Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-crawler key information protection method

A key information, anti-crawling technology, applied in the field of anti-crawling, can solve problems such as poor website experience, poor user experience, and low cost, and achieve the effect of easy software configuration, improved user experience, and low development costs.

Active Publication Date: 2020-06-05
四川坤翔科技有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most crawlers will fake these UAs, so this method will often fail
[0015] 4. Limited Data Access
However, many websites are not applicable. When users need full data access, the experience of the website is not so good.
[0017] 5. Access frequency limitation
However, the possible execution efficiency of this method is low, which will reduce the execution efficiency of the overall website
[0035] By summarizing the above-mentioned existing mainstream anti-crawler technologies, we can see its disadvantages: first, anti-crawling is contradictory to user experience, anti-crawling technology makes crawlers more difficult to crawl, often resulting in poorer user experience; second, anti-crawling The crawling technology or strategy is not universal, and various existing strategies or technologies are superimposed and used. Personalization can enhance the anti-crawling effect, but it greatly increases the workload of website development and maintenance, and increases the cost; the third is that crawlers are combined with image recognition, etc. New technology, it is easy to bypass the anti-climbing strategy, making the anti-climbing technology invalid
Therefore, generally speaking, there is no technology with high anti-climbing strategy, low cost and good user experience in the current technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] A method for protecting key information from reptiles provided by the present invention, in the specific implementation process, the specific steps are as follows:

[0065] Step 1: Divide the display information of the website into general information and key information, establish a key information ID for the key information, and generate a QR code containing the key information ID and the URL entry address of the anti-crawling module.

[0066] The general information is routine information, for example: the location, photo, profile, company of an outdoor billboard, and so on.

[0067] The key information includes relevant phone numbers, mobile phone numbers, WeChat IDs, etc., for example: the phone number, mobile phone number, WeChat ID, etc. of the billboard owner or agent in charge, which are used to directly contact the person in charge of placing the advertisement.

[0068] Because the amount of key information ID information is extremely small, it is very easy to...

Embodiment 2

[0077] A method for protecting key information from reptiles provided by the present invention, in the specific implementation process, the specific steps are as follows:

[0078] Step 1: Divide the display information of the website into general information and key information, establish a key information ID for the key information, and generate a QR code containing the key information ID and the URL entry address of the anti-crawling module.

[0079] For example: in the case of industrial and commercial inquiries, the general information is conventional information, such as the name, company profile and address information of a certain company, and the key information can be contact information, photos, phone numbers, mobile phone numbers, WeChat IDs, etc. of legal persons.

[0080] Step 2, when user B browses the website page on the mobile terminal, the website page only displays the above-mentioned general information and the generated QR code, and blocks the display of key...

Embodiment 3

[0087] A method for protecting key information from reptiles provided by the present invention, in the specific implementation process, the specific steps are as follows:

[0088] Step 1: Divide the display information of the website into general information and key information, establish a key information ID for the key information, and generate a QR code containing the key information ID and the URL entry address of the anti-crawling module.

[0089] For example: on an enterprise promotion website, the general information is conventional information, the name, company profile and address information of a certain enterprise, and the key information may be the contact information, cooperation strategy, marketing strategy, etc. of the contact person.

[0090] Step 2, when user C browses the website page on the mobile phone, the website page only displays the above-mentioned general information and the generated QR code, and blocks the display of key information.

[0091] Step 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-crawler key information protection method, and the method mainly comprises the following steps: dividing website display information into common information and key information, and generating a QR code containing a key information ID and an anti-crawler module URL entry address; when a user needs to inquire key information, enabling the user to scan or press the QRcode for a long time for recognition through a handheld terminal, enabling the anti-crawler module to collect a user ID for judgment and analysis: if the user ID is judged to be an abnormal user, blocking the subsequent access of the user ID; if the user is judged to be the normal user, associating the key information corresponding to the key information ID and automatically displaying the key information to the user at the handheld terminal. It can be seen from the steps that the website is protected at low cost and the key information is protected against illegal crawling simply and quickly, and meanwhile, the user experience can be greatly improved.

Description

technical field [0001] The invention relates to anti-crawler technology in Internet information security, in particular to a method for anti-crawler protection of key information. Background technique [0002] The latest Internet security company Imperva analyzed the website visits of 100,000 domain names around the world, saying that about 52% of Internet traffic worldwide comes from "robots". Since Imperva monitored network traffic in 2012, the network traffic generated by machines has surpassed the traffic generated by humans for five consecutive years. Only in 2015, the traffic generated by humans surpassed once by a slight advantage, but the data was quickly countered. That is to say, most of the existing website visitors are not human beings, but the execution of automated programs, which are referred to as crawlers in the industry. [0003] According to research statistics, about 20% of global Internet requests are generated by malicious crawlers. The proportion of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K7/14
CPCH04L63/1441H04L63/1491G06K7/1417
Inventor 张冰
Owner 四川坤翔科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products