CN116975853B - Method for preventing text content from being completely intercepted at Web end - Google Patents

Method for preventing text content from being completely intercepted at Web end Download PDF

Info

Publication number
CN116975853B
CN116975853B CN202310750618.9A CN202310750618A CN116975853B CN 116975853 B CN116975853 B CN 116975853B CN 202310750618 A CN202310750618 A CN 202310750618A CN 116975853 B CN116975853 B CN 116975853B
Authority
CN
China
Prior art keywords
content
text
chinese
behavior
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310750618.9A
Other languages
Chinese (zh)
Other versions
CN116975853A (en
Inventor
张鑫旭
刘鹏
龚佳毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tse Information Technology Shanghai Co ltd
Original Assignee
Tse Information Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tse Information Technology Shanghai Co ltd filed Critical Tse Information Technology Shanghai Co ltd
Priority to CN202310750618.9A priority Critical patent/CN116975853B/en
Publication of CN116975853A publication Critical patent/CN116975853A/en
Application granted granted Critical
Publication of CN116975853B publication Critical patent/CN116975853B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Abstract

The invention discloses a method for preventing text contents from being completely intercepted by a Web end, which comprises the following steps: step one, generating a text content comprising a set of content which is completely correct and a set of content which comprises error information; judging equipment abnormality and/or behavior abnormality; thirdly, displaying completely correct content in the screen when no abnormality exists in the equipment or the behavior, and displaying content containing error information outside the screen; or when the device and/or the behavior is abnormal, the content containing error information is displayed inside and outside the screen, so that the text content is prevented from being completely intercepted. The invention also discloses application of the method in preventing the text content from being completely intercepted at the Web end. The method of the invention does not influence the use experience of normal users, has strong hidden property of content protection, is not easy to find, and has good protection effect under multiple tubes.

Description

Method for preventing text content from being completely intercepted at Web end
Technical Field
The invention belongs to the technical field of Web development, and relates to a method for preventing text contents from being completely intercepted at a Web end.
Background
Today's OCR technology is very mature and Web page content must be combated against OCR technology if it is to be protected.
The existing countermeasure technology adds interference to the text content, such as blurring the text, underlining the text, or having blocks around the text, such as the block around the text in fig. 1.
However, this process compromises the user's reading experience, and the disadvantages are significant.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a method for preventing text contents from being completely intercepted at a Web end based on a split-screen rendering strategy. The invention can effectively resist OCR without affecting reading experience, so that the OCR cannot be automatically processed, and the safety of web content is ensured. The split-screen rendering strategy is to determine whether to display information containing error content inside and outside a screen according to different scenes.
The invention needs to prepare two sets of text contents when in implementation, one set is completely accurate, and the other set contains error information. When the user scrolls through Web content, the information in the screen is correct and the information outside the screen is incorrect. At this time, if someone wants to intercept the entire piece of information including the text inside and outside the screen, an erroneous content is obtained. When the method is realized, how to obtain and use the error content is considered, how to avoid the problem that all the content is completely displayed in a screen due to page scaling, how to automatically obtain a plurality of screenshots by using an automatic jigsaw screenshot tool, and the like.
In describing the present disclosure, abbreviations and key terms that may be involved are defined as follows:
HTML: hypertext markup language
CSS: cascading style sheet
JavaScript: script language widely used for clients
OCR technology: optical character recognition (Optical Character Recognition, OCR) refers to the process of analyzing and recognizing the image file of text data to obtain text and layout information
Thick code: erroneous text information
The invention provides a method for preventing text content from being completely intercepted at a Web end, which comprises the following steps:
step one, generating a text content comprising a set of content which is completely correct and a set of content which comprises error information;
judging equipment abnormality and/or behavior abnormality;
thirdly, displaying completely correct content in the screen when no abnormality exists in the equipment or the behavior, and displaying content containing error information outside the screen;
when abnormality occurs in the device and/or the behavior, contents containing error information are displayed inside and outside the screen, and the text contents are prevented from being completely intercepted.
In the first step, the text containing the error information content may be implemented by any one of the following two ways (other means may be used according to the requirement, for example, random disorder, character insertion, flip-up and down, distortion, clutter interference, deletion line, blurring, font replacement, etc.):
mode 1, selecting a certain Unicode value range corresponding to Chinese content, and optionally changing one or more Unicode values to generate an error Chinese character with non-corresponding meaning to an original text; in the actual implementation process, no special requirement is required for changing and adjusting the Unicode value and the Unicode value range, and the best meeting the implementation requirement is selected according to the actual requirement;
mode 2, randomly confusing contents including Chinese numerals, chinese pronouns, arabic numerals, english letters, etc., and/or generating an anticonsite for a part or all of the fixed contents so as not to correspond to the meaning of the original text.
Judging whether the page size of the equipment generates suspicious height-width ratio, whether the internal and external window sizes with larger deviation exist or not, and the like; the abnormal behavior judgment comprises whether pages are regularly rolled, whether continuous touches at the same positions on the pages exist, and the like.
In particular, the method comprises the steps of,
the invention is divided into the following four parts: the method comprises the steps of basic implementation, error content generation, abnormal equipment identification and abnormal behavior identification; in the implementation process of the invention, the abnormal equipment identification is carried out simultaneously when the abnormal equipment identification is triggered, but the two identifications are carried out independently, and the abnormal equipment identification is not necessarily carried out when the abnormal equipment identification is triggered.
Basic implementation
In the Web, text content is presented by using HTML codes, and for each text content, a unified HTML element package can be used, and < p > and </p > can be used to realize the positioning of the beginning and the end of a paragraph (other elements can also be better, < p > element semantics), at this time, the HTML structure comprising a plurality of sections of specific paragraph content is similar to the following:
< p > paragraph 1 >
< p > paragraph 2 >
< p > paragraph 3 >
< p > paragraph 4 >
< p > paragraph. </p >
< p > last paragraph
And binding a scrolling event to the Web page by using JavaScript, wherein the JavaScript is used for judging whether the Web page scrolls, detecting whether each < p > element is in the window range of the display when the page scrolling action occurs, and if the content is in the window range, displaying the correct content, and if the content is not in the window range, displaying the wrong content.
The detection method for detecting whether each < p > element is within the window of the display in the present invention is implemented using the element, getbase clientinetrect () method, which can return the positions of the four edges of the current element relative to the window edge, as shown in fig. 4.
In this scenario, only the vertical position need be considered, so it is only necessary to traverse all < p > elements (including < p > and </p >) and if the bottom edge of the < p > element is offset from the window upper edge by more than 0 and the top edge is offset from the window upper edge by less than the window height, then the element can be considered to be within the display window, otherwise it is off-screen. The usage code is illustrated as follows:
the concrete explanation is as follows:
all p-elements under a specified arc element are first obtained using a document.
The window height is then obtained using window.
Then by calling window.addeventlist ('scroll', function () {.}); a scroll event listener is added to the window object, which is triggered when the user scrolls the page.
Eleps.foreach () in the function is used to execute the following function for each p element.
The first line code in the function var binding = ele. Getband clientinetrect (); and obtaining boundary rectangle information of the current element, wherein the boundary rectangle information comprises information such as the position and the size of the element relative to a window.
The next if statement is used to determine if the element is visible within the window. If the position of the bottom of the element is greater than or equal to 0 and the position of the top of the element is less than or equal to the height of the viewport, the element is visible in the viewport. This judgment is based on the boundary rectangle information acquired above.
If true, the text content of the element is modified to 'correct content'. If it is determined to be false, the text content of the element is modified to 'error content'.
Error content acquisition
There are two approaches to error content acquisition, one is back-end return and one is front-end generation.
The back-end return means that the wrong text content and the correct content are provided by the back-end, and the front-end is only responsible for displaying.
In the invention, a front-end generation approach is mainly used, and the front-end generation refers to error processing of correct content by using JavaScript. The processing algorithm of front end generation related to the invention has the following two kinds of processing algorithms, and belongs to innovation points in the invention.
The method comprises the following steps:
changing a Unicode value of a chinese content in a Unicode value range corresponding to the chinese content, for example, adding one to a chinese kanji code conforming to the code range, the JavaScript implementation is illustrated as follows:
the concrete explanation is as follows:
firstly, a regular expression object regMix is created and used for matching Chinese characters within a certain range. The range is the range of Chinese characters in Unicode codes, u4e00 represents the Unicode code of the first Chinese character, u4eff represents the Unicode of the last Chinese character. 'g' then represents a global match.
The next code replaces the kanji character in the text content that matches the regular expression regMix with its next character (i.e., unicode code plus one character) by invoking the replace method.
Function (matches) of the functions is a callback function for processing each matched character. The matches represent the currently matched character, the charCodeAt (0) method is called to obtain the Unicode code of the character, 1 is added to the Unicode, the from CharCode method is called to convert the code into the corresponding character, and finally the character is returned to finish the replacement operation of the character.
After the replacement is completed, the new text content is assigned to the variable textMistake and can be processed or output in the subsequent code.
The second method is as follows:
random confusion and fixed content disambiguation of particular content. Random confusion is exemplified by "you me he" randomly changing, "two three four six seven eight ninety" numbers randomly changing, and fixed anti-ambiguities are exemplified by "good" to "bad" and "up" to "down". At this time, the text content is read smoothly, but in practice, a large deviation appears in meaning, and the original content is protected.
The logic of the implementation method is not complex, the matching and replacement of the character string can be carried out by using a replace method in JavaScript, and the important point is that the formatted mapping data is prepared in advance, and the following is the implementation process illustration.
Because the complete anticompartment mapping data is relatively large, all corresponding variable reflectomaps are indicated by using only part of the anticompartment, and the omitted part is indicated by using an ellipsis.
The concrete explanation is as follows:
an anti-ambiguity map is first defined, which contains pairs of Chinese characters, indicating that the Chinese characters may be replaced with corresponding anti-ambiguity words in the text.
Three arrays chineseNum, chineseCall and chinese Auxiliary are then defined, containing some Chinese numbers, chinese pronouns, and several pronouns most commonly used in Chinese, respectively.
The number in the string is replaced using the replace method. Specifically, the method would match all numbers first and then replace each number with a callback function. In the present invention, the math.random () method is used to replace each number with a random arabic number.
And replacing English letters in the character string by using a replace method. The method would match all lower case english letters first and then replace each letter with a callback function. The logic for replacement is: several English letters which are approximately long are randomly replaced, and the rest letters are unchanged.
The replacement method is used to replace the Chinese characters in the character string. The method matches all Chinese characters first and then replaces each character with a callback function. The logic for replacement is: the 50% probability is replaced by the anti-meaning word, and the 50% probability is replaced by randomly selecting one from Chinese numbers, names and pronouns. Wherein the anti-ambiguity substitution is performed according to the mapping relation in the reflectomap, and the Chinese number, the title and the pronoun substitution are performed by randomly selecting one according to a predefined array.
Although the code amount of the method two is larger than the operation of randomly changing the Unicode value in the method one, the concealment is better because the grammar and the structure are normal.
For better performance, both correct content and incorrect content need to be associated with the < p > element in advance, and in order to avoid pirates from acquiring the correct content through the < p > element, the correct content must not be displayed in clear text or be globally exposed and can be placed in memory.
The invention is processed by the following steps:
the concrete explanation is as follows:
two arrays arrContentCorrect and arrContentError are defined to store correct and erroneous paragraph contents, respectively.
A container element elecon tainer was obtained using the document.
A null array elePs is declared for storing all < p > elements.
Creating a < p > element and setting its textContent attribute as the error paragraph content, and saving the error paragraph content in the eleP.originContent attribute, and saving the correct paragraph content in the store object whose key is the < p > element and whose value is the correct paragraph content.
The created < p > element is added to the elePs array.
Finally, all < p > elements are added to the container element at once using the elecon tainer. Application method.
Thus, logic is obtained that allows the page to execute the above-implemented display of correct or incorrect content when the first loading and scrolling of the page is performed.
It is only necessary to replace ele.textcontent= 'correct content' in the 'scroll' event with ele.textcontent=store [ ele ], and ele.textcontent= 'error content' with ele.textcontent=ele.origincontent.
Abnormal device identification
When abnormality occurs in the size of the page display or the like, including a suspicious aspect ratio, the size of the inner and outer frames (which may be the opened console) with large deviation, or the like.
When the program runs, a flag quantity indicating whether the program is safe or not is a global JavaScript variable, for example, named isSafe, and the default value is false, so that the program is safe.
When a behavioral abnormality or device abnormality is detected, this flag amount is set to true, indicating unsafe.
As user interaction occurs (e.g., scrolling through a page), the program will determine whether to display the correct content based on the value of the flag.
For example, if isSafe is true, the contents of the < p > element indicate an erroneous content substitution, even if this element is within the viewable area.
Different methods are used for judging different conditions, and the method is specifically as follows:
1) The situation when suspicious aspect ratio occurs is illustrated using the following JavaScript code:
if(window.innerHeight*0.75>window.outerHeight){
device size anomaly
}
The concrete explanation is as follows:
if the window height is greater than 75% of the outer dimension, the window height is considered abnormal.
Where in height is the size of the inner area of the browser, the outerHeight is the outer size of the browser, and by default, these two values are approximately equal, the height deviation is the height of the address bar and toolbar in the browser, usually not more than 100 pixels, and if these two sizes have larger deviation, the user can be considered to zoom the current page, which is an abnormal device.
2) When the difference between the inner and outer window sizes is too large, the following code is used for judging:
the concrete explanation is as follows:
first, the code defines four variables, namely, the inner height (height), the outer height (ohight), the inner width (width), and the outer width (ohidth) of the current window.
The code then calculates the internal and external ratio of the current device, i.e., oWidth/oHeight. If the ratio is less than 1, it indicates that the device is in a portrait state.
Next, the code calculates the height and width when the inside-outside ratio is the same, i.e., scaleOuter height and width/scaleOuter.
After these variables are defined, the code begins to detect if the device is abnormal. If the width difference or the height difference of the device exceeds a certain threshold, the device is considered to be abnormal.
Two thresholds are defined in the code: widthBuffer and highbuffer. If the device is in portrait state, a different threshold is used. If the difference in width or height of the devices exceeds a threshold, the devices are considered to be abnormal.
Under normal conditions, the size of the inner window and the outer window after equal proportion enlargement or reduction should be approximate, if the deviation is larger, the built-in window of the browser is likely to be opened, the most typical window is a developer tool of the browser, at the moment, there is enough reason to consider that the current user tries to debug the current Web page, the use habit of the normal user is obviously not met, at the moment, the window is considered to be abnormal equipment, and correct content is not displayed.
3) If the browser window is ultra-high, it is considered to be abnormal.
if(Math.min(window.innerHeight,window.innerWidth)>5200){
Apparatus for the treatment of the danger
}
Abnormal behavior identification
In the invention, recognition analysis is also carried out on possible abnormal behaviors, such as regular rolling, the positions of continuous touches are the same, and all the characteristics do not accord with human behaviors and accord with machine behaviors. If behavior conforming to these features is detected, the text content directly displays an error message, thereby preventing automated behavior from occurring.
When a real user browses content, the scrolling of the page is random and has no obvious rule, if the distance and the time interval of continuous scrolling for a long time are approximate, the scrolling is considered to be regular scrolling, and abnormal behavior is judged; the real user touches the mobile phone screen, the positions of the front and the rear times are impossible to keep consistent, and if the positions of the screen are consistent every time, the mobile phone screen is considered to be a machine touch, and abnormal behavior is judged.
1) The regular rolling abnormal behavior is described as follows:
the judgment logic of the machine rolling behavior is firstly shown, parameters are only shown and are not actual values, the event is shown by using the roller behavior, the implementation principle of keyboard or click-triggered rolling is similar to the judgment logic, the principle explanation is not affected, and therefore the display is not repeated.
/>
The concrete explanation is as follows:
a plurality of sets of arrDataWheel are used in the code to record the time interval and distance data of the last five scrolling events and calculate the deviation value. If the time intervals of the five continuous scrolling are consistent and the distances are also consistent, the abnormal behavior is considered, and the error function is triggered to print error information. This code uses a wheel event monitor, which when a user triggers a mouse wheel event, performs the following:
the time stamp and scroll height variables timeWheel and numScrollTop are calculated.
A plurality of arrays are defined for recording the scrolling event data.
If the window scroll distance changes, new data time and distance data is recorded into the array arrDataWheeel, and a maximum of five items are reserved.
If there are five items of data in the array arrDataWheeel, the offset values of the time interval and the scroll distance are calculated.
If the time intervals of the five continuous scrolling are consistent and the distances are also consistent, the abnormal behavior is considered, and the error function is triggered to print error information.
The current position and scroll height variables are recorded, waiting for the arrival of the next scroll event.
2) The same touch location anomaly behavior is described as follows:
here the code illustrates how the abnormal behavior is judged by the same touch position.
The concrete explanation is as follows:
the variables lastTouchX and lastTouchY record the last touch position, respectively. When the user touches the screen, the code checks whether the position of the touch is the same as the position of the last touch. If the same, then this is considered an abnormal touch behavior, possibly an unsafe behavior.
When unsafe behavior occurs, error content is displayed inside and outside the screen.
The invention also provides application of the method in preventing the text content from being completely intercepted at the Web end.
Recognition of machine behavior by regular scrolling, identical touch locations, etc. can prevent most automated puzzle capture tools.
The beneficial effects of the invention include:
1. the method of the invention can not prevent OCR operation after screen capture by font confusion, background noise, dynamic text and the like as in the existing methods, and the method of the invention displays normal information under normal display conditions and does not influence the use experience of normal users.
2. Under normal conditions, the user can see the correct content in the interface, and the user can not see the wrong content in the external interface, so that the content protection has strong concealment and is not easy to find.
3. When the method is specifically implemented, equipment abnormality and behavior abnormality are detected, and the protection effect is good under the condition of multiple pipes.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a prior art method of adding blocks to text to combat OCR auto-recognition.
Fig. 2 is a schematic diagram of whether the on-screen and off-screen contents are displayed correctly for normal or abnormal cases in the present invention.
Fig. 3 is a flow chart showing whether processing of display contents is required in the present invention.
FIG. 4 is a schematic view of the positions of four edges of an element relative to the window edge in the present invention.
Fig. 5 is a schematic diagram showing different contents inside and outside a screen in the method of the present invention.
FIG. 6 is a diagram illustrating a Unicode transformation after page scaling in accordance with embodiment 1 of the present invention.
FIG. 7 is a schematic diagram of transforming a portion of the content in text using an anti-ambiguous mapping table after invocation of a console window in embodiment 2 of the present invention.
Fig. 8a and 8b are schematic diagrams of page display after the page is scrolled by triggering the click at the same position in embodiment 3 of the present invention.
FIG. 9 is a schematic diagram showing a page display of a scrolled page when the automatic long screenshot triggers continuous automatic scrolling in embodiment 4 of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following specific examples and drawings. The procedures, conditions, experimental methods, etc. for carrying out the present invention are common knowledge and common knowledge in the art, except for the following specific references, and the present invention is not particularly limited.
The invention discloses a method for preventing text contents from being completely intercepted by a Web end, which belongs to the information confusion technology, wherein the confusion judgment condition is based on the visible area range of software, and whether the current equipment and the use scene are safe or not is aimed at preventing all the information contents from being completely intercepted at one time and being used in a text content anti-theft scene.
Known is content a, which generates error content B (referred to as "thick code" in the present invention) using the principles provided in the present invention.
Traversing all text content elements in the page, and executing when the scrolling action of the page occurs:
1. whether the current equipment is abnormal;
2. whether the current behavior is abnormal;
3. in a normal display environment, whether the current content should be off-screen.
If any one of the above three conditions is "yes", the content that should be displayed as a is displayed as B.
Therefore, the content of the screenshot must have a large amount of error information, and is not available.
Various behavioral determination examples are referred to in fig. 3, and in particular,
the domain name judgment refers to judging whether the domain name of the web page operated by the current code is a specified domain name or not.
For example, in JavaScript, the location. Hostname may return to the current domain name, and based on this syntax, it may be determined whether the current JS operating environment is normal.
For example:
if(location.hostname!='www.qidian.com'){
non-origin web site, unsafe
}
Debug behavior refers to the act of determining whether someone is attempting to obtain the correct content by embedding code, or using the browser's developer tool.
The security actions include a relatively large number, for example, if the user presses the Print Screen capture button, this is considered an unsafe one, and the user attempts to capture a webpage.
All these actions trigger thick code display, of course, the specific strategy can be flexibly adjusted according to the service requirement.
Example 1
In this embodiment, the scaling of the page (device anomaly detection) and Unicode transformation are combined, and fig. 6 illustrates that when the page is scaled to 75%, the content of the element that should normally be displayed is erroneous (in order to distinguish the erroneous content, the text of the Unicode is distinguished in light gray and is circled, and a part of the text is changed), and part of the text becomes unreadable by changing the Unicode value (Unicode value+1).
Example 2
Fig. 7 illustrates the rendering of chapter content when the console is opened (in order to distinguish erroneous content, light gray distinction is used), and the semantics of seeing many letters are reversed, e.g. letters in the red circle should be "not supplemented" displayed but "not supplemented".
In this embodiment, the console window is opened, so that the size difference between the inner and outer frames is changed (the device is abnormal), a mapping table of pre-constructed anti-ambiguities is utilized, and if a word in the mapping table is detected, the mapping table is replaced with the corresponding anti-ambiguities.
Example 3
In this embodiment, the Chrome browser is used to simulate the access of the mobile terminal, and in the preview mode of the mobile terminal, the mouse is continuously clicked, and since the mouse is not moving, the logic of abnormal behavior recognition is triggered, as shown in fig. 8a, that is, when the abnormal behavior is triggered, even if the content in the screen is displayed normally, the content outside the screen is wrong in entering the screen.
At this time, scrolling the page, as shown in fig. 8b, may find that the content of the off-screen error is displayed directly into the screen and is not restored.
Example 4
Fig. 9 shows a long screenshot taken by an automation tool that automatically triggers the scrolling of the browser and the screenshot stitching. After the machine behavior is judged, the machine behavior is judged to be abnormal when the number of scrolling times reaches 10, and at the moment, wrong thick code content is displayed, and besides the text content appearing in the first scrolling times is correct, the content entering the visual area is not correct any more, so that the effect of preventing the automatic tool from completely capturing the images is realized.
The protection of the present invention is not limited to the above embodiments. Variations and advantages that would occur to one skilled in the art are included within the invention without departing from the spirit and scope of the inventive concept, and the scope of the invention is defined by the appended claims.

Claims (7)

1. A method for preventing text content from being completely intercepted at a Web end, the method being based on a split screen rendering strategy, comprising the steps of:
step one, generating a text content comprising a set of content which is completely correct and a set of content which comprises error information;
judging equipment abnormality and/or behavior abnormality;
thirdly, displaying completely correct content in the screen when no abnormality exists in the equipment or the behavior, and displaying content containing error information outside the screen; or alternatively, the first and second heat exchangers may be,
when abnormality occurs in the device and/or the behavior, contents containing error information are displayed inside and outside the screen, and the text contents are prevented from being completely intercepted.
2. The method of claim 1, wherein in step one, the text containing the error information content is implemented by any one of the following means:
mode 1, selecting a certain Unicode value range corresponding to Chinese content, and optionally changing one or more Unicode values to generate an error Chinese character with non-corresponding meaning to an original text;
mode 2, randomly confusing contents including Chinese numerals, chinese pronouns, arabic numerals and English letters and/or generating an anticonsite for part or all of the fixed contents so as not to correspond to the meaning of the original text.
3. The method of claim 2, wherein mode 1 further comprises the following: creating a regular expression object regMix for matching Chinese characters within a preset Unicode coding range; replacing the Chinese characters conforming to the regular expression regMix in the text content with new characters obtained after Unicode coding operation by calling a replace method; after the replacement is completed, the new character is used for subsequent processing or output.
4. The method of claim 2, wherein mode 2 further comprises the following: defining and constructing an anti-meaning word mapping table containing Chinese character pairs, an array containing Chinese numbers, an array containing Chinese pronouns and an array containing Chinese pronouns, randomly replacing numbers and English letters in a text content character string, and randomly selecting one of the Chinese numbers, names and pronouns to replace the Chinese characters by the anti-meaning word mapping table or with preset probability;
wherein the numbers are randomly replaced in 0-9, the English letters are firstly grouped according to the similarity degree, and the English letters are randomly replaced in each grouping range.
5. The method of claim 1, wherein determining a device anomaly comprises: whether the page size of the equipment generates suspicious height-width ratio or not, and whether the difference of the size of the internal window and the external window exceeds a preset threshold value or not; the judging of the behavior abnormality comprises the following steps: whether there is regular scrolling of the page, and whether there is a continuous touch at the same location on the page.
6. The method of claim 5, wherein if the page aspect ratio and the browser aspect ratio exceed a preset ratio threshold, the device is abnormal;
and presetting a threshold value of the height and the width of the inner window and the outer window, and when the height and/or the width of the inner window and the outer window exceed the preset threshold value, abnormality exists in the equipment.
7. The method of claim 5, wherein for judging whether there is regular scrolling of the page, the scrolling of the page is random, has no obvious rule when the real user browses the content, and is regarded as regular scrolling if the distance and the time interval of continuous scrolling for a long time are approximate, and is judged as abnormal behavior;
for judging whether continuous touches at the same position on the page exist, the real user touches the mobile phone screen, the positions of the front and the rear times are inconsistent, if the positions of the screens are consistent every time, the mobile phone screen is considered to be in machine touch, and abnormal behaviors are judged.
CN202310750618.9A 2023-06-25 2023-06-25 Method for preventing text content from being completely intercepted at Web end Active CN116975853B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310750618.9A CN116975853B (en) 2023-06-25 2023-06-25 Method for preventing text content from being completely intercepted at Web end

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310750618.9A CN116975853B (en) 2023-06-25 2023-06-25 Method for preventing text content from being completely intercepted at Web end

Publications (2)

Publication Number Publication Date
CN116975853A CN116975853A (en) 2023-10-31
CN116975853B true CN116975853B (en) 2024-04-05

Family

ID=88475800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310750618.9A Active CN116975853B (en) 2023-06-25 2023-06-25 Method for preventing text content from being completely intercepted at Web end

Country Status (1)

Country Link
CN (1) CN116975853B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766019A (en) * 2014-01-08 2015-07-08 中兴通讯股份有限公司 Webpage text information protection method, device and system
CN105892907A (en) * 2016-03-25 2016-08-24 乐视控股(北京)有限公司 Use method of rolling screen capture, and terminal
CN110399737A (en) * 2019-07-26 2019-11-01 博雅创智(天津)科技有限公司 A kind of web site contents guard method of non-intrusion type
CN112257038A (en) * 2020-11-19 2021-01-22 创盛视联数码科技(北京)有限公司 Courseware anti-theft method, courseware anti-theft system, electronic equipment and storage medium
CN113342449A (en) * 2021-06-29 2021-09-03 北京天空卫士网络安全技术有限公司 Data protection method and device
CN113688339A (en) * 2021-07-26 2021-11-23 珠海金山办公软件有限公司 Information loading method and device, electronic equipment and computer storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080177994A1 (en) * 2003-01-12 2008-07-24 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows
US8356247B2 (en) * 2008-12-16 2013-01-15 Rich Media Worldwide, Llc Content rendering control system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104766019A (en) * 2014-01-08 2015-07-08 中兴通讯股份有限公司 Webpage text information protection method, device and system
CN105892907A (en) * 2016-03-25 2016-08-24 乐视控股(北京)有限公司 Use method of rolling screen capture, and terminal
CN110399737A (en) * 2019-07-26 2019-11-01 博雅创智(天津)科技有限公司 A kind of web site contents guard method of non-intrusion type
CN112257038A (en) * 2020-11-19 2021-01-22 创盛视联数码科技(北京)有限公司 Courseware anti-theft method, courseware anti-theft system, electronic equipment and storage medium
CN113342449A (en) * 2021-06-29 2021-09-03 北京天空卫士网络安全技术有限公司 Data protection method and device
CN113688339A (en) * 2021-07-26 2021-11-23 珠海金山办公软件有限公司 Information loading method and device, electronic equipment and computer storage medium

Also Published As

Publication number Publication date
CN116975853A (en) 2023-10-31

Similar Documents

Publication Publication Date Title
CN103959206B (en) Method and apparatus for dynamically adapting dummy keyboard
US6199080B1 (en) Method and apparatus for displaying information on a computer controlled display device
US8340408B2 (en) Automatic page layout validation
CN101046826A (en) Information retrieval apparatus
WO2021088422A1 (en) Application message notification method and device
US10474887B2 (en) Identifying a layout error
IL226027A (en) Bidirectional text checker and method
CN106648571B (en) Method and device for calibrating application interface
CN111124564A (en) Method and device for displaying user interface
JP5780409B2 (en) Display control apparatus and program
CN108121648B (en) Interface error monitoring method
CN116975853B (en) Method for preventing text content from being completely intercepted at Web end
CN111124111A (en) Processing method and electronic equipment
CN111915705B (en) Picture visual editing method, device, equipment and medium
JP2005322082A (en) Document attribute input device and method
Sandnes Lost in OCR-translation: pixel-based text reflow to the rescue: magnification of archival raster image documents in the browser without horizontal scrolling
CN110908570B (en) Image processing method, device, terminal and storage medium
CN112000413B (en) Screenshot method and system capable of protecting information and intelligent terminal
CN112749294B (en) Page hidden text recognition method, device, computer equipment and storage medium
CN109598649B (en) Patent file processing method and device and storage medium
WO2012073376A1 (en) Electronic document processing device, electronic document processing method, and computer-readable recording medium
CN117112955A (en) White screen detection method and device and electronic equipment
CN116541274A (en) Translation abnormality determination method and device and electronic equipment
CN115357480A (en) Compatibility difference detection method for web application in windows system and domestic system
JP6296127B2 (en) Display control apparatus and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant