determining that the identity information does not relate to the webpage information, the identity information is required to be subjected to security verification, so that the security and the rapidity of webpage loading are improved.
And S2, when the identity information is determined not to be related to the webpage information, carrying out safety verification on the identity information.
As shown in fig. 2, in some embodiments, the security verification of the identity information in step S2 specifically includes steps S21 to S23:
s21, inquiring a historical request record of a target user for requesting to load a webpage in a preset time period;
s22, determining an operation safety factor of a target user according to the history request record;
and S23, when the operation safety coefficient is larger than a preset threshold value, determining that the corresponding identity information passes the safety verification.
Specifically, a server executing the method firstly queries a historical request record of a target user requesting to load a webpage in a preset time period according to identity information, then determines an operation safety factor of the target user according to the historical request record, and determines that corresponding identity information passes safety verification when the operation safety factor is larger than a preset threshold value. The time interval length of the preset time interval can be one week, one month or one year, and the time interval length and the starting time of the preset time interval can be set according to actual requirements.
It should be noted that, when the history request record is any single login request output by the target user within a preset time period, the history request record is information used in the login request, such as an identity character string, network address information or contact information, and the operation safety factor of the target user represents the safety degree of the information used by the target user in the input webpage login request, such as the identity character string, the network address information and the contact information, so that the operation safety factor of the target user can be determined according to the history request record to determine whether the corresponding identity information passes the safety verification according to the operation safety factor.
In some embodiments, the server is pre-configured with a history request record library for storing history request records, and querying the history request records of the target user requesting to load the web page in a preset time period includes: and querying a history request record of a target user requesting to load a webpage in a preset time period in a history request record library according to the identity information. Specifically, the history request record of the target user requesting to load the web page in the preset time period includes information such as network address information used by the target user when inputting a web page login request, contact information and an identity character string used by the target user when requesting to load the web page.
It should be understood that querying a history request record of a target user requesting to load a web page in a preset time period when the identity information does not relate to the web page information can effectively perform user security authentication on the target user, and can enable the corresponding target user to be in an imperceptible state in the process of performing the user security authentication.
As shown in fig. 3, in some embodiments, the history request record at least includes network address information used when the target user inputs a login request in a preset time period, and the operation safety factor of the target user is determined in step S22 according to the history request record, which specifically includes steps S221 to S223:
step S221, analyzing the history request record to obtain contact information and an identity character string used by the target user when the target user requests to load the webpage;
step S222, determining a first safety factor corresponding to the contact information and a second safety factor corresponding to the identity character string according to the network address information;
and step S223, generating an operation safety factor according to the first safety factor and the second safety factor.
Specifically, the history request record includes any single login request input by the target user in a preset time period, and the network Address information is an IP Address (Internet Protocol Address) used when the target user inputs the login request in the preset time period, that is, an IP Address corresponding to the login request received by the server executing the method.
The server executing the method firstly analyzes the historical request record to obtain contact information and an identity character string used when a target user requests to load a webpage in the historical record and network address information used when the target user inputs a login request in a preset time period, then determines a first safety coefficient corresponding to the contact information and a second safety coefficient corresponding to the identity character string according to the network address information, and generates an operation safety coefficient according to the first safety coefficient and the second safety coefficient. The higher the first safety factor is, the higher the credibility of the contact information used by the target user in the historical record is represented, and the higher the second safety factor is, the higher the credibility of the identity character string used by the target user in the historical record is represented.
For example, after determining a first security factor corresponding to the contact information and a second security factor corresponding to the identity information, the operation security factor may be calculated according to the first security factor, a first weight configured for the first security factor in advance, the second security factor, and a second weight configured for the second security factor in advance.
In some embodiments, the determining a first safety factor corresponding to the contact information in step S222 specifically includes:
acquiring single contact information of a target user according to the network address information and the contact information, and determining the repeated use times of the single contact information in a preset time period;
determining common contact information and non-common contact information in single contact information based on the repeated use times;
calculating the sample proportion of the common contact information in the contact information, and determining the sample quantity of the non-common contact information;
and determining a first safety factor according to the sample proportion of the common contact information and the sample number of the non-common contact information.
Specifically, the first safety factor represents the credibility of the contact information used by the target user in the historical record. When a server executing the method determines a first safety factor corresponding to contact information, a plurality of single contact information corresponding to a target user are obtained according to network address information and the contact information, the repeated use times of the single contact information in a preset time period are determined, common contact information and non-common contact information are determined in the single contact information based on the repeated use times, then the sample proportion of the common contact information in all contact information in a history record is calculated, the sample quantity of the non-common contact information is determined, and the first safety factor is determined according to the sample proportion of the common contact information and the sample quantity of the non-common contact information.
It should be understood that the single contact information is the contact information used in outputting a single login request by the target user within a preset time period, and is, for example: the method comprises the steps of family address, e-mail address or telephone number, specifically, the method associates network address information and target users one by one, namely, a plurality of single contact information corresponding to the target users are determined through the network address information. The repeated use times of the single contact information in the preset time period can be specifically obtained by counting the use times corresponding to the home address, the e-mail address and the telephone number used in the login request output by the same network address information, and the sample number of the non-common contact information is the number of different contact information in the non-common contact information.
Illustratively, in the login request output by the same network address information a in the preset period, the used email addresses include "example001.com", "example002.com", and "example003.com", and the number of reuse times corresponding to "example001.com" is 7, the number of reuse times corresponding to "example002.com" is 2, and the number of reuse times corresponding to "example001.com" is 1. It is determined that the common contact information of the network address information a is "example001.com", and the unusual contact information is "example002.com" and "example003.com", and it is further determined that the sample proportion of "example001.com" is 7/10, and the number of samples of the unusual contact information is 2. After the sample proportion of the common contact information and the sample number of the non-common contact information are obtained, a first safety factor can be determined according to the sample proportion of the common contact information and the sample number of the non-common contact information.
The first safety factor is determined according to the sample proportion of the common contact information and the sample number of the non-common contact information, so that the credibility of the contact information used by a target user in a historical record can be effectively determined, website congestion caused by the fact that the same network address uses different contact information for multiple times is avoided.
In some embodiments, the determining a second safety factor corresponding to the identity character string in step S222 specifically includes:
calling a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples;
inquiring an identity character string sample matched with the identity character string in the identity character string sample set, and extracting a corresponding network address information sample;
a geographical span of the network address information samples is calculated to determine a second safety factor.
Specifically, a server executing the method calls a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples, then inquires the identity character string samples matched with the identity character strings in the identity character string sample set, extracts the network address information samples corresponding to each identity character string sample, and calculates the region span of the network address information samples to determine a second safety factor according to the region span. It should be noted that the identity string sample matched with the identity string is specifically the same identity string sample as the identity string in the web page login request.
It should be understood that the geographic span of the network address information samples is specifically the geographic span between the server addresses corresponding to the multiple network address information samples, and it is to be known that the server addresses are real geographic locations. Specifically, calculating the geographical span of the network address information sample to determine the second safety factor includes: and obtaining the server address corresponding to each network address information sample, and calculating the region span of the server addresses corresponding to the network address information samples according to the real geographic positions of the server addresses. It should be noted that the region span is used to represent distance information of real geographic positions of at least two different server addresses, for example, a separation distance between two server addresses that are farthest apart from each other in the plurality of server addresses may be used as the region span, and it is further noted that the larger the region span is, the lower the second safety factor is.
It should also be understood that calling a preset identity string sample set may be obtained by analyzing a history request record, specifically, extracting a plurality of identity strings and corresponding network address information from the history request record as samples to obtain an identity string sample.
Exemplarily, for the same identity string, such as an identity card number, the method first queries an identity string sample identical to the identity card number in an identity string sample set, queries network address information corresponding to the identity card number during login operation, and further determines a server address corresponding to the network address information sample to determine a second safety factor according to a regional span of a plurality of server addresses.
For example, five times of querying an id number in the id string sample set are used for logging in a website, and the server addresses of the corresponding network address information are: the Guangdong, guangxi and Beijing can calculate the region span according to the server address which is the farthest away, namely the Guangdong and the Beijing, and the larger the region span is, the lower the second safety factor is. It should be understood that when the territorial span is larger, there may be a case that the same identity character string is falsely used for multiple times, for example, for a ticket purchasing website, the identity card number with the login records in multiple provinces is given a lower second safety factor when the reliability is lower.
And determining a second safety factor according to the region span of the network address information sample to endow a lower second safety factor for the identity character string with a larger corresponding region span, and further determining the operation safety factor of the current target user, so that the identity character string falsely used in a plurality of provinces is difficult to pass safety verification.
And S3, generating authority information corresponding to the webpage information according to the identity information passing the safety verification.
And after the identity information is subjected to security verification, generating authority information corresponding to the webpage information according to the identity information passing the security verification. Specifically, the authority information corresponding to the web page information may be matched for the identity information passing the security verification according to a preset matching relationship, or the authority information corresponding to the web page information may be generated according to an operation safety factor determined in the security verification process, it should be understood that the higher the operation safety factor is, the more the generated authority information corresponds to.
For example, the method is applied to part of ticket purchasing websites, when more users log in the ticket purchasing websites at the same time, more authorities can be given to the corresponding target users with higher operation safety coefficients, so that the corresponding target users with higher operation safety coefficients can adopt a more smooth and convenient loading process in subsequent webpage loading to assist the target users in ticket purchasing.
In some embodiments, the method further comprises: and when the identity information is associated with the webpage information, generating authority information corresponding to the webpage information according to the identity information. Specifically, the server executing the method may generate corresponding permission information according to the identity information associated with the web page information.
And S4, acquiring the loading requirement of the target user, and generating a loading flow according to the loading requirement and the authority information.
In some embodiments, the web page login request further includes information corresponding to the loading requirement, and before determining the loading process in the optional processes according to the loading requirement, the method further includes: and analyzing the webpage login request to obtain the loading requirement. Specifically, the loading requirement includes, but is not limited to, a target loading flow of the target user input.
In other embodiments, the obtaining the loading requirement of the target user specifically includes: and outputting and displaying the alternative loading requirement information, wherein the alternative loading requirement information comprises loading flow requirements which can be selected by the target user, and receiving the loading requirements input by the target user in response to the alternative loading requirement information.
As shown in fig. 4, in some embodiments, the step S4 generates a loading flow according to the loading requirement and the authority information, and specifically includes steps S41 to S42:
s41, determining the user level of the target user according to the authority information;
and S42, matching optional flows corresponding to the user levels in a preset operation authority library, and determining a loading flow in the optional flows according to loading requirements.
Specifically, a plurality of process samples are stored in a preset operation authority library, a server executing the method firstly determines the user level of a target user according to authority information, then the process samples stored in the preset operation authority library are matched with optional processes corresponding to the user level, and loading processes are determined in the optional processes according to loading requirements. It should be understood that the authority information of the target user corresponds to the user hierarchy, the more the authority information corresponds to, the higher the user hierarchy, and the more the number of selectable processes actually selectable by the target user corresponding to the user hierarchy is.
After the optional flow corresponding to the user hierarchy of the target user is obtained through matching, the loading flow is determined according to the loading requirement input by the target user and the actually optional flow of the target user, specifically, the loading flow at least comprises a control area corresponding to the operable control and a sequence between popup areas corresponding to popup windows, so that webpage content corresponding to webpage information is loaded according to the loading flow subsequently, and personalized loading flow configuration is achieved.
And S5, loading the webpage content corresponding to the webpage information through a loading process.
As shown in fig. 5, in some embodiments, the loading of the web content corresponding to the web information in step S5 through the loading process specifically includes steps S51 to S54:
s51, acquiring pre-loading information of the webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to an operable control in the webpage information and a second position of a popup area corresponding to a popup;
step S52, determining the sequence between the loading control area and the loading popup area according to the loading process;
s53, under the condition of loading the control area in advance, loading the operable control at the first position;
and S54, correcting the second position according to the first position to obtain a third position, and loading the popup window at the third position.
It should be understood that the pre-loaded information of the web page information specifically includes several web page contents and corresponding position information of the web page contents in the web page, where the web page contents include, but are not limited to, animations, pictures, texts, operable controls or pop-ups, and the corresponding pop-ups in the web page information include, but are not limited to, popped-ups, texts and animations. It should be further understood that, in the loading process of a part of web pages, if the pop-up window may shield the operable control, the pop-up window needs to be closed first and then the operable control needs to be clicked, which is inconvenient for the operation of the target user, for example, in a part of ticket purchasing web sites, the time when the target user clicks the operable control to perform the ticket purchasing operation is urgent.
Based on this, the server executing the method firstly obtains the pre-loading information of the webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to the operable control in the webpage information and a second position of a popup area corresponding to the popup window, and determines the sequence between the loading control area and the loading popup window area according to the loading process. Under the condition that the control area is loaded firstly, the operable control is loaded at the first position, and the second position is corrected according to the first position to obtain a third position, so that the popup is loaded at the third position.
In some embodiments, the modifying the second position according to the first position to obtain a third position, and the loading the pop-up window at the third position may specifically be: adjusting the second position of the popup area to obtain a third position, so that the popup loaded at the third position is staggered with the operable control, and then loading the popup at the third position; the method can also be as follows: and the popup window is not displayed in the overlapped area of the first position and the second position, so that the influence of the popup window on the motor operable control of the target user is avoided, and the convenience and the intelligent degree of the target user for logging in the website and loading the website are improved.
In conclusion, the webpage loading method provided by the invention can be applied to a server to improve the safety and convenience of user registration and login before webpage loading, the personalization and intelligence degree during webpage loading, and the non-perception user safety authentication. Specifically, the webpage loading method comprises the following steps: the method comprises the steps of obtaining identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user, carrying out security verification on the identity information when the identity information is determined not to be related to the webpage information, generating authority information corresponding to the webpage information according to the identity information passing the security verification, obtaining a loading requirement of the target user, generating a loading flow according to the loading requirement and the authority information, and loading webpage content corresponding to the webpage information through the loading flow. According to the webpage loading method, the unassociated users are subjected to security verification to generate the corresponding authority information, and the personalized and intelligent webpage loading effect is achieved according to the authority information, so that the security and the convenience degree of user registration and login before webpage loading are improved, the personalized and intelligent degree during webpage loading is improved, and the non-perception user security authentication is achieved.
An embodiment of the present invention further provides a web page loading apparatus, and fig. 6 is a schematic diagram of a module structure of the web page loading apparatus according to the embodiment of the present invention, and as shown in fig. 6, the web page loading apparatus 600 includes:
the request processing module 601 is configured to obtain identity information of a target user and web page information requested to log in by the target user according to a web page login request input by the target user;
the security verification module 602 is configured to perform security verification on the identity information when it is determined that the identity information does not relate to the web page information;
the authority information generating module 603 is configured to generate authority information corresponding to the web page information according to the identity information passing the security verification;
a loading flow generating module 604, configured to obtain a loading requirement of a target user, and generate a loading flow according to the loading requirement and the authority information;
and the loading execution module 605 is configured to load the web content corresponding to the web information through the loading process.
In some embodiments, the security verification module 602 performs security verification on the identity information, which specifically includes:
querying a historical request record of a target user requesting to load a webpage in a preset time period;
determining an operation safety factor of a target user according to the historical request record;
and when the operation safety factor is larger than a preset threshold value, determining that the corresponding identity information passes the safety verification.
In some embodiments, the history request record at least includes network address information used by the target user when inputting the web page login request, and the security verification module 602 determines the operation security factor of the target user according to the history request record, specifically including:
analyzing the historical request record to obtain contact information and an identity character string used by a target user when the target user requests to load a webpage;
determining a first safety factor corresponding to the contact information and a second safety factor corresponding to the identity information;
and generating an operation safety factor according to the first safety factor and the second safety factor.
In some embodiments, the determining, by the security verification module 602, a first security factor corresponding to the contact information specifically includes:
acquiring single contact information of a target user according to the network address information and the contact information, and determining the repeated use times of the single contact information in a preset time period;
determining common contact information and non-common contact information in single contact information based on the repeated use times;
calculating the sample proportion of the common contact information in the contact information, and determining the sample number of the non-common contact information;
and determining a first safety factor according to the sample proportion of the common contact information and the sample number of the non-common contact information.
In some embodiments, the determining, by the security verification module 602, a second security factor corresponding to the identity character string specifically includes:
calling a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples;
inquiring an identity character string sample matched with the identity character string in the identity character string sample set, and extracting a corresponding network address information sample;
a geographical span of the network address information samples is calculated to determine a second safety factor.
In some embodiments, the loading process generating module 604 generates a loading process according to the loading requirement and the permission information, including:
determining the user level of the target user according to the authority information;
and matching optional flows corresponding to the user levels in a preset operation authority library, and determining a loading flow in the optional flows according to loading requirements.
In some embodiments, the loading executing module 605 loads the web content corresponding to the web information through a loading process, which includes:
acquiring pre-loading information of webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to an operable control and a second position of a popup area corresponding to a popup in the webpage information;
determining the sequence between the loading control area and the loading popup area according to the loading process;
loading an operable control at a first position in the case of a control region being loaded first;
and correcting the second position according to the first position to obtain a third position, and loading the pop-up window at the third position.
Fig. 7 is a schematic block diagram illustrating a structure of a computer device according to an embodiment of the present invention.
As shown in fig. 7, the computer device 700 includes a processor 701 and a memory 702, and the processor 701 and the memory 702 are connected by a bus 703, such as an I2C (Inter-integrated Circuit) bus.
In particular, the processor 701 is configured to provide computational and control capabilities that support the operation of the overall computing device. The Processor 701 may be a Central Processing Unit (CPU), and the Processor 701 may also be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Specifically, the Memory 702 may be a Flash chip, a Read-Only Memory (ROM) magnetic disk, an optical disk, a usb disk, or a removable hard disk.
Those skilled in the art will appreciate that the configuration shown in fig. 7 is a block diagram of only a portion of the configuration associated with an embodiment of the present invention, and does not constitute a limitation on the applicability of an embodiment of the present invention to computing devices, which may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
The processor is configured to run the computer program stored in the memory, and when executing the computer program, implement any one of the web page loading methods provided in the embodiments of the present invention.
In some embodiments, the processor 701 is configured to run a computer program stored in the memory 702 and to implement the following steps when executing the computer program:
acquiring identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user;
when the identity information is determined not to be related to the webpage information, carrying out security verification on the identity information;
generating authority information corresponding to the webpage information according to the identity information passing the safety verification;
acquiring a loading requirement of a target user, and generating a loading flow according to the loading requirement and authority information;
and loading the webpage content corresponding to the webpage information through a loading process.
In some embodiments, the processor 701, when performing the secure verification on the identity information, includes:
querying a historical request record of a target user requesting to load a webpage in a preset time period;
determining an operation safety factor of a target user according to the historical request record;
and when the operation safety factor is larger than a preset threshold value, determining that the corresponding identity information passes the safety verification.
In some embodiments, the historical request record at least includes network address information used by the target user when inputting the login request, and the processor 701, when determining the operation safety factor of the target user according to the historical request record, includes:
analyzing the historical request record to obtain contact information and an identity character string used by a target user when the target user requests to load a webpage;
determining a first safety factor corresponding to the contact information and a second safety factor corresponding to the identity character string according to the network address information;
and generating an operation safety factor according to the first safety factor and the second safety factor.
In some embodiments, the processor 701, when determining the first safety factor corresponding to the contact information, includes:
acquiring single contact information of a target user according to the network address information and the contact information, and determining the repeated use times of the single contact information in a preset time period;
determining common contact information and non-common contact information in single contact information based on the repeated use times;
calculating the sample proportion of the common contact information in the contact information, and determining the sample quantity of the non-common contact information;
and determining a first safety factor according to the sample proportion of the common contact information and the sample number of the non-common contact information.
In some embodiments, the processor 701, when determining the second safety factor corresponding to the identity string, includes:
calling a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples;
inquiring an identity character string sample matched with the identity character string in the identity character string sample set, and extracting a corresponding network address information sample;
a geographical span of the network address information samples is calculated to determine a second safety factor.
In some embodiments, when the processor 701 generates the loading flow according to the loading requirement and the authority information, the method includes:
determining the user level of the target user according to the authority information;
and matching the optional flows corresponding to the user levels in a preset operation authority library, and determining the loading flows in the optional flows according to the loading requirements.
In some embodiments, when the web content corresponding to the web information is loaded through the loading process, the processor 701 includes:
acquiring pre-loading information of webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to an operable control and a second position of a popup area corresponding to a popup in the webpage information;
determining the sequence between the loading control area and the loading popup area according to the loading process;
loading an operable control at a first position in the case of a control region being loaded first;
and correcting the second position according to the first position to obtain a third position, and loading the pop-up window at the third position.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working process of the computer device described above may refer to the corresponding process in the foregoing embodiment of the animal identification method, and is not described herein again.
Embodiments of the present invention further provide a computer-readable storage medium, where a computer program is stored, where the computer program is executable by one or more processors to implement the steps of any one of the web page loading methods provided in the embodiments of the present specification.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware embodiment, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
It should be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages and disadvantages of the embodiments. While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for loading a web page, the method comprising:
acquiring identity information of a target user and webpage information requested to be logged in by the target user according to a webpage login request input by the target user;
when the identity information is determined not to be related to the webpage information, performing security verification on the identity information;
generating authority information corresponding to the webpage information according to the identity information passing the security verification;
acquiring a loading requirement of the target user, and generating a loading flow according to the loading requirement and the authority information;
and loading the webpage content corresponding to the webpage information through the loading process.
2. The method of, wherein the securely verifying the identity information comprises:
querying a historical request record of the target user requesting to load the webpage in a preset time period;
determining the operation safety factor of the target user according to the historical request record;
and when the operation safety coefficient is larger than a preset threshold value, determining that the corresponding identity information passes the safety verification.
3. The method of claim 2, wherein the history request record at least includes network address information used by the target user when entering a login request in a preset time period, and the determining the operation safety factor of the target user according to the history request record comprises:
analyzing the historical request record to obtain contact information and an identity character string used by the target user when the target user requests to load a webpage;
determining a first safety factor corresponding to the contact information and a second safety factor corresponding to the identity character string according to the network address information;
and generating the operation safety factor according to the first safety factor and the second safety factor.
4. The method of claim 3, wherein the determining a first safety factor corresponding to the contact information comprises:
acquiring single contact information of the target user according to the network address information and the contact information, and determining the repeated use times of the single contact information in the preset time period;
determining common contact information and non-common contact information in the single contact information based on the repeated use times;
calculating the sample proportion of the common contact information in the contact information, and determining the sample number of the non-common contact information;
determining the first safety factor according to the sample proportion of the common contact information and the sample number of the non-common contact information.
5. The method of claim 3, wherein determining the second security factor to which the identity string corresponds comprises:
calling a preset identity character string sample set, wherein the identity character string sample set comprises a plurality of identity character string samples and network address information samples corresponding to the identity character string samples;
inquiring the identity character string sample matched with the identity character string in the identity character string sample set, and extracting a corresponding network address information sample;
calculating a geographical span of the network address information samples to determine the second safety factor.
6. The method of claim 1, wherein generating a loading flow according to the loading requirement and the permission information comprises:
determining the user level of the target user according to the authority information;
and matching optional processes corresponding to the user level in a preset operation authority library, and determining a loading process in the optional processes according to the loading requirement.
7. The method according to any one of claims 1 to 6, wherein the loading the web page content corresponding to the web page information through the loading process includes:
acquiring pre-loading information of the webpage information, wherein the pre-loading information comprises a first position of a control area corresponding to an operable control and a second position of a popup area corresponding to a popup window in the webpage information;
determining the sequence between loading the control area and loading the popup window area according to the loading process;
loading the operable control at the first location in the event that the control region was previously loaded;
and correcting the second position according to the first position to obtain a third position, and loading the pop-up window at the third position.
8. A web page loading apparatus, comprising:
the request processing module is used for acquiring the identity information of a target user and the webpage information requested to be logged in by the target user according to a webpage login request input by the target user;
the security verification module is used for performing security verification on the identity information when the identity information is determined not to be related to the webpage information;
the authority information generating module is used for generating authority information corresponding to the webpage information according to the identity information passing the security verification;
the loading flow generation module is used for acquiring the loading requirement of the target user and generating a loading flow according to the loading requirement and the authority information;
and the loading execution module is used for loading the webpage content corresponding to the webpage information through the loading process.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory for storing a computer program;
the processor is configured to execute the computer program and to implement the web page loading method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the web page loading method according to any one of claims 1 to 7.
CN202210910961.0A 2022-07-29 2022-07-29 Webpage loading method and device, computer equipment and computer readable storage medium Pending CN115221442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210910961.0A CN115221442A (en) 2022-07-29 2022-07-29 Webpage loading method and device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210910961.0A CN115221442A (en) 2022-07-29 2022-07-29 Webpage loading method and device, computer equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN115221442A true CN115221442A (en) 2022-10-21

Family

ID=83615562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210910961.0A Pending CN115221442A (en) 2022-07-29 2022-07-29 Webpage loading method and device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN115221442A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116633599A (en) * 2023-05-04 2023-08-22 杭州蓝鲸网络科技有限公司 Method, system and medium for verifying secure login of hand-tour client

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116633599A (en) * 2023-05-04 2023-08-22 杭州蓝鲸网络科技有限公司 Method, system and medium for verifying secure login of hand-tour client
CN116633599B (en) * 2023-05-04 2024-01-30 杭州蓝鲸网络科技有限公司 Method, system and medium for verifying secure login of hand-tour client

Similar Documents

Publication Publication Date Title
CN108156237B (en) Product information pushing method and device, storage medium and computer equipment
US20140310691A1 (en) Method and device for testing multiple versions
US20180196875A1 (en) Determining repeat website users via browser uniqueness tracking
WO2019037417A1 (en) Webpage data crawling method and apparatus, webpage data crawling platform, and storage medium
CN107451819B (en) Identity verification method and device based on user operation behavior characteristics
WO2007127957A2 (en) System and method for flagging information content
US20100235754A1 (en) User information widgets and methods for updating and retrieving user information
CA3038949A1 (en) Systems and methods for automatically identifying a checkout webpage and injecting a virtual token
US20220147589A1 (en) System and method for identifying a user
US11062019B2 (en) System and method for webpages scripts validation
CN115587575A (en) Data table creation method, target data query method, device and equipment
CN115221442A (en) Webpage loading method and device, computer equipment and computer readable storage medium
CN108512822B (en) Risk identification method and device for data processing event
CN114157568B (en) Browser secure access method, device, equipment and storage medium
WO2019056496A1 (en) Method for generating picture review probability interval and method for picture review determination
CN106817296B (en) Information recommendation test method and device and electronic equipment
CN112835682B (en) Data processing method, device, computer equipment and readable storage medium
CN112861033B (en) Method and device for executing service
CN113408254A (en) Page form information filling method, device, equipment and readable medium
CN112182520B (en) Identification method and device of illegal account number, readable medium and electronic equipment
US20160307223A1 (en) Method for determining a user profile in relation to certain web content
US20160337195A1 (en) Automated multi-user system detection
CN111563153B (en) Recommendation method and terminal based on clipboard information sharing implementation
US20170262904A1 (en) Weighted reviews of applications based on usage history
CN111240750B (en) Awakening method and device for target application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination