WO2022133910A1 - 一种网页取证方法、网页取证装置及服务器 - Google Patents

一种网页取证方法、网页取证装置及服务器 Download PDF

Info

Publication number
WO2022133910A1
WO2022133910A1 PCT/CN2020/139041 CN2020139041W WO2022133910A1 WO 2022133910 A1 WO2022133910 A1 WO 2022133910A1 CN 2020139041 W CN2020139041 W CN 2020139041W WO 2022133910 A1 WO2022133910 A1 WO 2022133910A1
Authority
WO
WIPO (PCT)
Prior art keywords
forensics
request
forensic
webpage
application container
Prior art date
Application number
PCT/CN2020/139041
Other languages
English (en)
French (fr)
Inventor
李伟
蔡亮
匡立中
谢杨洁
李不依
Original Assignee
杭州趣链科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州趣链科技有限公司 filed Critical 杭州趣链科技有限公司
Priority to PCT/CN2020/139041 priority Critical patent/WO2022133910A1/zh
Publication of WO2022133910A1 publication Critical patent/WO2022133910A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Definitions

  • the present application provides a web forensics method, a web forensics device, a server and a computer-readable storage medium, which can improve the stability of web forensics, ensure the success rate of web forensics, and bring better forensics to users. experience.
  • the web page pointed to by the forensic request is accessed through the target application container engine, and the web page is obtained forensics.
  • the present application provides a webpage forensics device, including:
  • a receiving unit for receiving a forensic request
  • the forensics unit is configured to access the web page pointed to by the forensic request through the target application container engine, and collect evidence on the web page.
  • the present application provides a server, including a memory, a processor, and a computer program stored in the memory and running on the processor.
  • a server including a memory, a processor, and a computer program stored in the memory and running on the processor.
  • the processor executes the computer program, the above-mentioned first aspect is implemented. provided method.
  • the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program implements the method provided in the first aspect when the computer program is executed by a processor.
  • the forensic request is first received, and then the forensic service is called in response to the above-mentioned forensic request, and the target application container engine is started through the above-mentioned forensic service, and the above-mentioned target application container engine is one of the created multiple application container engines. In any one of them, finally access the web page pointed to by the forensic request through the target application container engine, and collect forensics on the web page.
  • This application solution creates multiple application container engines in advance, and when web page forensics needs to be collected, any one of the multiple application container engines is used to access a web page for forensics, which can improve the stability of web page forensics and ensure web page forensics. It brings a better forensic experience to users. It can be understood that, for the beneficial effects of the foregoing second aspect to the fourth aspect, reference may be made to the relevant descriptions in the foregoing first aspect, and details are not described herein again.
  • FIG. 1 is a schematic flowchart of a method for collecting evidence from a webpage provided by an embodiment of the present application
  • FIG. 2 is a structural block diagram of a webpage forensics device provided by an embodiment of the present application.
  • FIG. 3 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the term “if” may be contextually interpreted as “when” or “once” or “in response to determining” or “in response to detecting “.
  • the phrases “if it is determined” or “if the [described condition or event] is detected” may be interpreted, depending on the context, to mean “once it is determined” or “in response to the determination” or “once the [described condition or event] is detected. ]” or “in response to detection of the [described condition or event]”.
  • references in this specification to "one embodiment” or “some embodiments” and the like mean that a particular feature, structure or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically emphasized otherwise.
  • the terms “including”, “including”, “having” and their variants mean “including but not limited to” unless specifically emphasized otherwise.
  • FIG. 1 shows a flowchart of a web page forensics method provided by an embodiment of the present application.
  • the web page forensics method is applied to a server, and the details are as follows:
  • Step 101 receiving a forensic request.
  • a server for web page forensics is preset, and a forensics platform runs on the server. After users register on the forensics platform through user terminals such as mobile phones, tablets, and computers, they can use the forensics platform to conduct web pages. Forensics.
  • the user can perform an operation for generating a forensic request on the forensic website provided by the forensic platform through the user terminal, such as clicking a designated button on the forensic website to generate a forensic request.
  • the forensic platform on the server receives the forensic request sent by the user terminal, it can start to perform a series of actions of web forensics.
  • the user can also input the Uniform Resource Locator (URL) of the webpage to be forensics in the forensics website, where the URL is A compact representation of the location and access methods of resources available on the Internet is the address of a standard resource on the Internet.
  • the URL entered by the user in the forensic website can be included in the forensic request and sent to the server together with the forensic request.
  • URL Uniform Resource Locator
  • Step 102 in response to the forensics request, call the forensics service, and start the target application container engine through the forensics service.
  • a forensic service may also be deployed on the server, and all forensic requests received by the forensic platform from the user terminal may be processed through the forensic service. Specifically, in response to the forensic request, the forensic platform may call the forensic service, and start the target application container engine through the forensic service.
  • a plurality of application container engines are pre-created in the operating system of the server, and the application container engines may be Docker containers. The container completely uses the sandbox mechanism and will not have any interface with each other.
  • a Docker container is an instantiation of a Docker image, which can be either pre-created or pre-downloaded.
  • each application container engine in the created multiple application container engines carries a browser, which is used to open a web page that needs to be forensics for web page forensics.
  • the forensics service can be randomly selected as the target application container engine among the multiple application container engines. It should be noted that the selected application container engine should be currently available. If the selected application container engine is currently unavailable (For example, the application container engine is processing other forensic requests), a currently available application container engine needs to be reselected as the target application container engine. After the target application container engine is determined, the forensics service can start the target application container engine.
  • the above-mentioned forensics platform and forensics service can not only be deployed on the same server, but also be deployed on different servers to improve processing efficiency, and different servers can jointly implement the method in the embodiment of the present application. Web forensics methods.
  • step 102 specifically includes:
  • the forensic service is called, and the target application container engine is started through the forensic service.
  • the types of forensic requests may be set to include timed requests and instant requests.
  • the type of forensics request can be selected by the user.
  • the forensics website provided by the forensics platform can provide two options, namely the timed request option and the instant request option.
  • the timed request option can be selected to generate a forensic request of the timed request type.
  • the instant request option can be selected to generate a forensic request of the instant request type.
  • the forensics request may carry a type identifier
  • the forensics platform extracts the type identifier from the forensics request, and the type of the forensics request can be determined according to the type identifier.
  • the forensic request may also carry the specified forensic time.
  • the forensics platform can call the forensic service when the specified forensic time is reached, and start the target application container engine through the forensic service.
  • the forensic platform can immediately call the forensic service, and start the target application container engine through the forensic service.
  • the above-mentioned web forensics method further includes:
  • step A3 specifically includes:
  • A31 Call the timed task framework to obtain the forensic request from the database
  • A33 Receive the forensic request through the forensic service, and start the target application container engine according to the forensic request.
  • the forensic platform may store the forensic request in a preset database.
  • the timed task framework can then be invoked, and the timed task framework can obtain the forensic request from the database in a polling manner to generate a timed task for sending the forensic request to the forensics service.
  • the timed task framework can schedule timed tasks, and when the designated forensics time arrives, execute the timed tasks to send the forensics request to the forensics service.
  • the forensic service can start the target application container engine according to the forensic request.
  • the timed task framework can use the quartz timed task framework.
  • step A33 specifically includes:
  • the forensic request is executed to start the target application container engine.
  • the forensics service may receive a large number of forensic requests in a short period of time. After the request, the forensic request can be added to the request message queue instead of executing the forensic request immediately.
  • the request message queue includes several requests to be executed, and the forensics service can sequentially pull and execute the requests from the request message queue according to the preset execution order.
  • the preset execution order may be a first-in, first-out order, that is, on the timeline, a request to be added to the request message queue may be added first, and may be pulled from the request message queue for execution.
  • the forensic service can execute the forensic request to start the target application container engine. Specifically, the forensics service can execute the forensics request, and start the target application container engine through the cmd command.
  • data processing may also be performed on the forensics request, such as checking whether the format of the URL included in the forensics request is correct, and/or checking whether the URL in the forensics request is available. .
  • Step 103 access the webpage pointed to by the forensic request through the target application container engine, and collect forensics on the webpage.
  • the forensics request may include the URL of the web page to be forensic, and the browser carried in the target application container engine may access the web page to be forensic according to the URL. After the webpage is successfully accessed, the webpage can be forensically obtained through the target application container engine.
  • the browser carried in the target application container may be a headless browser, such as Google Chrome running in headless mode.
  • step 103 specifically includes:
  • the forensics program can run in the target application container engine, and the forensics program can control the browser in the target application container engine to access the web page that needs forensics according to the URL, and after successfully accessing the web page to be forensics, the web page is forensics.
  • the obtained evidence may include: webpage resources, webpage screenshots, forensic records, and network information.
  • the forensics program can be the puppeteer program. puppeteer is the official headless Chrome tool of the Google Chrome team. It is a Node library that provides some advanced API methods to control the headless version of Chrome on the DevTools protocol.
  • the above-mentioned access to the web page to collect evidence on the web page specifically includes:
  • the forensics program may control the browser to access the web page that needs to be forensic, so as to obtain web page resources corresponding to the web page, such as a Hyper Text Markup Language (Hyper Text Markup Language, HTML) file.
  • HTML Hyper Text Markup Language
  • the browser can render the webpage.
  • the forensics program waits for the rendering of the webpage to be completed, it can take a screenshot of the webpage to obtain a screenshot of the webpage, and the screenshot of the webpage contains the content of the webpage to be obtained as a kind of evidence.
  • the forensics program can upload the screenshot of the web page to the forensics service.
  • the screenshot of the webpage can also be added to the evidence package, and then the hash value of the evidence package is calculated, and the hash value is uploaded to the district.
  • the evidence package is a compressed package, which is inconvenient to view, it is also possible to upload the hash value of the evidence package and the webpage screenshot to the blockchain after calculating the hash value of the evidence package and the webpage screenshot.
  • the above-mentioned web page forensics method further includes:
  • a request for forensics is sent to the background management system to instruct the background management system to notify the administrator to manually collect forensics.
  • the forensics of the web page may fail to obtain forensics.
  • the forensics service is detecting
  • the forensics of the web page fails it can be determined whether the number of times the web page has been forensics has reached the preset number of times threshold; Re-forensics of the webpage, where the delay time can be set according to requirements, such as 10 minutes, 30 minutes or 2 hours; if the number of times the webpage has been forensics has reached the preset number of times threshold, the forensic request can be encapsulated after Sent to the background management system.
  • the background management system can be managed by the service operator of web forensics.
  • the background management system can notify the administrator to conduct manual forensics by email or SMS, and after the manual forensics is completed, the The obtained evidence is sent to the user terminal, and the user is notified of the successful evidence collection by email or SMS. In this way, the success rate of forensics can be effectively guaranteed.
  • the forensic request is first received, and then the forensic service is called in response to the above-mentioned forensic request, and the target application container engine is started through the above-mentioned forensic service, and the above-mentioned target application container engine is one of the created multiple application container engines. In any one of them, finally access the web page pointed to by the forensic request through the target application container engine, and collect forensics on the web page.
  • This application solution creates multiple application container engines in advance, and when web page forensics needs to be collected, any one of the multiple application container engines is used to access a web page for forensics, which can improve the stability of web page forensics and ensure web page forensics. It brings a better forensic experience to users.
  • FIG. 2 shows a structural block diagram of a webpage forensics apparatus provided by an embodiment of the present application. For convenience of description, only parts related to the embodiment of the present application are shown.
  • the webpage forensics device 200 includes:
  • a receiving unit 201 configured to receive a forensics request
  • the starting unit 202 is configured to call the forensic service in response to the above-mentioned forensic request, and start the target application container engine through the above-mentioned forensic service, and the above-mentioned target application container engine is any one of the created multiple application container engines;
  • the forensics unit 203 is configured to access the web page pointed to by the forensic request through the target application container engine, and collect evidence on the web page.
  • the above-mentioned starting unit 202 includes:
  • Type determination subunit used to determine the type of the above forensic request
  • a time acquisition subunit used to acquire the specified forensic time according to the above forensic request if the type of the above forensic request is a timing request;
  • a starter subunit is configured to call the above-mentioned forensics service when the above-mentioned designated forensics time is reached, and start the above-mentioned target application container engine through the above-mentioned forensic service.
  • the above-mentioned webpage forensics apparatus 200 further includes:
  • the request storage unit is used for storing the above-mentioned forensic request in a preset database.
  • the above-mentioned promoter unit includes:
  • the framework invocation subunit is used to invoke the timed task framework to obtain the above-mentioned forensic request from the above-mentioned database;
  • the request sending subunit is used to send the above-mentioned forensic request to the above-mentioned forensic service when the above-mentioned designated forensic time is reached through the above-mentioned timing task framework;
  • the engine startup subunit is configured to receive the above-mentioned forensic request through the above-mentioned forensic service, and start the above-mentioned target application container engine according to the above-mentioned forensic request.
  • the above-mentioned engine starter subunit includes:
  • the request pulling subunit is used to sequentially pull requests from the above-mentioned request message queue according to the preset execution order;
  • the request execution subunit is configured to execute the forensic request to start the target application container engine when the forensic request is pulled.
  • the above-mentioned forensic unit 203 is specifically configured to access the above-mentioned webpage by running a forensic program in the above-mentioned target application container engine to collect evidence on the above-mentioned webpage.
  • the above-mentioned forensic unit 203 includes:
  • a webpage access subunit used to access the above-mentioned webpage, and obtain the webpage resource corresponding to the above-mentioned webpage
  • a webpage rendering subunit configured to render the above webpage according to the above webpage resource
  • the webpage screenshot sub-unit is used to take screenshots of the webpage after the rendering of the webpage is completed, and obtain a screenshot of the webpage, so as to complete the evidence collection of the webpage.
  • the above-mentioned webpage forensics apparatus 200 further includes:
  • a number of times judgment unit configured to judge whether the number of times the above-mentioned webpage has been obtained forensics has reached a preset number of times threshold when it is detected that the forensic collection of the above-mentioned webpage fails;
  • a re-obtaining unit configured to re-obtain the above-mentioned webpage if the number of times that the above-mentioned webpage has been collected for evidence does not reach the above-mentioned preset number of times threshold;
  • a background sending unit configured to send the forensics request to the background management system if the number of times the web page has been collected for evidence reaches the preset number of times threshold, so as to instruct the background management system to notify the administrator to manually collect evidence.
  • the forensic request is first received, and then the forensic service is called in response to the above-mentioned forensic request, and the target application container engine is started through the above-mentioned forensic service, and the above-mentioned target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the above-mentioned target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application container engines that have been created.
  • the target application container engine is one of the multiple application
  • FIG. 3 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the server 3 of this embodiment includes: at least one processor 30 (only one is shown in FIG. 3 ), a memory 31 , and a memory 31 stored in the above-mentioned memory 31 and executable on the above-mentioned at least one processor 30
  • Computer program 32 when the processor 30 executes the computer program 32, the following steps are implemented:
  • the forensic service is called, and the target application container engine is started through the above-mentioned forensic service, and the above-mentioned target application container engine is any one of the created multiple application container engines;
  • the web page pointed to by the forensic request is accessed through the target application container engine, and the web page is obtained forensics.
  • the forensic service is invoked above, and the target application container engine is started through the forensic service, including :
  • the specified forensic time is obtained according to the above forensic request
  • the above-mentioned forensic service is called, and the above-mentioned target application container engine is started through the above-mentioned forensic service.
  • the above-mentioned processor 30 also implements the following steps when executing the above-mentioned computer program 32:
  • the above-mentioned forensic service is invoked, and the above-mentioned target application container engine is started through the above-mentioned forensic service, including:
  • the above-mentioned forensic request is received through the above-mentioned forensic service, and the above-mentioned target application container engine is started according to the above-mentioned forensic request.
  • the above-mentioned starting of the above-mentioned target application container engine according to the above-mentioned forensic request includes:
  • the above-mentioned forensic request is pulled, the above-mentioned forensic request is executed to start the above-mentioned target application container engine.
  • the above-mentioned accessing the webpage pointed to by the above-mentioned forensic request through the above-mentioned target application container engine, and collecting forensics on the above-mentioned webpage includes:
  • the above webpage is accessed, and the above webpage is obtained forensics.
  • the above-mentioned visit to the above-mentioned webpage, and the forensic collection of the above-mentioned webpage includes:
  • a screenshot of the above-mentioned webpage is taken to obtain a screenshot of the above-mentioned webpage, so as to complete the forensics of the above-mentioned webpage.
  • the above-mentioned forensic-taking request is sent to the background management system to instruct the above-mentioned background management system to notify the administrator to collect evidence manually.
  • the above-mentioned server 3 may include, but is not limited to, a processor 30 and a memory 31 .
  • FIG. 3 is only an example of the server 3, and does not constitute a limitation on the server 3. It may include more or less components than the one shown in the figure, or combine some components, or different components, such as It may also include input and output devices, network access devices, and the like.
  • the so-called processor 30 may be a central processing unit (Central Processing Unit, CPU), and the processor 30 may also be other general-purpose processors, digital signal processors (Digital Signal Processors) Processor, DSP), application-specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the above-mentioned memory 31 may be an internal storage unit of the above-mentioned server 3 in some embodiments, such as a hard disk or a memory of the server 3 .
  • the above-mentioned memory 31 may also be an external storage device of the above-mentioned server 3, such as a plug-in hard disk equipped on the above-mentioned server 3, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) ) card, Flash Card, etc.
  • the above-mentioned memory 31 may also include both the internal storage unit of the above-mentioned server 3 and an external storage device.
  • the above-mentioned memory 31 is used to store an operating system, an application program, a boot loader (Boot Loader), data, and other programs, for example, program codes of the above-mentioned computer programs, and the like.
  • the above-mentioned memory 31 can also be used to temporarily store data that has been output or is to be output.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一种网页取证方法、网页取证装置及服务器,适用于计算机技术领域。所述方法包括:接收取证请求(101);响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎(102),所述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证(103)。通过上述方法,可以提高网页取证的稳定性,保证网页取证的成功率,给用户带来较好的取证体验。

Description

一种网页取证方法、网页取证装置及服务器 技术领域
本申请属于计算机技术领域,尤其涉及一种网页取证方法、网页取证装置、服务器及计算机可读存储介质。
背景技术
随着互联网技术的普及,越来越多可用于司法诉讼的证据以网页的形式存在于互联网上。目前的网页取证方式中,是采用物理机作为网页取证的服务器,在物理机上打开网页进行网页取证。
技术问题
目前的网页取证方式中,是采用物理机作为网页取证的服务器,在物理机上打开网页进行网页取证。然而,这样的取证方式经常会发生取证失败的情况,用户体验较差。
技术解决方案
有鉴于此,本申请提供了一种网页取证方法、网页取证装置、服务器及计算机可读存储介质,可以提高网页取证的稳定性,保证网页取证的成功率,给用户带来了较好的取证体验。
第一方面,本申请提供了一种网页取证方法,包括:
接收取证请求;
响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。
第二方面,本申请提供了一种网页取证装置,包括:
接收单元,用于接收取证请求;
启动单元,用于响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
取证单元,用于通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。
第三方面,本申请提供了一种服务器,包括存储器、处理器以及存储在上述存储器中并可在上述处理器上运行的计算机程序,上述处理器执行上述计算机程序时实现如上述第一方面所提供的方法。
第四方面,本申请提供了一种计算机可读存储介质,上述计算机可读存储介质存储有计算机程序,上述计算机程序被处理器执行时实现如第一方面所提供的方法。
有益效果
由上可见,本申请方案中首先接收取证请求,然后响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个,最后通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。本申请方案通过预先创建多个应用容器引擎,在需要进行网页取证时,通过多个应用容器引擎中的任意一个应用容器引擎访问网页以进行取证,可以提高网页取证的稳定性,保证了网页取证的成功率,给用户带来了较好的取证体验。可以理解的是,上述第二方面至第四方面的有益效果可以参见上述第一方面中的相关描述,在此不再赘述。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的网页取证方法的流程示意图;
图2是本申请实施例提供的网页取证装置的结构框图;
图3是本申请实施例提供的服务器的结构示意图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
应当理解,当在本申请说明书和所附权利要求书中使用时,术语“包括”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。
如在本申请说明书和所附权利要求书中所使用的那样,术语“如果”可以依据上下文被解释为“当...时”或“一旦”或“响应于确定”或“响应于检测到”。类似地,短语“如果确定”或“如果检测到[所描述条件或事件]”可以依据上下文被解释为意指“一旦确定”或“响应于确定”或“一旦检测到[所描述条件或事件]”或“响应于检测到[所描述条件或事件]”。
另外,在本申请说明书和所附权利要求书的描述中,术语“第一”、“第二”、“第三”等仅用于区分描述,而不能理解为指示或暗示相对重要性。
在本申请说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
图1示出了本申请实施例提供的一种网页取证方法的流程图,该网页取证方法应用于服务器,详述如下:
步骤101,接收取证请求。
在本申请实施例中,预先设置有用于网页取证的服务器,该服务器上运行有取证平台,用户通过手机、平板和电脑等用户终端在取证平台上进行注册后,即可使用该取证平台进行网页取证。
具体地,当用户需要对某个网页进行取证时,用户可以通过用户终端在取证平台提供的取证网站上执行用于生成取证请求的操作,比如点击取证网站上的指定按钮,生成取证请求。服务器上的取证平台接收到用户终端发送的取证请求时,即可开始执行网页取证的一系列动作。为了使服务器能够确定需要取证的网页,在执行用于生成取证请求的操作之前,用户还可以在取证网站中输入需要取证的网页的统一资源定位符(Uniform Resource Locator,URL),其中,URL是对可以从互联网上得到的资源的位置和访问方法的一种简洁的表示,是互联网上标准资源的地址。用户在取证网站中输入的URL可以包含在取证请求中,随取证请求一并发送至服务器。
步骤102,响应于取证请求,调用取证服务,通过取证服务启动目标应用容器引擎。
在本申请实施例中,还可以在服务器上部署取证服务,取证平台从用户终端处接收到的取证请求,均可以通过该取证服务进行处理。具体地,取证平台响应于该取证请求,可以调用取证服务,通过该取证服务启动目标应用容器引擎。其中,服务器的操作系统中预先创建有多个应用容器引擎,该应用容器引擎可以是Docker容器,Docker容器可以理解为一个包括程序以及程序运行所依赖的配置的集合。容器完全使用沙箱机制,相互之间不会有任何接口。一般来说,Docker容器是Docker镜像的实例化,Docker镜像可以是预先创建好的,也可以是预先下载好的。当需要创建一个Docker容器时,需要基于Docker镜像进行一次实例化操作。其中,已创建的多个应用容器引擎中的每个应用容器引擎均承载有浏览器,用于打开需要取证的网页以进行网页取证。通过取证服务,可以在该多个应用容器引擎中随机选择一个应用容器引擎作为目标应用容器引擎,需要注意的是,选择的应用容器引擎应该是当前可用的,如果选择的应用容器引擎当前不可用(比如该应用容器引擎正在处理其它取证请求),则需要重新选择一当前可用的应用容器引擎作为目标应用容器引擎。确定目标应用容器引擎后,取证服务即可将该目标应用容器引擎启动。
在一种可行的实施方式中,上述取证平台和取证服务不仅可以部署在同一服务器上,为了提高处理效率,也可以分别部署在不同的服务器上,由不同的服务器共同实现本申请实施例中的网页取证方法。
可选地,上述步骤102具体包括:
A1、确定取证请求的类型;
A2、若取证请求的类型为定时请求,则根据取证请求获取指定取证时间;
A3、在到达指定取证时间时,调用取证服务,通过取证服务启动目标应用容器引擎。
在本申请实施例中,为了满足用户不同的取证需求,可以设置取证请求的类型包括定时请求和即时请求。取证请求的类型可以由用户自行选择,例如,取证平台提供的取证网站上可以提供两个选项,分别为定时请求选项和即时请求选项,如果用户需要在某个特定的时间对网页进行取证,则可以选择定时请求选项,从而生成类型为定时请求的取证请求,如果用户需要立即对网页进行取证,则可以选择即时请求选项,从而生成类型为即时请求的取证请求。具体地,取证请求中可以携带类型标识,取证平台从取证请求中提取类型标识,根据该类型标识即可确定取证请求的类型。
如果取证请求的类型为定时请求,则该取证请求中还可以携带指定取证时间。取证平台可以在到达指定取证时间时,才调用取证服务,通过取证服务启动目标应用容器引擎。相应地,如果取证请求的类型为即时请求,则取证平台可以立即调用取证服务,通过取证服务启动目标应用容器引擎。
可选地,如果取证请求的类型为定时请求,则上述网页取证方法还包括:
将取证请求存储至预设的数据库中;
相应地,上述步骤A3具体包括:
A31、调用定时任务框架,从数据库中获取取证请求;
A32、通过定时任务框架,在到达指定取证时间时,将取证请求发送至取证服务;
A33、通过取证服务接收取证请求,根据取证请求启动目标应用容器引擎。
在本申请实施例中,如果取证请求的类型为定时请求,则取证平台可以将该取证请求存储至预设的数据库中。接着可以调用定时任务框架,定时任务框架可以通过轮询的方式从该数据库中获取取证请求,以生成定时任务,该定时任务用于将取证请求发送至取证服务。定时任务框架可以对定时任务进行调度,在到达指定取证时间时,执行定时任务,以将取证请求发送至取证服务。当取证服务接收到取证请求时,取证服务可以根据该取证请求启动目标应用容器引擎。其中,定时任务框架可以选用quartz定时任务框架。
可选地,上述步骤A33具体包括:
将取证请求添加到请求消息队列中;
按照预设的执行顺序,依次从请求消息队列中拉取请求;
当拉取到取证请求时,执行取证请求以启动目标应用容器引擎。
在本申请实施例中,考虑到使用取证平台进行取证的用户可能较多,取证服务可能会出现短时间内接收到大量取证请求的情况,为了更好地应对这种情况,取证服务接收到取证请求后,可以先将取证请求添加到请求消息队列中,而不是立即执行这个取证请求。请求消息队列中包括若干个待执行的请求,取证服务可以按照预设的执行顺序,依次从请求消息队列中拉取并执行请求。其中,预设的执行顺序可以是先进先出的顺序,即在时间线上,先添加进入请求消息队列的请求,可以先从请求消息队列中拉取出来执行。当取证服务从请求消息队列中拉取到取证请求时,取证服务可以执行该取证请求以启动目标应用容器引擎。具体地,取证服务可以执行该取证请求,通过cmd命令启动目标应用容器引擎。
可选地,在将取证请求添加到请求消息队列中之前,还可以对取证请求进行数据处理,比如可以检查取证请求中包含的URL的格式是否正确,和/或检查取证请求中的URL是否可用。
步骤103,通过目标应用容器引擎访问取证请求所指向的网页,对网页进行取证。
在本申请实施例中,取证请求中可以包含需要取证的网页的URL,目标应用容器引擎中承载的浏览器可以根据该URL访问需要取证的网页。在成功访问该网页后,即可通过目标应用容器引擎对该网页进行取证。其中,目标应用容器中承载的浏览器可以是无头浏览器,比如headless模式下运行的谷歌浏览器。
可选地,上述步骤103具体包括:
通过在目标应用容器引擎中运行取证程序,访问网页,对网页进行取证。
其中,目标应用容器引擎中可以运行取证程序,该取证程序可以控制目标应用容器引擎中的浏览器根据URL访问需要取证的网页,并在成功访问需要取证的网页后,对网页进行取证。取得的证据可以包括:网页资源、网页截图、取证记录以及网络信息等。其中,取证程序可以是puppeteer程序,puppeteer是Google Chrome团队官方的无界面(Headless)Chrome工具,它是一个Node库,提供了一些高级的API方法来控制DevTools协议上的无头版Chrome。
可选地,上述访问网页,对网页进行取证,具体包括:
访问网页,得到网页对应的网页资源;
根据网页资源对网页进行渲染;
等待网页渲染完成后,对网页进行截图,得到网页截图,以完成对网页的取证。
在本申请实施例中,取证程序可以控制浏览器访问需要取证的网页,从而得到该网页对应的网页资源,比如超文本标记语言(Hyper Text Markup Language,HTML)文件。根据该网页对应的HTML文件,浏览器可以对该网页进行渲染。取证程序等待该网页渲染完成后,即可对网页进行截图,得到网页截图,该网页截图中包含需要取证的网页中的内容,作为一种证据。接下来,取证程序可以将网页截图上传到取证服务。
进一步地,在取证服务获取到网页截图之后,还可以将网页截图、网页资源、取证记录以及网络信息一起添加到证据包中,然后计算证据包的哈希值,将该哈希值上传到区块链中以实现固证,保证证据的真实可靠。可选地,由于证据包是压缩包,不便于查看,因此,还可以计算证据包和网页截图的哈希值后,将证据包和网页截图的哈希值上传到区块链中。
可选地,在对网页进行取证之后,上述网页取证方法还包括:
当检测到对网页进行取证失败时,判断已对网页进行取证的次数是否达到预设次数阈值;
若已对网页进行取证的次数未达到预设次数阈值,则重新对网页进行取证;
若已对网页进行取证的次数达到预设次数阈值,则将取证请求发送至后台管理系统,以指示后台管理系统通知管理员进行人工取证。
在本申请实施例中,因为一些原因(比如浏览器异常或网络异常),对网页进行取证(比如对网页进行截图),可能会出现取证失败的情况,为了应对这种情况,取证服务在检测到对网页进行取证失败时,可以判断已对网页进行取证的次数是否达到了预设次数阈值;如果已对网页进行取证的次数未达到预设次数阈值,则可以在延迟预设的延迟时长后重新对网页进行取证,其中,延迟时长可以根据需求进行设定,比如10分钟、30分钟或2小时;如果已对网页进行取证的次数达到了预设次数阈值,则可以将取证请求进行封装后发送至后台管理系统。后台管理系统可以由网页取证的服务运营商进行管理,当后台管理系统接收到取证请求时,后台管理系统可以通过邮件或手机短信的方式通知管理员进行人工取证,并在人工取证完成后,将取得证据发送至用户终端,并以邮件或手机短信的方式通知用户取证成功。通过此种方式,可以有效保证取证的成功率。
由上可见,本申请方案中首先接收取证请求,然后响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个,最后通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。本申请方案通过预先创建多个应用容器引擎,在需要进行网页取证时,通过多个应用容器引擎中的任意一个应用容器引擎访问网页以进行取证,可以提高网页取证的稳定性,保证了网页取证的成功率,给用户带来了较好的取证体验。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
图2示出了本申请实施例提供的一种网页取证装置的结构框图,为了便于说明,仅示出了与本申请实施例相关的部分。
该网页取证装置200包括:
接收单元201,用于接收取证请求;
启动单元202,用于响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
取证单元203,用于通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。
可选地,上述启动单元202包括:
类型确定子单元,用于确定上述取证请求的类型;
时间获取子单元,用于若上述取证请求的类型为定时请求,则根据上述取证请求获取指定取证时间;
启动子单元,用于在到达上述指定取证时间时,调用上述取证服务,通过上述取证服务启动上述目标应用容器引擎。
可选地,上述网页取证装置200还包括:
请求存储单元,用于将上述取证请求存储至预设的数据库中。
可选地,上述启动子单元包括:
框架调用子单元,用于调用定时任务框架,从上述数据库中获取上述取证请求;
请求发送子单元,用于通过上述定时任务框架,在到达上述指定取证时间时,将上述取证请求发送至上述取证服务;
引擎启动子单元,用于通过上述取证服务接收上述取证请求,根据上述取证请求启动上述目标应用容器引擎。
可选地,上述引擎启动子单元包括:
队列添加子单元,用于将上述取证请求添加到请求消息队列中;
请求拉取子单元,用于按照预设的执行顺序,依次从上述请求消息队列中拉取请求;
请求执行子单元,用于当拉取到上述取证请求时,执行上述取证请求以启动上述目标应用容器引擎。
可选地,上述取证单元203,具体用于通过在上述目标应用容器引擎中运行取证程序,访问上述网页,对上述网页进行取证。
可选地,上述取证单元203包括:
网页访问子单元,用于访问上述网页,得到上述网页对应的网页资源;
网页渲染子单元,用于根据上述网页资源对上述网页进行渲染;
网页截图子单元,用于等待上述网页渲染完成后,对上述网页进行截图,得到网页截图,以完成对上述网页的取证。
可选地,上述网页取证装置200还包括:
次数判断单元,用于当检测到对上述网页进行取证失败时,判断已对上述网页进行取证的次数是否达到预设次数阈值;
重新取证单元,用于若已对上述网页进行取证的次数未达到上述预设次数阈值,则重新对上述网页进行取证;
后台发送单元,用于若已对上述网页进行取证的次数达到上述预设次数阈值,则将上述取证请求发送至后台管理系统,以指示上述后台管理系统通知管理员进行人工取证。
由上可见,本申请方案中首先接收取证请求,然后响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个,最后通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。本申请方案通过预先创建多个应用容器引擎,在需要进行网页取证时,通过多个应用容器引擎中的任意一个应用容器引擎访问网页以进行取证,可以提高网页取证的稳定性,保证了网页取证的成功率,给用户带来了较好的取证体验。
图3为本申请一实施例提供的服务器的结构示意图。如图3所示,该实施例的服务器3包括:至少一个处理器30(图3中仅示出一个)、存储器31以及存储在上述存储器31中并可在上述至少一个处理器30上运行的计算机程序32,上述处理器30执行上述计算机程序32时实现以下步骤:
接收取证请求;
响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。
假设上述为第一种可能的实施方式,则在第一种可能的实施方式作为基础而提供的第二种可能的实施方式中,上述调用取证服务,通过上述取证服务启动目标应用容器引擎,包括:
确定上述取证请求的类型;
若上述取证请求的类型为定时请求,则根据上述取证请求获取指定取证时间;
在到达上述指定取证时间时,调用上述取证服务,通过上述取证服务启动上述目标应用容器引擎。
在上述第二种可能的实施方式作为基础而提供的第三种可能的实施方式中,若上述取证请求的类型为定时请求,则上述处理器30执行上述计算机程序32时还实现以下步骤:
将上述取证请求存储至预设的数据库中;
相应地,上述在到达上述指定取证时间时,调用上述取证服务,通过上述取证服务启动上述目标应用容器引擎,包括:
调用定时任务框架,从上述数据库中获取上述取证请求;
通过上述定时任务框架,在到达上述指定取证时间时,将上述取证请求发送至上述取证服务;
通过上述取证服务接收上述取证请求,根据上述取证请求启动上述目标应用容器引擎。
在上述第三种可能的实施方式作为基础而提供的第四种可能的实施方式中,上述根据上述取证请求启动上述目标应用容器引擎,包括:
将上述取证请求添加到请求消息队列中;
按照预设的执行顺序,依次从上述请求消息队列中拉取请求;
当拉取到上述取证请求时,执行上述取证请求以启动上述目标应用容器引擎。
在上述第一种可能的实施方式作为基础而提供的第五种可能的实施方式中,上述通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证,包括:
通过在上述目标应用容器引擎中运行取证程序,访问上述网页,对上述网页进行取证。
在上述第五种可能的实施方式作为基础而提供的第六种可能的实施方式中,上述访问上述网页,对上述网页进行取证,包括:
访问上述网页,得到上述网页对应的网页资源;
根据上述网页资源对上述网页进行渲染;
等待上述网页渲染完成后,对上述网页进行截图,得到网页截图,以完成对上述网页的取证。
在上述第一种可能的实施方式作为基础,或上述第二种可能的实施方式作为基础,或上述第三种可能的实施方式作为基础,或上述第四种可能的实施方式作为基础,或上述第五种可能的实施方式作为基础,或上述第六种可能的实施方式作为基础而提供的第七种可能的实施方式中,在上述对上述网页进行取证之后,上述处理器30执行上述计算机程序32时还实现以下步骤:
当检测到对上述网页进行取证失败时,判断已对上述网页进行取证的次数是否达到预设次数阈值;
若已对上述网页进行取证的次数未达到上述预设次数阈值,则重新对上述网页进行取证;
若已对上述网页进行取证的次数达到上述预设次数阈值,则将上述取证请求发送至后台管理系统,以指示上述后台管理系统通知管理员进行人工取证。
上述服务器3可包括,但不仅限于,处理器30、存储器31。本领域技术人员可以理解,图3仅仅是服务器3的举例,并不构成对服务器3的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如还可以包括输入输出设备、网络接入设备等。
所称处理器30可以是中央处理单元(Central Processing Unit,CPU),该处理器30还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
上述存储器31在一些实施例中可以是上述服务器3的内部存储单元,例如服务器3的硬盘或内存。上述存储器31在另一些实施例中也可以是上述服务器3的外部存储设备,例如上述服务器3上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,上述存储器31还可以既包括上述服务器3的内部存储单元也包括外部存储设备。上述存储器31用于存储操作系统、应用程序、引导装载程序(BootLoader)、数据以及其他程序等,例如上述计算机程序的程序代码等。上述存储器31还可以用于暂时地存储已经输出或者将要输出的数据。
由上可见,本申请方案中首先接收取证请求,然后响应于上述取证请求,调用取证服务,通过上述取证服务启动目标应用容器引擎,上述目标应用容器引擎为已创建的多个应用容器引擎中的任一个,最后通过上述目标应用容器引擎访问上述取证请求所指向的网页,对上述网页进行取证。本申请方案通过预先创建多个应用容器引擎,在需要进行网页取证时,通过多个应用容器引擎中的任意一个应用容器引擎访问网页以进行取证,可以提高网页取证的稳定性,保证了网页取证的成功率,给用户带来了较好的取证体验。
需要说明的是,上述装置/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其具体功能及带来的技术效果,具体可参见方法实施例部分,此处不再赘述。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将上述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
本申请实施例还提供了一种计算机可读存储介质,上述计算机可读存储介质存储有计算机程序,上述计算机程序被处理器执行时实现上述各个方法实施例中的步骤。
本申请实施例提供了一种计算机程序产品,当计算机程序产品在服务器上运行时,使得服务器执行上述各个方法实施例中的步骤。
上述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,可以通过计算机程序来指令相关的硬件来完成,上述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,上述计算机程序包括计算机程序代码,上述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。上述计算机可读介质至少可以包括:能够将计算机程序代码携带到服务器的任何实体或装置、记录介质、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质。例如U盘、移动硬盘、磁碟或者光盘等。在某些司法管辖区,根据立法和专利实践,计算机可读介质不可以是电载波信号和电信信号。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在本申请所提供的实施例中,应该理解到,所揭露的装置/网络设备和方法,可以通过其它的方式实现。例如,以上所描述的装置/网络设备实施例仅仅是示意性的,例如,上述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。
上述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (16)

  1. 一种网页取证方法,其特征在于,包括:
    接收取证请求;
    响应于所述取证请求,调用取证服务,通过所述取证服务启动目标应用容器引擎,所述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
    通过所述目标应用容器引擎访问所述取证请求所指向的网页,对所述网页进行取证。
  2. 根据权利要求1所述的网页取证方法,其特征在于,所述调用取证服务,通过所述取证服务启动目标应用容器引擎,包括:
    确定所述取证请求的类型;
    若所述取证请求的类型为定时请求,则根据所述取证请求获取指定取证时间;
    在到达所述指定取证时间时,调用所述取证服务,通过所述取证服务启动所述目标应用容器引擎。
  3. 根据权利要求2所述的网页取证方法,其特征在于,若所述取证请求的类型为定时请求,则所述网页取证方法还包括:
    将所述取证请求存储至预设的数据库中;
    相应地,所述在到达所述指定取证时间时,调用所述取证服务,通过所述取证服务启动所述目标应用容器引擎,包括:
    调用定时任务框架,从所述数据库中获取所述取证请求;
    通过所述定时任务框架,在到达所述指定取证时间时,将所述取证请求发送至所述取证服务;
    通过所述取证服务接收所述取证请求,根据所述取证请求启动所述目标应用容器引擎。
  4. 根据权利要求3所述的网页取证方法,其特征在于,所述根据所述取证请求启动所述目标应用容器引擎,包括:
    将所述取证请求添加到请求消息队列中;
    按照预设的执行顺序,依次从所述请求消息队列中拉取请求;
    当拉取到所述取证请求时,执行所述取证请求以启动所述目标应用容器引擎。
  5. 根据权利要求1所述的网页取证方法,其特征在于,所述通过所述目标应用容器引擎访问所述取证请求所指向的网页,对所述网页进行取证,包括:
    通过在所述目标应用容器引擎中运行取证程序,访问所述网页,对所述网页进行取证。
  6. 根据权利要求5所述的网页取证方法,其特征在于,所述访问所述网页,对所述网页进行取证,包括:
    访问所述网页,得到所述网页对应的网页资源;
    根据所述网页资源对所述网页进行渲染;
    等待所述网页渲染完成后,对所述网页进行截图,得到网页截图,以完成对所述网页的取证。
  7. 根据权利要求1-6任一项所述的网页取证方法,其特征在于,在所述对所述网页进行取证之后,所述网页取证方法还包括:
    当检测到对所述网页进行取证失败时,判断已对所述网页进行取证的次数是否达到预设次数阈值;
    若已对所述网页进行取证的次数未达到所述预设次数阈值,则重新对所述网页进行取证;
    若已对所述网页进行取证的次数达到所述预设次数阈值,则将所述取证请求发送至后台管理系统,以指示所述后台管理系统通知管理员进行人工取证。
  8. 一种网页取证装置,其特征在于,包括:
    接收单元,用于接收取证请求;
    启动单元,用于响应于所述取证请求,调用取证服务,通过所述取证服务启动目标应用容器引擎,所述目标应用容器引擎为已创建的多个应用容器引擎中的任一个;
    取证单元,用于通过所述目标应用容器引擎访问所述取证请求所指向的网页,对所述网页进行取证。
  9. 根据权利要求8所述的网页取证装置,其特征在于,所述启动单元包括:
    类型确定子单元,用于确定所述取证请求的类型;
    时间获取子单元,用于若所述取证请求的类型为定时请求,则根据所述取证请求获取指定取证时间;
    启动子单元,用于在到达所述指定取证时间时,调用所述取证服务,通过所述取证服务启动所述目标应用容器引擎。
  10. 根据权利要求9所述的网页取证装置,其特征在于,所述网页取证装置还包括:
    请求存储单元,用于将所述取证请求存储至预设的数据库中;
    所述启动子单元包括:
    框架调用子单元,用于调用定时任务框架,从所述数据库中获取所述取证请求;
    请求发送子单元,用于通过所述定时任务框架,在到达所述指定取证时间时,将所述取证请求发送至所述取证服务;
    引擎启动子单元,用于通过所述取证服务接收所述取证请求,根据所述取证请求启动所述目标应用容器引擎。
  11. 根据权利要求10所述的网页取证装置,其特征在于,所述引擎启动子单元包括:
    队列添加子单元,用于将所述取证请求添加到请求消息队列中;
    请求拉取子单元,用于按照预设的执行顺序,依次从所述请求消息队列中拉取请求;
    请求执行子单元,用于当拉取到所述取证请求时,执行所述取证请求以启动所述目标应用容器引擎。
  12. 根据权利要求8所述的网页取证装置,其特征在于,所述取证单元,具体用于通过在所述目标应用容器引擎中运行取证程序,访问所述网页,对所述网页进行取证。
  13. 根据权利要求12所述的网页取证装置,其特征在于,所述取证单元包括:
    网页访问子单元,用于访问所述网页,得到所述网页对应的网页资源;
    网页渲染子单元,用于根据所述网页资源对所述网页进行渲染;
    网页截图子单元,用于等待所述网页渲染完成后,对所述网页进行截图,得到网页截图,以完成对所述网页的取证。
  14. 根据权利要求8-13任一项所述的网页取证装置,其特征在于,所述网页取证装置还包括:
    次数判断单元,用于当检测到对所述网页进行取证失败时,判断已对所述网页进行取证的次数是否达到预设次数阈值;
    重新取证单元,用于若已对所述网页进行取证的次数未达到所述预设次数阈值,则重新对所述网页进行取证;
    后台发送单元,用于若已对所述网页进行取证的次数达到所述预设次数阈值,则将所述取证请求发送至后台管理系统,以指示所述后台管理系统通知管理员进行人工取证。
  15. 一种服务器,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至7任一项所述的方法。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述的方法。
PCT/CN2020/139041 2020-12-24 2020-12-24 一种网页取证方法、网页取证装置及服务器 WO2022133910A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/139041 WO2022133910A1 (zh) 2020-12-24 2020-12-24 一种网页取证方法、网页取证装置及服务器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/139041 WO2022133910A1 (zh) 2020-12-24 2020-12-24 一种网页取证方法、网页取证装置及服务器

Publications (1)

Publication Number Publication Date
WO2022133910A1 true WO2022133910A1 (zh) 2022-06-30

Family

ID=82157193

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/139041 WO2022133910A1 (zh) 2020-12-24 2020-12-24 一种网页取证方法、网页取证装置及服务器

Country Status (1)

Country Link
WO (1) WO2022133910A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325615A1 (en) * 2009-06-23 2010-12-23 Myspace Inc. Method and system for capturing web-page information through web-browser plugin
CN106575243A (zh) * 2014-07-30 2017-04-19 微软技术许可有限责任公司 管理程序托管的虚拟机取证
CN110135201A (zh) * 2019-04-28 2019-08-16 阿里巴巴集团控股有限公司 一种基于独立运行环境的网页取证方法及装置
CN111191240A (zh) * 2019-12-30 2020-05-22 支付宝(杭州)信息技术有限公司 互联网电子证据的采集方法、装置及设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325615A1 (en) * 2009-06-23 2010-12-23 Myspace Inc. Method and system for capturing web-page information through web-browser plugin
CN106575243A (zh) * 2014-07-30 2017-04-19 微软技术许可有限责任公司 管理程序托管的虚拟机取证
CN110135201A (zh) * 2019-04-28 2019-08-16 阿里巴巴集团控股有限公司 一种基于独立运行环境的网页取证方法及装置
CN111191240A (zh) * 2019-12-30 2020-05-22 支付宝(杭州)信息技术有限公司 互联网电子证据的采集方法、装置及设备

Similar Documents

Publication Publication Date Title
CN107729352B (zh) 页面资源加载方法及终端设备
US10320623B2 (en) Techniques for tracking resource usage statistics per transaction across multiple layers of protocols
WO2019201039A1 (zh) 一种更新应用程序的方法、系统及应用服务器
CN109361754A (zh) 一种基于浏览器的文件传输方法及装置
WO2021179156A1 (zh) 消息处理方法、装置、系统以及服务器
WO2017097262A1 (zh) 数据交互方法和装置及计算机程序和计算机可读介质
WO2016000507A1 (zh) 省流量模式搜索服务的方法、服务器、客户端和系统
CN113010378B (zh) 微服务模块的日志处理方法及装置、存储介质、电子装置
CN112799925A (zh) 数据采集方法、装置、电子设备和可读存储介质
CN111651140B (zh) 基于工作流的服务方法及装置
CN111930531A (zh) 数据处理、数据生产、数据消费方法、装置、设备及介质
EP3506599B1 (en) Method for synchronizing contact information, apparatus and medium
CN109725887B (zh) 基于消息研发框架的数据交互方法、装置及终端设备
WO2014075504A1 (zh) 一种运行应用程序的安全控制方法和装置
CN113259494B (zh) 文件存储方法、装置、电子设备及存储介质
CN112714351A (zh) 一种取证方法、取证装置及服务器
CN112579960A (zh) 一种网页取证方法、网页取证装置及服务器
CN113965628A (zh) 消息调度方法、服务器和存储介质
WO2022133910A1 (zh) 一种网页取证方法、网页取证装置及服务器
CN114780353B (zh) 一种文件日志监控方法、系统及计算设备
CN116150513A (zh) 数据处理方法、装置、电子设备及计算机可读存储介质
CN114048059A (zh) 接口的超时时间调整方法、装置、计算机设备及存储介质
CN110262912B (zh) 一种过程调用gRPC的调用方法及装置
CN110474954B (zh) 基于区块链的文件分享方法、装置、计算机设备及可读存储介质
CN113377563A (zh) 一种网页监控方法及计算设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20966482

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20966482

Country of ref document: EP

Kind code of ref document: A1