[go: up one dir, main page]

WO2018166365A1 - Method and device for recording website access log - Google Patents

Method and device for recording website access log Download PDF

Info

Publication number
WO2018166365A1
WO2018166365A1 PCT/CN2018/077965 CN2018077965W WO2018166365A1 WO 2018166365 A1 WO2018166365 A1 WO 2018166365A1 CN 2018077965 W CN2018077965 W CN 2018077965W WO 2018166365 A1 WO2018166365 A1 WO 2018166365A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
request
information
identifier
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/077965
Other languages
French (fr)
Chinese (zh)
Inventor
吴鸣刚
乔平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of WO2018166365A1 publication Critical patent/WO2018166365A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Definitions

  • the present application relates to the field of network technologies, and in particular, to a method and apparatus for recording a website access log.
  • the user's access behavior can be recorded to the website access log, which is used to implement functions such as user behavior analysis.
  • the user sends an access request to the server of the website, and the server of the website returns the website information requested by the user to the user, and after sending the access request, the user sends a log record request corresponding to the access request to the server of the website,
  • the server of the website records the access behavior generated by the user under the access request to the website access log based on the log record request.
  • the inventor has found through research that some users will forge a log request corresponding to the access request and send it to the server of the website without actually accessing the website information, so that the server of the website will not actually have a user who actually happened.
  • the access behavior is logged to the website access log to achieve malicious behavior such as swiping web access traffic.
  • the server of the website receives the log request of the user, it often cannot accurately distinguish whether the user access behavior requested by the user has actually occurred. Therefore, the server of the website inevitably records the user access behavior that has not actually occurred. Go to the website access log.
  • the technical problem to be solved by the embodiments of the present application is to provide a method and apparatus for recording a website access record, so that the server of the website can accurately distinguish whether the user access behavior requested by the user is true when receiving the user's log record request. Occurs, so that the server of the website will not record the user access behavior that has actually occurred to the website access log.
  • an embodiment of the present application provides a system for recording a website access log, including a client and a server system;
  • the server system is configured to receive an access request sent by the client, and obtain related information of the access request, generate a first fingerprint information by using a fingerprint algorithm, and send the first fingerprint information to the client.
  • the identifier information of the first fingerprint information is received, and a log record request for requesting the record of the access behavior is received, and related information of the access behavior is obtained, and the information about the access behavior is generated by the fingerprint algorithm.
  • Fingerprint information if the log record satisfies the recording condition, the access behavior is recorded to the website access log according to the log record request, and if the log record does not satisfy the record condition, the access is refused according to the log record request Behavior recorded to the website access log;
  • the client is configured to send an access request to the server system, and receive the identifier information returned by the server system for the access request, and carry the identifier information in the log access request to the server.
  • System sending
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the embodiment of the present application provides a method for recording a website access log, which is applied to a server system, and includes:
  • the access behavior is recorded to the website access log according to the log record request;
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the embodiment of the present application provides a method for recording a website access log, which is applied to a client, and includes:
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the embodiment of the present application provides an apparatus for recording a website access log, which is configured in a server system, and includes:
  • a first receiving unit configured to receive an access request sent by the client
  • a first acquiring unit configured to acquire related information of the access request
  • a first generating unit configured to generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information
  • a sending unit configured to send, to the client, identifier information that carries the first fingerprint information
  • a second receiving unit configured to receive a log record request, where the log record request is used to request to record an access behavior
  • a second obtaining unit configured to acquire related information about the access behavior
  • a second generating unit configured to generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information
  • a recording unit configured to record the access behavior to a website access log according to the log record request if the log record request satisfies a record condition
  • a rejecting unit configured to refuse to record the access behavior to a website access log according to the log record request if the log record request does not satisfy the record condition
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the embodiment of the present application provides a device for recording a website access log, which is configured on a client, and includes:
  • a first sending unit configured to send an access request to the server system, so that the server system acquires related information of the access request and generates first fingerprint information by using a fingerprint algorithm to generate related information of the access request;
  • a receiving unit configured to receive the identifier information sent by the server system, where the identifier information carries the first fingerprint information
  • a second sending unit configured to: send the identifier information to a server system for requesting to record an access behavior, so that the server system uses the fingerprint algorithm to perform information about the access behavior Generating second fingerprint information, recording the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, and rejecting if the log record does not satisfy the record condition Recording the access behavior to a website access log according to the log record request;
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the server system of the website may increase the fingerprint verification of the access request in the process of recording the access behavior.
  • the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred.
  • the server system of the website when receiving the access request sent by the client, may generate the first fingerprint information based on the related information of the access request and carry the information in the identifier information to the client to indicate that the client is requesting When the access behavior corresponding to the access request is recorded, the identifier information is carried in the log record request and sent to the server system.
  • the server system of the website may generate the second fingerprint information based on the related information of the access behavior corresponding to the log record request and analyze whether the log record request satisfies the recording condition. To determine whether to log the access behavior to the website access log in accordance with the log request record.
  • the first fingerprint information and the second fingerprint information are generated by using the same fingerprint algorithm.
  • the recording condition is: the log record request carries the identifier information, and the first fingerprint information is the same as the second fingerprint information. It can be understood that if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access behavior of the record requested by the log record request.
  • the access behavior has not actually occurred. If the log record request carries the identification information and the second fingerprint information is the same as the first fingerprint information carried by the log record request, the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.
  • FIG. 1 is a schematic diagram of a network system framework involved in an application scenario in an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of a system for recording a website access log according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application
  • FIG. 5 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application
  • FIG. 6 is a schematic structural diagram of an apparatus for recording a website access log according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an apparatus for recording a website access log according to an embodiment of the present application.
  • This application can be used in a variety of general purpose or special purpose computing system environments or configurations.
  • the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the present application can also be practiced in a distributed computing environment where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.
  • the inventor of the present application has found through research that some users will forge a log record request corresponding to the access request and send it to the server of the website without actually accessing the website information, so that the server of the website will not actually occur.
  • the user's access behavior is recorded to the website access log, so as to achieve malicious behavior such as swiping webpage access traffic.
  • the server of the website receives the log request of the user, it often cannot accurately distinguish whether the user access behavior requested by the user has actually occurred. Therefore, the server of the website inevitably records the user access behavior that has not actually occurred. Go to the website access log.
  • the server system of the website may increase the fingerprint verification of the access request in the process of recording the access behavior.
  • the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred.
  • the server system of the website receives the access request sent by the client, the first fingerprint information may be generated and returned to the client based on the related information of the access request.
  • the server system of the website when receiving the log record request, may generate the second fingerprint information based on the related information of the access behavior and determine whether the second fingerprint information is the same as the first fingerprint information carried in the log record request, thereby determining whether The access behavior is logged to the website access log in accordance with the log request record. It can be understood that, if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access request corresponding to the access behavior, and is visible. The access behavior was not actually happened, but the user falsified without actually accessing the website information.
  • the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.
  • one of the scenarios in the embodiment of the present application may be applied to an application scenario as shown in FIG. 1 .
  • the user can access the website provided by the server system 101 through the client 102, wherein the server system 101 of the website can interact with the client 102.
  • the client 102 may send an access request to the server system 101, where the access request carries related information of the access request.
  • the server system 101 may generate the first fingerprint information by using the fingerprint algorithm to generate the first fingerprint information, and send the identifier information carrying the first fingerprint information to the client 102.
  • the client 102 may send a log record request to the server system 101, where the log record request is used to request to record an access behavior corresponding to the access request, where the log record request is carried. There is related information about the access behavior and the identification information.
  • the server system 101 may generate the second fingerprint information by using the fingerprint algorithm to generate related information of the access behavior.
  • the server system 101 may record the access behavior to the website access log according to the log record request. If the log record request does not satisfy the record condition, the server system 101 may refuse to record the access behavior to the website access log according to the log record request.
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • FIG. 2 a schematic structural diagram of a system for recording a website access log in the embodiment of the present application is shown.
  • the system may specifically include a client 202 and a server system 201;
  • the server system 201 is configured to receive an access request sent by the client 202, and obtain related information of the access request, and generate, by using a fingerprint algorithm, information about the access request to generate first fingerprint information, to the client.
  • 202 Send the identifier information carrying the first fingerprint information, receive a log record request for requesting the record of the access behavior, and obtain related information about the access behavior, where the information about the access behavior is obtained by using the fingerprint algorithm Generating second fingerprint information, if the log record satisfies the recording condition, recording the access behavior to the website access log according to the log record request, and rejecting the log record request if the log record does not satisfy the record condition
  • the access behavior is recorded to a website access log;
  • the client 202 is configured to send an access request to the server system 201 and receive the identifier information returned by the server system 201 for the access request, and carry the identifier information in the log access request.
  • the server system 201 sends
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;
  • the related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.
  • the related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;
  • the related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.
  • the referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;
  • the referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior
  • the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.
  • the identifier information further carries a referer identifier and an entry identifier corresponding to the access request;
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior
  • the referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.
  • the identifier information also carries an access time corresponding to the access request
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.
  • the server of the website when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.
  • FIG. 3 a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown.
  • the method of this embodiment can be applied to a server system such as a server system of a website.
  • the method may specifically include the following steps, for example:
  • the server system may extract some related information from the access request and generate the first fingerprint information by using the extracted fingerprint related information. Then, the server system can generate the identification information carrying the first fingerprint information and send it to the client.
  • the identifier information is used to be carried in the log record request corresponding to the access request, so that the server system performs fingerprint verification on the log record request based on the first fingerprint information.
  • the log record request corresponding to the access request is used to record the access behavior corresponding to the access request.
  • the client may adopt different processing manners on the identifier information, and therefore, the server system may receive different log record requests. .
  • the client may carry the identification information in a log record request for requesting the real access behavior corresponding to the access request. Sent to the server system.
  • the related information of the real access behavior is also carried in the log record request. Since the real access behavior corresponds to the access request, that is, the real access behavior is generated under the access request, and therefore, related information of the real access behavior and related information of the access request the same.
  • the client may carry the identifier information in a log for requesting a forged access behavior that does not correspond to the access request.
  • the record request is sent to the server system.
  • the related information of the forged access behavior is also carried in the log record request.
  • the forged access behavior is not corresponding to the access request, that is, the forged access behavior is not generated under the access request, and therefore, the related information of the forged access behavior is related to the access request.
  • the information is not the same.
  • the client may not carry the log request in the request for requesting the forged access behavior that does not correspond to the access request.
  • the log record request is sent to the server system in the case of the identification information. Therefore, the identification information is not carried in the log record request received in the server system.
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the server system may determine whether the log record request carries the identifier information. If the log record request does not carry the identifier information, step 307 is performed. If the log record request carries the identifier information, the server system may determine whether the first fingerprint information is carried in the identifier information. If the first fingerprint information is carried in the identifier information, step 307 is performed. If the identifier information carries the first fingerprint information, the server system may obtain some related information about the access behavior of the request record from the log record request, and generate the second fingerprint information by using the fingerprint algorithm, and then determine the first Whether the fingerprint information and the second fingerprint information are the same. If they are the same, step 306 is performed. If not, step 307 is performed.
  • the client-initiated logging request is used to request the recording of the forged access behavior
  • the forged access behavior is not the real access behavior generated under the access request received by the server system
  • the information related to the forgery of the access behavior needs to be different from the information related to the access request received by the server system. Therefore, based on the same fingerprint algorithm, the first fingerprint information and the second fingerprint information are different. It can be seen that, for the log record request received by the server system, if it is determined that the first fingerprint information is different from the second fingerprint information, it may be determined that the access behavior requested by the log record request is a forged access behavior and is not true.
  • the log request initiated by the client is used to request the real access behavior generated under the access request
  • the information about the real access behavior is the same as the information about the access request received by the server, and therefore, based on the same
  • the fingerprint algorithm is the same as the first fingerprint information and the second fingerprint information. It can be seen that, for the log record request received by the server system, if it is determined that the first fingerprint information is the same as the second fingerprint information, it may be determined that the access behavior requested by the log record request is a real occurrence of the access behavior, thereby This access behavior can be logged to the website access log.
  • the related information of the access request represents information for generating first fingerprint information
  • the related information of the access behavior represents information for generating second fingerprint information. Since the related information of the access request can be used to describe the access request, related information of the access behavior can be used to describe the access behavior, and therefore, the first fingerprint information can function to identify the access request, and the second fingerprint information Can play the role of identifying the access behavior. Therefore, the first fingerprint information and the second fingerprint information can be used to distinguish whether the access behavior is an action generated under the access request, thereby implementing fingerprint verification for a log recording request.
  • the plurality of different related information of the access request may be used to generate first fingerprint information, and correspondingly, the plurality of different related information of the access behavior may be used to generate second fingerprint information.
  • the forgery of the access behavior can be implemented by modifying the user IP address corresponding to the actually generated access request, and the forged access behavior and the real access request often have different user IP addresses. Therefore, in some implementations of this embodiment, the user IP address corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the user IP address corresponding to the access behavior may be used to generate second fingerprint information. That is, the related information of the access request may include a user IP address corresponding to the access request, and correspondingly, the related information of the access behavior may include a user IP address corresponding to the access behavior.
  • the forgery of the access behavior can also be implemented by modifying the access time corresponding to the actual occurrence of the access request, and the forged access behavior often has a different access time than the real access request. Therefore, in other implementation manners of the embodiment, the access time corresponding to the access request may be used to generate the first fingerprint information, and correspondingly, the access time corresponding to the access behavior may be used to generate the second fingerprint information. That is, the related information of the access request may include an access time corresponding to the access request, and correspondingly, the related information of the access behavior may include an access time corresponding to the access behavior.
  • the search keyword corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the search keyword corresponding to the access behavior may be used to generate a second fingerprint.
  • the information, that is, the related information of the access request may include a search keyword corresponding to the access request, and correspondingly, the related information of the access behavior may include a search keyword corresponding to the access behavior.
  • the forgery of the access behavior can also be implemented by modifying the reference page referer and the entry page entry corresponding to the actual occurrence of the access request.
  • the forged access behavior and the real access request often have different referer identifiers and different entry identifiers. . Therefore, in still another embodiment of the present embodiment, the referer identifier and the entry identifier corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the referer identifier and the entry identifier corresponding to the access behavior may be used.
  • the second fingerprint information is generated, that is, the related information of the access request may include a referer identifier and an entry identifier corresponding to the access request.
  • the related information of the access behavior may include a referer identifier and an entry identifier corresponding to the access behavior.
  • the referer can also be called the source page, and the entry can also be called the current page.
  • the user requests access to the entry when accessing the referer; for an access behavior, the webpage currently accessed by the user is an entry, and the webpage accessed by the user before the current webpage is a referer.
  • the referer identifier may be a hash value of the referer address url, and the entry identifier may be a hash value of the entry address url.
  • the referer identifier corresponding to the access request may be a hash value of the referer address corresponding to the access request
  • the entry identifier corresponding to the access request may be a hash value of the entry address corresponding to the access request.
  • the referer identifier corresponding to the access behavior may be a hash value of the referer address corresponding to the access behavior
  • the entry identifier corresponding to the access behavior may specifically be a hash of the entry address corresponding to the access behavior. value.
  • the first fingerprint information and the second fingerprint information may be generated by any one or more kinds of information mentioned above, that is, related information of the access request and the access behavior are related.
  • the information may include any one or more of the information mentioned above.
  • the first fingerprint information may be generated by the user IP address, the access time, the referer identifier, and the entry identifier corresponding to the access request, that is, the related information of the access request may include a user IP address corresponding to the access request
  • the second fingerprint information may be generated by the user IP address, the access time, the referer identifier, and the entry identifier corresponding to the access behavior, that is, the related information of the access behavior may include The user IP address, access time, referer identifier, and entry identifier corresponding to the access behavior.
  • the plurality of related information of the access request may be connected to a character string, for example, by an anchor symbol or the like.
  • the string is the first fingerprint information.
  • the user IP address, the access time, the hash value of the referer address, and the hash value of the entry address corresponding to the access request may be connected to the first fingerprint information by means of an anchor symbol or the like.
  • the second fingerprint information includes a plurality of related information of the access behavior
  • the plurality of related information of the access behavior may be connected to a character string, for example, by an anchor symbol or the like. That is, the second fingerprint information.
  • the user IP address, the access time, the hash value of the referer address, and the hash value of the entry address corresponding to the access behavior may be connected to the second fingerprint information by means of an anchor symbol or the like.
  • the log record request may be further verified by other verification methods to further identify whether the access behavior requested by the log record request is actually generated. Over.
  • the server system can verify whether the referer and the entry corresponding to the access behavior are related to whether the identifier information is carried in the log request and whether the first fingerprint information and the second fingerprint information are the same.
  • the referer and entry corresponding to the access request are the same.
  • the identifier information may carry a referer identifier and an entry identifier in addition to the first fingerprint information.
  • the recording condition may include: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior
  • the referer identifier is the same, and the entry identifier corresponding to the access request identifies an entry identifier corresponding to the access behavior.
  • 306 is performed 306 in the case where the above-described recording condition is completely satisfied
  • 307 is performed in the case where the above-described recording condition is not completely satisfied.
  • the referer identifier and the entry identifier corresponding to the access request are the same as the referer identifier and the entry identifier corresponding to the access behavior
  • 307 is executed.
  • the referer identifier and the entry identifier corresponding to the access request are different from the referer identifier and the entry identifier corresponding to the access behavior, even if the first fingerprint information is the same as the second fingerprint information, 307 is performed. .
  • the server system may require the client to be effective after the access request occurs, in addition to verifying whether the identifier information is carried in the log request and whether the first fingerprint information and the second fingerprint information are the same.
  • the log request is initiated within the time, that is, the server system can also verify whether the access time corresponding to the access request is within the valid time threshold.
  • the identifier information may carry the access time corresponding to the access request in addition to the first fingerprint information.
  • the recording condition may include: the log record request carrying the identifier information, the first fingerprint information being the same as the second fingerprint information, and an access time corresponding to the access request at a current time The time difference between them does not exceed the effective time threshold.
  • 306 is performed 306 in the case where the above-described recording condition is completely satisfied
  • 307 is performed in the case where the above-described recording condition is not completely satisfied. For example, if the first fingerprint information is different from the second fingerprint information, 307 is performed even if the time difference between the current time and the access time corresponding to the access request does not exceed the effective time threshold. For another example, if the time difference between the current time and the access time corresponding to the access request exceeds the effective time threshold, even if the first fingerprint information is the same as the second fingerprint information, 307 is performed.
  • the client may be a browser running on the user terminal, or may be a client program of a web application running on the user terminal.
  • the identification information may be specifically sent by the server system to the client in the form of a JS code and instructing the client to send a log record request.
  • various information to be carried in the identification information may generate a character string by means of an anchor symbol, and encode the identification information by using BASE64, and the generated feature string may be recorded as SIGNATURE.
  • the SIGNATURE can be used as the identification information.
  • SIGNATURE can be inserted as a parameter sig into the JS code of the BEACON module.
  • the server system can send the JS code to the client.
  • the client may collect information about the access behavior during the execution of the JS code and send a log record request carrying the parameter sig to the server system based on the related information of the access behavior.
  • the server system can obtain the SIGNATURE by parsing the parameter sig, and then decode the SIGNATURE with the BASE64 and decompose it using the anchor symbol to obtain various information carried in the identifier information.
  • the server system mentioned in this embodiment may specifically include a web application server (Web Server) for processing user access and a log server (Log Server) for processing access behavior records.
  • Web Server web application server
  • Log Server log server
  • the network application server is configured to process an access request of the client, that is, the network application server is used to execute 301, 302, and 303.
  • the log server is used to process the client's logging request, ie the log server is used to execute 304, 305, 306, and 307.
  • the server system of the website may increase the fingerprint verification of the access request during the process of recording the access behavior. Through the result of the fingerprint verification, the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred. Specifically, if the server system of the website receives the access request sent by the client, the first fingerprint information may be generated and returned to the client based on the related information of the access request.
  • the server system of the website when receiving the log record request, may generate the second fingerprint information based on the related information of the access behavior and determine whether the second fingerprint information is the same as the first fingerprint information carried in the log record request, thereby determining whether The access behavior is logged to the website access log in accordance with the log request record. It can be understood that, if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access request corresponding to the access behavior, and is visible. The access behavior was not actually happened, but the user falsified without actually accessing the website information.
  • the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.
  • FIG. 4 a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown.
  • the method of this embodiment can be applied to a client.
  • the method may specifically include the following steps, for example:
  • the identifier information is sent to the server system in a log record request for requesting to record the access behavior, so that the server system generates the second fingerprint information by using a fingerprint algorithm to generate information about the access behavior. And logging the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, and rejecting the log record if the log record does not satisfy the record condition Requesting to record the access behavior to a website access log;
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;
  • the related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.
  • the related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;
  • the related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.
  • the referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;
  • the referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior
  • the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.
  • the identifier information further carries a referer identifier and an entry identifier corresponding to the access request;
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior
  • the referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.
  • the identifier information also carries an access time corresponding to the access request
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.
  • the server of the website when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.
  • the server system of the website includes a web application server and a log server, the web application server is used to process user access to the website, and the log server is used to process the record of user access behavior.
  • the client that interacts with the server system is the browser on the user terminal. Referring to FIG. 5, a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown. The method may specifically include the following steps, for example:
  • a user browser sends an access request to a web application server.
  • the network application server obtains a referer url and an entry url corresponding to the access request, and calculates a referer url and an entry url respectively by using a hash algorithm, and generates a referer url hash value and an entry url hash value corresponding to the access request. .
  • connection may be, for example, an anchor symbol.
  • the network application server generates a first fingerprint information by using a fingerprint algorithm to generate a character string generated in 503.
  • the network application server connects the string generated in 503 with the first fingerprint information into a character string, and generates a feature string SIGNATURE by using BASE64 encoding.
  • the manner of connection may be, for example, an anchor symbol.
  • the feature string SIGNATURE is the identification information mentioned in the foregoing embodiment.
  • the web application server inserts the SIGNATURE as a parameter sig into the JS code of the BEACON module and sends it to the user browser.
  • the user browser collects related information of the access behavior by parsing and executing the JS code, and sends a log record request carrying the SIGNATURE to the log server.
  • the log record request further carries related information about the access behavior.
  • the information related to the access behavior may include a user IP address, an access time, a referer url, and an entry url corresponding to the access behavior.
  • the log server verifies the SIGNATURE carried in the log record request.
  • SIGNATURE carried in the log request is null or an illegal BASE64 string, enter 516. If there is no SIGNATURE in the log request, go to 516. If the log request contains SIGNATURE and SIGNATURE is a legal BASE64 string, go to 509.
  • the log server performs BASE64 decoding on the SIGNATURE carried in the log record request, generates a character string, and decomposes the string into the first fingerprint information and a user IP address, an access time, and an access time corresponding to the access request. Referer url hash value and entry url hash value.
  • the manner of decomposition may be, for example, an anchor symbol.
  • the log server verifies whether the time difference between the current time and the access time corresponding to the access request exceeds a valid time threshold.
  • time difference exceeds the effective time threshold, then 516 is entered. If the time difference does not exceed the effective time threshold, then 511 is entered.
  • the log server obtains a referer url and an entry url corresponding to the access behavior, and calculates a referer url and an entry url respectively by using a hash algorithm, and generates a referer url hash value and an entry url hash value corresponding to the access behavior.
  • the log server verifies whether the referer url hash value corresponding to the access request is the same as the referer url hash value corresponding to the access behavior, and the entry url hash value corresponding to the access request and the entry corresponding to the access behavior. Whether the url hash value is the same.
  • the referer url hash value corresponding to the access request is the same as the referer url hash value corresponding to the access behavior, and the entry url hash value corresponding to the access request is the same as the entry url hash value corresponding to the access behavior Then go to 513. If the referer url hash value corresponding to the access request is different from the referer url hash value corresponding to the access behavior, and/or the entry url hash value corresponding to the access request and the entry url corresponding to the access behavior If the Greek values are different, go to 516.
  • the log server concatenates the user IP address, the access time, the referer url hash value, and the entry url hash value corresponding to the access behavior into a character string, and generates a second fingerprint information by using a fingerprint algorithm.
  • the log server verifies whether the first fingerprint information and the second fingerprint information are the same.
  • first fingerprint information is the same as the second fingerprint information, go to 515. If the first fingerprint information is different from the second fingerprint information, go to 516.
  • the log server records the access behavior to a website access log according to the log record request.
  • the log server refuses to record the access behavior to the website access log according to the log record request.
  • the server of the website when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.
  • FIG. 6 a schematic structural diagram of an apparatus for recording a website access log in the embodiment of the present application is shown.
  • the device of this embodiment may be configured in a server system, and the device may include, for example:
  • the first receiving unit 601 is configured to receive an access request sent by the client.
  • the first obtaining unit 602 is configured to acquire related information of the access request.
  • the first generating unit 603 is configured to generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information
  • the sending unit 604 is configured to send, to the client, identifier information that carries the first fingerprint information.
  • a second receiving unit 605 configured to receive a log record request, where the log record request is used to request to record an access behavior
  • the second obtaining unit 606 is configured to acquire related information about the access behavior.
  • a second generating unit 607 configured to generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information
  • the recording unit 608 is configured to record the access behavior to the website access log according to the log record request if the log record request satisfies the record condition;
  • the rejecting unit 609 is configured to refuse to record the access behavior to the website access log according to the log record request if the log record request does not satisfy the record condition;
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;
  • the related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.
  • the related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;
  • the related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.
  • the referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;
  • the referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior
  • the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.
  • the identifier information further carries a referer identifier and an entry identifier corresponding to the access request;
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior
  • the referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.
  • the identifier information also carries an access time corresponding to the access request
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.
  • the server of the website when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.
  • FIG. 7 a schematic structural diagram of an apparatus for recording a website access log in an embodiment of the present application is shown.
  • the device in this embodiment may be configured on a client, and the device may include, for example:
  • a first sending unit 701 configured to send an access request to the server system, so that the server system acquires related information of the access request, and generates, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information;
  • the receiving unit 702 is configured to receive the identifier information that is sent by the server system, where the identifier information carries the first fingerprint information.
  • a second sending unit 703 configured to: send the identifier information to a server system for requesting to record an access behavior, so that the server system associates the access behavior by using a fingerprint algorithm
  • the information generates second fingerprint information, and records the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, if the log record does not satisfy the record condition Refusing to record the access behavior to the website access log according to the log record request;
  • the recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
  • the related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;
  • the related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.
  • the related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;
  • the related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.
  • the referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;
  • the referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior
  • the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.
  • the identifier information further carries a referer identifier and an entry identifier corresponding to the access request;
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior
  • the referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.
  • the identifier information also carries an access time corresponding to the access request
  • the recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.
  • the server of the website when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. Those of ordinary skill in the art can understand and implement without any creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Debugging And Monitoring (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosed in embodiments of the present application is a method for recording a website access log. The method comprises: receiving an access request sent by a client; generating first fingerprint information using related information of the access request by means of a fingerprint algorithm; sending identification information carrying the first fingerprint information to the client; receiving a log recording request, the log recording request being used for requesting to record an access behavior; generating second fingerprint information using related information of the access behavior by means of the fingerprint algorithm; if the log recording request meets a recording condition, recording the access behavior in a website access log; and if the log recording request does not meet the recording condition, refusing to record the access behavior in a website access log, wherein the recording condition is that the log recording request carries the identification information and the first fingerprint information is identical to the second fingerprint information. In addition, also disclosed in the embodiments of the present application are a device for recording a website access log and a system.

Description

一种记录网站访问日志的方法和装置Method and device for recording website access log

本申请要求2017年03月15日递交的申请号为201710153803.4、发明名称为“一种记录网站访问日志的方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application Serial No. No. No. No. No. No. No. No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No No

技术领域Technical field

本申请涉及网络技术领域,特别涉及一种记录网站访问日志的方法和装置。The present application relates to the field of network technologies, and in particular, to a method and apparatus for recording a website access log.

背景技术Background technique

在用户访问网站的过程中,用户的访问行为可以被记录到网站访问日志,从而用于实现用户行为分析等功能。具体地,用户向网站的服务器发送访问请求,网站的服务器向用户返回用户所请求的网站信息,并且,在发送访问请求之后,用户会向网站的服务器发送与该访问请求对应的日志记录请求,网站的服务器基于该日志记录请求将用户在该访问请求下产生的访问行为记录到网站访问日志。In the process of the user accessing the website, the user's access behavior can be recorded to the website access log, which is used to implement functions such as user behavior analysis. Specifically, the user sends an access request to the server of the website, and the server of the website returns the website information requested by the user to the user, and after sending the access request, the user sends a log record request corresponding to the access request to the server of the website, The server of the website records the access behavior generated by the user under the access request to the website access log based on the log record request.

发明人经过研究发现,有些用户会在实际上没有对网站信息进行访问的情况下伪造与访问请求对应的日志记录请求并向网站的服务器发送,以期网站的服务器将实际上没有真实发生过的用户访问行为记录到网站访问日志,从而达到刷网页访问流量等恶意行为。但是,网站的服务器在接收到用户的日志记录请求时往往无法准确地区分用户请求记录的用户访问行为是否真实发生过,因此,网站的服务器难以避免地会将没有真实发生过的用户访问行为记录到网站访问日志。The inventor has found through research that some users will forge a log request corresponding to the access request and send it to the server of the website without actually accessing the website information, so that the server of the website will not actually have a user who actually happened. The access behavior is logged to the website access log to achieve malicious behavior such as swiping web access traffic. However, when the server of the website receives the log request of the user, it often cannot accurately distinguish whether the user access behavior requested by the user has actually occurred. Therefore, the server of the website inevitably records the user access behavior that has not actually occurred. Go to the website access log.

发明内容Summary of the invention

本申请实施例所要解决的技术问题是,提供一种记录网站访问记录的方法和装置,以使得网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的用户访问行为是否真实发生过,从而避免网站的服务器将没有真实发生过的用户访问行为记录到网站访问日志。The technical problem to be solved by the embodiments of the present application is to provide a method and apparatus for recording a website access record, so that the server of the website can accurately distinguish whether the user access behavior requested by the user is true when receiving the user's log record request. Occurs, so that the server of the website will not record the user access behavior that has actually occurred to the website access log.

第一方面,本申请实施例提供了一种记录网站访问日志的系统,包括客户端和服务器系统;In a first aspect, an embodiment of the present application provides a system for recording a website access log, including a client and a server system;

所述服务器系统,用于接收所述客户端发送的访问请求并获取所述访问请求的相关信息,通过指纹算法将所述访问请求的相关信息生成第一指纹信息,向所述客户端发送 携带有所述第一指纹信息的标识信息,接收用于请求对访问行为进行记录的日志记录请求并获取所述访问行为的相关信息,通过所述指纹算法将所述访问行为的相关信息生成第二指纹信息,若所述日志记录满足记录条件则按照所述日志记录请求将所述访问行为记录到网站访问日志,若所述日志记录不满足记录条件则拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;The server system is configured to receive an access request sent by the client, and obtain related information of the access request, generate a first fingerprint information by using a fingerprint algorithm, and send the first fingerprint information to the client. The identifier information of the first fingerprint information is received, and a log record request for requesting the record of the access behavior is received, and related information of the access behavior is obtained, and the information about the access behavior is generated by the fingerprint algorithm. Fingerprint information, if the log record satisfies the recording condition, the access behavior is recorded to the website access log according to the log record request, and if the log record does not satisfy the record condition, the access is refused according to the log record request Behavior recorded to the website access log;

所述客户端,用于向所述服务器系统发送访问请求并接收所述服务器系统针对所述访问请求返回的所述标识信息,将所述标识信息携带在所述日志访问请求中向所述服务器系统发送;The client is configured to send an access request to the server system, and receive the identifier information returned by the server system for the access request, and carry the identifier information in the log access request to the server. System sending

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

第二方面,本申请实施例提供了一种记录网站访问日志的方法,应用于服务器系统,包括:In a second aspect, the embodiment of the present application provides a method for recording a website access log, which is applied to a server system, and includes:

接收客户端发送的访问请求并获取所述访问请求的相关信息;Receiving an access request sent by the client and acquiring related information of the access request;

通过指纹算法,将所述访问请求的相关信息生成第一指纹信息;Generating, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information;

向所述客户端发送携带有所述第一指纹信息的标识信息;Sending, to the client, identifier information carrying the first fingerprint information;

接收日志记录请求并获取访问行为的相关信息,所述日志记录请求用于请求对所述访问行为进行记录;Receiving a log record request and obtaining related information of an access behavior, the log record request being used to request to record the access behavior;

通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息;Generating, by the fingerprint algorithm, related information of the access behavior to generate second fingerprint information;

若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志;If the log record request satisfies the record condition, the access behavior is recorded to the website access log according to the log record request;

若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;If the log record request does not satisfy the record condition, refuse to record the access behavior to the website access log according to the log record request;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

第三方面,本申请实施例提供了一种记录网站访问日志的方法,应用于客户端,包括:In a third aspect, the embodiment of the present application provides a method for recording a website access log, which is applied to a client, and includes:

向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;Sending an access request to the server system, so that the server system acquires related information of the access request and generates first fingerprint information by using a fingerprint algorithm to generate related information of the access request;

接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;Receiving the identifier information sent by the server system, where the identifier information carries the first fingerprint information;

将所述标识信息携带在用于请求对访问行为进行记录的日志记录请求中向所述服务 器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;Carrying the identifier information in a log record request for requesting to record the access behavior, and sending the second fingerprint information to the server system by using a fingerprint algorithm to generate the second fingerprint information by using a fingerprint algorithm. If the log record request satisfies the record condition, the access behavior is recorded to the website access log according to the log record request, and if the log record does not satisfy the record condition, the request to refuse according to the log record request is rejected. The access behavior is recorded to a website access log;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

第四方面,本申请实施例提供了一种记录网站访问日志的装置,配置于服务器系统,包括:In a fourth aspect, the embodiment of the present application provides an apparatus for recording a website access log, which is configured in a server system, and includes:

第一接收单元,用于接收客户端发送的访问请求;a first receiving unit, configured to receive an access request sent by the client;

第一获取单元,用于获取所述访问请求的相关信息;a first acquiring unit, configured to acquire related information of the access request;

第一生成单元,用于通过指纹算法,将所述访问请求的相关信息生成第一指纹信息;a first generating unit, configured to generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information;

发送单元,用于向所述客户端发送携带有所述第一指纹信息的标识信息;a sending unit, configured to send, to the client, identifier information that carries the first fingerprint information;

第二接收单元,用于接收日志记录请求,所述日志记录请求用于请求对访问行为进行记录;a second receiving unit, configured to receive a log record request, where the log record request is used to request to record an access behavior;

第二获取单元,用于获取所述访问行为的相关信息;a second obtaining unit, configured to acquire related information about the access behavior;

第二生成单元,用于通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息;a second generating unit, configured to generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information;

记录单元,用于若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志;a recording unit, configured to record the access behavior to a website access log according to the log record request if the log record request satisfies a record condition;

拒绝单元,用于若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;a rejecting unit, configured to refuse to record the access behavior to a website access log according to the log record request if the log record request does not satisfy the record condition;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

第五方面,本申请实施例提供了一种记录网站访问日志的装置,配置于客户端,包括:In a fifth aspect, the embodiment of the present application provides a device for recording a website access log, which is configured on a client, and includes:

第一发送单元,用于向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;a first sending unit, configured to send an access request to the server system, so that the server system acquires related information of the access request and generates first fingerprint information by using a fingerprint algorithm to generate related information of the access request;

接收单元,用于接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;a receiving unit, configured to receive the identifier information sent by the server system, where the identifier information carries the first fingerprint information;

第二发送单元,用于将所述标识信息携带在用于请求对访问行为进行记录的日志记 录请求中向所述服务器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;a second sending unit, configured to: send the identifier information to a server system for requesting to record an access behavior, so that the server system uses the fingerprint algorithm to perform information about the access behavior Generating second fingerprint information, recording the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, and rejecting if the log record does not satisfy the record condition Recording the access behavior to a website access log according to the log record request;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

与现有技术相比,本申请具有以下优点:Compared with the prior art, the present application has the following advantages:

根据本申请实施例的技术方案,网站的服务器系统可以在记录访问行为的过程中增加访问请求的指纹校验。通过指纹校验的结果服务器系统可以确定请求记录的访问行为是否对应于服务器系统曾经接收到过的访问请求,从而能够准确地区分用户请求记录的访问行为是否真实发生过。具体地,网站的服务器系统在接收到客户端发送的访问请求的情况下,可以基于该访问请求的相关信息生成第一指纹信息并携带在标识信息中返回给客户端,以指示客户端在请求记录该访问请求对应的访问行为时将该标识信息携带在日志记录请求中向服务器系统发送。网站的服务器系统在接收到用于请求对访问行为进行记录的日志记录请求的情况下,可以基于日志记录请求对应的访问行为的相关信息生成第二指纹信息并分析该日志记录请求是否满足记录条件,从而确定是否按照该日志请求记录将该访问行为记录到网站访问日志。其中,第一指纹信息和第二指纹信息是采用相同的指纹算法生成的;所述记录条件为:该日志记录请求中携带有标识信息且第一指纹信息与第二指纹信息相同。可以理解的是,若日志记录请求没有携带标识信息或者第二指纹信息与日志记录请求携带的第一指纹信息不相同,则网站的服务器系统没有接收到过该日志记录请求所请求记录的访问行为对应的访问请求,可见,该访问行为是没有真实发生过的。若日志记录请求携带有标识信息且第二指纹信息与日志记录请求携带的第一指纹信息相同,则网站的服务器系统接收到过该日志记录请求所请求记录的访问行为对应的访问请求,可见,该访问行为是真实发生过的。由此可见,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。According to the technical solution of the embodiment of the present application, the server system of the website may increase the fingerprint verification of the access request in the process of recording the access behavior. Through the result of the fingerprint verification, the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred. Specifically, the server system of the website, when receiving the access request sent by the client, may generate the first fingerprint information based on the related information of the access request and carry the information in the identifier information to the client to indicate that the client is requesting When the access behavior corresponding to the access request is recorded, the identifier information is carried in the log record request and sent to the server system. When receiving the log record request for requesting the record of the access behavior, the server system of the website may generate the second fingerprint information based on the related information of the access behavior corresponding to the log record request and analyze whether the log record request satisfies the recording condition. To determine whether to log the access behavior to the website access log in accordance with the log request record. The first fingerprint information and the second fingerprint information are generated by using the same fingerprint algorithm. The recording condition is: the log record request carries the identifier information, and the first fingerprint information is the same as the second fingerprint information. It can be understood that if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access behavior of the record requested by the log record request. Corresponding access requests, it can be seen that the access behavior has not actually occurred. If the log record request carries the identification information and the second fingerprint information is the same as the first fingerprint information carried by the log record request, the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.

附图说明DRAWINGS

为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本 申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings to be used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description are only It is a few embodiments described in the present application, and other drawings can be obtained from those skilled in the art without any creative work.

图1为本申请实施例中一应用场景所涉及的网络系统框架示意图;1 is a schematic diagram of a network system framework involved in an application scenario in an embodiment of the present application;

图2为本申请实施例中一种记录网站访问日志的系统的结构示意图;2 is a schematic structural diagram of a system for recording a website access log according to an embodiment of the present application;

图3为本申请实施例中一种记录网站访问日志的方法的流程示意图;3 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application;

图4为本申请实施例中一种记录网站访问日志的方法的流程示意图;4 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application;

图5为本申请实施例中一种记录网站访问日志的方法的流程示意图;FIG. 5 is a schematic flowchart of a method for recording a website access log according to an embodiment of the present application;

图6为本申请实施例中一种记录网站访问日志的装置的结构示意图;FIG. 6 is a schematic structural diagram of an apparatus for recording a website access log according to an embodiment of the present application;

图7为本申请实施例中一种记录网站访问日志的装置的结构示意图。FIG. 7 is a schematic structural diagram of an apparatus for recording a website access log according to an embodiment of the present application.

具体实施方式detailed description

为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present application. It is a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without departing from the inventive scope are the scope of the present application.

本申请可用于众多通用或专用的计算系统环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。This application can be used in a variety of general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, handheld or portable devices, tablet devices, multiprocessor systems, microprocessor based systems, set-top boxes, programmable consumer electronics devices, network PCs, small computers, mainframe computers, including A distributed computing environment of any of the above systems or devices, and the like.

本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The application can be described in the general context of computer-executable instructions executed by a computer, such as a program module. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types. The present application can also be practiced in a distributed computing environment where tasks are performed by remote processing devices that are connected through a communication network. In a distributed computing environment, program modules can be located in both local and remote computer storage media including storage devices.

本申请的发明人经过研究发现,有些用户会在实际上没有对网站信息进行访问的情况下伪造与访问请求对应的日志记录请求并向网站的服务器发送,以期网站的服务器将实际上没有真实发生过的用户访问行为记录到网站访问日志,从而达到刷网页访问流量等恶意行为。但是,网站的服务器在接收到用户的日志记录请求时往往无法准确地区分用户请求记录的用户访问行为是否真实发生过,因此,网站的服务器难以避免地会将没有真实发生过的用户访问行为记录到网站访问日志。The inventor of the present application has found through research that some users will forge a log record request corresponding to the access request and send it to the server of the website without actually accessing the website information, so that the server of the website will not actually occur. The user's access behavior is recorded to the website access log, so as to achieve malicious behavior such as swiping webpage access traffic. However, when the server of the website receives the log request of the user, it often cannot accurately distinguish whether the user access behavior requested by the user has actually occurred. Therefore, the server of the website inevitably records the user access behavior that has not actually occurred. Go to the website access log.

为了解决现有技术的上述问题,在本申请实施例中,网站的服务器系统可以在记录访问行为的过程中增加访问请求的指纹校验。通过指纹校验的结果服务器系统可以确定请求记录的访问行为是否对应于服务器系统曾经接收到过的访问请求,从而能够准确地区分用户请求记录的访问行为是否真实发生过。具体地,网站的服务器系统在接收到客户端发送的访问请求的情况下,可以基于访问请求的相关信息生成第一指纹信息并返回给客户端。网站的服务器系统在接收到日志记录请求的情况下,可以基于访问行为的相关信息生成第二指纹信息并判断第二指纹信息是否与该日志记录请求中携带的第一指纹信息相同,从而确定是否按照该日志请求记录将该访问行为记录到网站访问日志。可以理解的是,若日志记录请求没有携带标识信息或者第二指纹信息与日志记录请求携带的第一指纹信息不相同,则网站的服务器系统没有接收到过该访问行为对应的访问请求,可见,该访问行为是没有真实发生过的,而是用户在实际上没有对网站信息进行访问的情况下伪造出来的。若日志记录请求携带有标识信息且第二指纹信息与日志记录请求携带的第一指纹信息相同,则网站的服务器系统接收到过该日志记录请求所请求记录的访问行为对应的访问请求,可见,该访问行为是真实发生过的。由此可见,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In order to solve the above problems of the prior art, in the embodiment of the present application, the server system of the website may increase the fingerprint verification of the access request in the process of recording the access behavior. Through the result of the fingerprint verification, the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred. Specifically, if the server system of the website receives the access request sent by the client, the first fingerprint information may be generated and returned to the client based on the related information of the access request. The server system of the website, when receiving the log record request, may generate the second fingerprint information based on the related information of the access behavior and determine whether the second fingerprint information is the same as the first fingerprint information carried in the log record request, thereby determining whether The access behavior is logged to the website access log in accordance with the log request record. It can be understood that, if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access request corresponding to the access behavior, and is visible. The access behavior was not actually happened, but the user falsified without actually accessing the website information. If the log record request carries the identification information and the second fingerprint information is the same as the first fingerprint information carried by the log record request, the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.

举例说明,本申请实施例的场景之一,例如可以是应用到如图1所示的应用场景。在该应用场景中,用户可以通过客户端102对服务器系统101提供的网站进行访问,其中,网站的服务器系统101可以与客户端102进行交互。For example, one of the scenarios in the embodiment of the present application may be applied to an application scenario as shown in FIG. 1 . In this application scenario, the user can access the website provided by the server system 101 through the client 102, wherein the server system 101 of the website can interact with the client 102.

在图1所示的应用场景中,客户端102可以向服务器系统101发送访问请求,其中,所述访问请求中携带有所述访问请求的相关信息。服务器系统101在获取到访问请求的相关信息之后,可以通过指纹算法将所述访问请求的相关信息生成第一指纹信息,并向客户端102发送携带有所述第一指纹信息的标识信息。客户端102在获取所述标识信息之后,可以向服务器系统101发送日志记录请求,其中,所述日志记录请求用于请求对所述访问请求对应的访问行为进行记录,所述日志记录请求中携带有所述访问行为的相关信息以及所述标识信息。服务器系统101在获取所述访问行为的相关信息之后,可以通过所述指纹算法将所述访问行为的相关信息生成第二指纹信息。若所述日志记录请求满足记录条件,服务器系统101可以按照所述日志记录请求将所述访问行为记录到网站访问日志。若所述日志记录请求不满足记录条件,服务器系统101可以拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志。其中,所述记录条件为:所述日志记 录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。In the application scenario shown in FIG. 1, the client 102 may send an access request to the server system 101, where the access request carries related information of the access request. After obtaining the related information of the access request, the server system 101 may generate the first fingerprint information by using the fingerprint algorithm to generate the first fingerprint information, and send the identifier information carrying the first fingerprint information to the client 102. After obtaining the identifier information, the client 102 may send a log record request to the server system 101, where the log record request is used to request to record an access behavior corresponding to the access request, where the log record request is carried. There is related information about the access behavior and the identification information. After acquiring the related information of the access behavior, the server system 101 may generate the second fingerprint information by using the fingerprint algorithm to generate related information of the access behavior. If the log record request satisfies the recording condition, the server system 101 may record the access behavior to the website access log according to the log record request. If the log record request does not satisfy the record condition, the server system 101 may refuse to record the access behavior to the website access log according to the log record request. The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

可以理解的是,上述场景仅是本申请实施例提供的一个场景示例,本申请实施例并不限于此场景。It is to be understood that the foregoing scenario is only one scenario example provided by the embodiment of the present application, and the embodiment of the present application is not limited to this scenario.

下面结合附图,详细说明本申请的各种非限制性实施方式。Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.

示例性系统Exemplary system

参见图2,示出了本申请实施例中一种记录网站访问日志的系统的结构示意图。所述系统例如具体可以包括客户端202和服务器系统201;Referring to FIG. 2, a schematic structural diagram of a system for recording a website access log in the embodiment of the present application is shown. The system may specifically include a client 202 and a server system 201;

所述服务器系统201,用于接收所述客户端202发送的访问请求并获取所述访问请求的相关信息,通过指纹算法将所述访问请求的相关信息生成第一指纹信息,向所述客户端202发送携带有所述第一指纹信息的标识信息,接收用于请求对访问行为进行记录的日志记录请求并获取所述访问行为的相关信息,通过所述指纹算法将所述访问行为的相关信息生成第二指纹信息,若所述日志记录满足记录条件则按照所述日志记录请求将所述访问行为记录到网站访问日志,若所述日志记录不满足记录条件则拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;The server system 201 is configured to receive an access request sent by the client 202, and obtain related information of the access request, and generate, by using a fingerprint algorithm, information about the access request to generate first fingerprint information, to the client. 202: Send the identifier information carrying the first fingerprint information, receive a log record request for requesting the record of the access behavior, and obtain related information about the access behavior, where the information about the access behavior is obtained by using the fingerprint algorithm Generating second fingerprint information, if the log record satisfies the recording condition, recording the access behavior to the website access log according to the log record request, and rejecting the log record request if the log record does not satisfy the record condition The access behavior is recorded to a website access log;

所述客户端202,用于向所述服务器系统201发送访问请求并接收所述服务器系统201针对所述访问请求返回的所述标识信息,将所述标识信息携带在所述日志访问请求中向所述服务器系统201发送;The client 202 is configured to send an access request to the server system 201 and receive the identifier information returned by the server system 201 for the access request, and carry the identifier information in the log access request. The server system 201 sends

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

可选的,Optional,

所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;

所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.

可选的,Optional,

所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;

所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.

可选的,Optional,

所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;

所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.

在本实施例中,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.

示例性方法Exemplary method

参见图3,示出了本申请实施例中一种记录网站访问日志的方法的流程示意图。本实施例的方法可以应用于服务器系统,如网站的服务器系统。所述方法例如具体可以包括以下步骤:Referring to FIG. 3, a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown. The method of this embodiment can be applied to a server system such as a server system of a website. The method may specifically include the following steps, for example:

301、接收客户端发送的访问请求并获取所述访问请求的相关信息。301. Receive an access request sent by a client, and obtain information about the access request.

302、通过指纹算法,将所述访问请求的相关信息生成第一指纹信息。302. Generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information.

303、向所述客户端发送携带有所述第一指纹信息的标识信息。303. Send, to the client, identifier information that carries the first fingerprint information.

在本实施例中,在客户端向服务器系统发送访问请求时,服务器系统可以从访问请求中提取一些相关信息并通过指纹算法将提取出的相关信息生成第一指纹信息。然后,服务器系统可以生成携带有第一指纹信息的标识信息并向客户端发送。其中,所述标识信息用于携带在该访问请求对应的日志记录请求中,以便服务器系统基于第一指纹信息 对该日志记录请求进行指纹校验。其中,该访问请求对应的日志记录请求用于对该访问请求对应的访问行为进行记录。In this embodiment, when the client sends an access request to the server system, the server system may extract some related information from the access request and generate the first fingerprint information by using the extracted fingerprint related information. Then, the server system can generate the identification information carrying the first fingerprint information and send it to the client. The identifier information is used to be carried in the log record request corresponding to the access request, so that the server system performs fingerprint verification on the log record request based on the first fingerprint information. The log record request corresponding to the access request is used to record the access behavior corresponding to the access request.

可以理解的是,在不同的场景下,在所述标识信息发送给客户端之后,客户端可能会对所述标识信息采用不同的处理方式,因此,服务器系统可能会接收到不同的日志记录请求。It can be understood that, in different scenarios, after the identifier information is sent to the client, the client may adopt different processing manners on the identifier information, and therefore, the server system may receive different log record requests. .

例如,若客户端要请求对在所述访问请求下产生的真实访问行为进行记录,客户端可以将所述标识信息携带在用于请求对所述访问请求对应的真实访问行为的日志记录请求中向服务器系统发送。在所述日志记录请求中还携带有所述真实访问行为的相关信息。由于所述真实访问行为与所述访问请求是相对应的,即所述真实访问行为是在所述访问请求下产生的,因此,所述真实访问行为的相关信息与所述访问请求的相关信息相同。For example, if the client wants to request to record the real access behavior generated under the access request, the client may carry the identification information in a log record request for requesting the real access behavior corresponding to the access request. Sent to the server system. The related information of the real access behavior is also carried in the log record request. Since the real access behavior corresponds to the access request, that is, the real access behavior is generated under the access request, and therefore, related information of the real access behavior and related information of the access request the same.

又如,若客户端要请求对并非在所述访问请求下产生的伪造访问行为进行记录,客户端可能将所述标识信息携带在用于请求对所述访问请求不对应的伪造访问行为的日志记录请求中向服务器系统发送。在所述日志记录请求中还携带有所述伪造访问行为的相关信息。由于所述伪造访问行为与所述访问请求是不对应的,即所述伪造访问行为并不是在所述访问请求下产生的,因此,所述伪造访问行为的相关信息与所述访问请求的相关信息并不相同。For another example, if the client wants to request to record the forged access behavior that is not generated under the access request, the client may carry the identifier information in a log for requesting a forged access behavior that does not correspond to the access request. The record request is sent to the server system. The related information of the forged access behavior is also carried in the log record request. The forged access behavior is not corresponding to the access request, that is, the forged access behavior is not generated under the access request, and therefore, the related information of the forged access behavior is related to the access request. The information is not the same.

再如,若客户端要请求对并非在所述访问请求下产生的伪造访问行为进行记录,客户端可能在用于请求对所述访问请求不对应的伪造访问行为的日志记录请求中不携带所述标识信息的情况下向服务器系统发送所述日志记录请求。因此,在服务器系统中接收到的日志记录请求中没有携带所述标识信息。For another example, if the client wants to request to record the forged access behavior that is not generated under the access request, the client may not carry the log request in the request for requesting the forged access behavior that does not correspond to the access request. The log record request is sent to the server system in the case of the identification information. Therefore, the identification information is not carried in the log record request received in the server system.

304、接收日志记录请求并获取访问行为的相关信息,所述日志记录请求用于请求对所述访问行为进行记录。304. Receive a log record request and obtain information about an access behavior, where the log record request is used to request to record the access behavior.

305、通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息。305. Generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information.

306、若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志。306. If the log record request satisfies the record condition, record the access behavior to the website access log according to the log record request.

307、若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志。307. If the log record request does not satisfy the record condition, refuse to record the access behavior to the website access log according to the log record request.

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

具体实现时,在接收到客户端发送的日志记录请求时,服务器系统可以判断所述日 志记录请求中是否携带有标识信息。若所述日志记录请求没有携带所述标识信息,则执行步骤307。若所述日志记录请求携带有标识信息,服务器系统可以判断标识信息中是否携带有第一指纹信息。若标识信息中携带有第一指纹信息,则执行步骤307。若标识信息中携带有第一指纹信息,服务器系统可以从日志记录请求中获取其请求记录的访问行为的一些相关信息并通过指纹算法将提取出的相关信息生成第二指纹信息,然后判断第一指纹信息与第二指纹信息是否相同,若相同则执行步骤306,若不相同则执行步骤307。In a specific implementation, when receiving the log record request sent by the client, the server system may determine whether the log record request carries the identifier information. If the log record request does not carry the identifier information, step 307 is performed. If the log record request carries the identifier information, the server system may determine whether the first fingerprint information is carried in the identifier information. If the first fingerprint information is carried in the identifier information, step 307 is performed. If the identifier information carries the first fingerprint information, the server system may obtain some related information about the access behavior of the request record from the log record request, and generate the second fingerprint information by using the fingerprint algorithm, and then determine the first Whether the fingerprint information and the second fingerprint information are the same. If they are the same, step 306 is performed. If not, step 307 is performed.

可以理解的是,若客户端发起的日志记录请求是用于请求对伪造访问行为进行记录,由于伪造访问行为并不是在服务器系统接收到过的访问请求下产生的真实访问行为,而为了达到刷网页访问流量的目的,伪造访问行为的相关信息需要与服务器系统接收到过的访问请求的相关信息存在区别,因此,基于相同的指纹算法,第一指纹信息与第二指纹信息是不相同的。可见,对于服务器系统接收到的日志记录请求来说,若判断出第一指纹信息与第二指纹信息不相同,则可以确定该日志记录请求所请求记录的访问行为是伪造的访问行为而并非真实发生过的访问行为,从而可以拒绝将该访问行为记录到网站访问日志。若客户端发起的日志记录请求是用于请求对在访问请求下产生的真实访问行为,则真实访问行为的相关信息与服务器接收到过的访问请求的相关信息是相同的,因此,基于相同的指纹算法,第一指纹信息与第二指纹信息是相同的。可见,对于服务器系统接收到的日志记录请求来说,若判断出第一指纹信息与第二指纹信息相同,则可以确定该日志记录请求所请求记录的访问行为是真实发生过的访问行为,从而可以将该访问行为记录到网站访问日志。It can be understood that if the client-initiated logging request is used to request the recording of the forged access behavior, since the forged access behavior is not the real access behavior generated under the access request received by the server system, in order to achieve the brush For the purpose of webpage access traffic, the information related to the forgery of the access behavior needs to be different from the information related to the access request received by the server system. Therefore, based on the same fingerprint algorithm, the first fingerprint information and the second fingerprint information are different. It can be seen that, for the log record request received by the server system, if it is determined that the first fingerprint information is different from the second fingerprint information, it may be determined that the access behavior requested by the log record request is a forged access behavior and is not true. The access behavior that has occurred so that the access behavior can be denied to the website access log. If the log request initiated by the client is used to request the real access behavior generated under the access request, the information about the real access behavior is the same as the information about the access request received by the server, and therefore, based on the same The fingerprint algorithm is the same as the first fingerprint information and the second fingerprint information. It can be seen that, for the log record request received by the server system, if it is determined that the first fingerprint information is the same as the second fingerprint information, it may be determined that the access behavior requested by the log record request is a real occurrence of the access behavior, thereby This access behavior can be logged to the website access log.

在本实施例中,所述访问请求的相关信息表示用于生成第一指纹信息的信息,所述访问行为的相关信息表示用于生成第二指纹信息的信息。由于访问请求的相关信息能够用于描述所述访问请求,访问行为的相关信息能够用于描述所述访问行为,因此,第一指纹信息能够起到标识所述访问请求的作用,第二指纹信息能够起到标识所述访问行为的作用。因此,第一指纹信息与第二指纹信息能够用于区分所述访问行为是否是在所述访问请求下产生的行为,从而实现针对日志记录请求的指纹校验。In this embodiment, the related information of the access request represents information for generating first fingerprint information, and the related information of the access behavior represents information for generating second fingerprint information. Since the related information of the access request can be used to describe the access request, related information of the access behavior can be used to describe the access behavior, and therefore, the first fingerprint information can function to identify the access request, and the second fingerprint information Can play the role of identifying the access behavior. Therefore, the first fingerprint information and the second fingerprint information can be used to distinguish whether the access behavior is an action generated under the access request, thereby implementing fingerprint verification for a log recording request.

在本实施例中,所述访问请求的多种不同的相关信息可以用于生成第一指纹信息,相应地,所述访问行为的多种不同的相关信息可以用于生成第二指纹信息。In this embodiment, the plurality of different related information of the access request may be used to generate first fingerprint information, and correspondingly, the plurality of different related information of the access behavior may be used to generate second fingerprint information.

例如,访问行为的伪造可以通过修改真实发生过的访问请求对应的用户IP地址来实现,伪造的访问行为与真实的访问请求往往具有不同的用户IP地址。因此,在本实施例 的一些实施方式中,所述访问请求对应的用户IP地址可以用于生成第一指纹信息,相应地,所述访问行为对应的用户IP地址可以用于生成第二指纹信息,也即,所述访问请求的相关信息可以包括访问请求对应的用户IP地址,相应地,所述访问行为的相关信息可以包括访问行为对应的用户IP地址。For example, the forgery of the access behavior can be implemented by modifying the user IP address corresponding to the actually generated access request, and the forged access behavior and the real access request often have different user IP addresses. Therefore, in some implementations of this embodiment, the user IP address corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the user IP address corresponding to the access behavior may be used to generate second fingerprint information. That is, the related information of the access request may include a user IP address corresponding to the access request, and correspondingly, the related information of the access behavior may include a user IP address corresponding to the access behavior.

又如,访问行为的伪造也可以通过修改真实发生过的访问请求对应的访问时间来实现,伪造的访问行为与真实的访问请求往往具有不同的访问时间。因此,在本实施例的另一些实施方式中,所述访问请求对应的访问时间可以用于生成第一指纹信息,相应地,所述访问行为对应的访问时间可以用于生成第二指纹信息,也即,所述访问请求的相关信息可以包括访问请求对应的访问时间,相应地,所述访问行为的相关信息可以包括访问行为对应的访问时间。For another example, the forgery of the access behavior can also be implemented by modifying the access time corresponding to the actual occurrence of the access request, and the forged access behavior often has a different access time than the real access request. Therefore, in other implementation manners of the embodiment, the access time corresponding to the access request may be used to generate the first fingerprint information, and correspondingly, the access time corresponding to the access behavior may be used to generate the second fingerprint information. That is, the related information of the access request may include an access time corresponding to the access request, and correspondingly, the related information of the access behavior may include an access time corresponding to the access behavior.

再如,在用户通过搜索关键词来访问网站时,访问行为的伪造也可以通过修改真实发生过的访问请求对应的搜索关键词来实现,伪造的访问行为与真实的访问请求往往具有不同的搜索关键词。因此,在本实施例的又一些实施方式中,所述访问请求对应的搜索关键词可以用于生成第一指纹信息,相应地,所述访问行为对应的搜索关键词可以用于生成第二指纹信息,也即,所述访问请求的相关信息可以包括访问请求对应的搜索关键词,相应地,所述访问行为的相关信息可以包括访问行为对应的搜索关键词。For another example, when a user accesses a website by searching for a keyword, the forgery of the access behavior can also be implemented by modifying the search keyword corresponding to the actually generated access request, and the forged access behavior often has a different search from the real access request. Key words. Therefore, in still another embodiment of the present embodiment, the search keyword corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the search keyword corresponding to the access behavior may be used to generate a second fingerprint. The information, that is, the related information of the access request may include a search keyword corresponding to the access request, and correspondingly, the related information of the access behavior may include a search keyword corresponding to the access behavior.

又再如,访问行为的伪造也可以通过修改真实发生过的访问请求对应的引用页referer和进入页entry来实现,伪造的访问行为与真实的访问请求往往具有不同的referer标识和不同的entry标识。因此,在本实施例的又一些实施方式中,所述访问请求对应的referer标识和entry标识可以用于生成第一指纹信息,相应地,所述访问行为对应的referer标识和entry标识可以用于生成第二指纹信息,也即,所述访问请求的相关信息可以包括访问请求对应的referer标识和entry标识,相应地,所述访问行为的相关信息可以包括访问行为对应的referer标识和entry标识。其中,referer也可以称为来源页,entry也可以称谓当前页。对于一个访问请求来说,用户是在访问referer时请求访问entry;对于一个访问行为来说,用户当前访问的网页是entry,用户在当前网页之前访问的网页是referer。此外,为了便于referer标识与entry标识用于生成指纹信息,referer标识可以是referer地址url的哈希值,entry标识可以是entry地址url的哈希值。具体地,所述访问请求对应的referer标识具体可以是所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体可以是所述访问请求对应的entry地址的哈希值,相应地,所述访问行为对应的referer标识具体可以是所述访问行为对应的referer地址的哈希值,所 述访问行为对应的entry标识具体可以是所述访问行为对应的entry地址的哈希值。For another example, the forgery of the access behavior can also be implemented by modifying the reference page referer and the entry page entry corresponding to the actual occurrence of the access request. The forged access behavior and the real access request often have different referer identifiers and different entry identifiers. . Therefore, in still another embodiment of the present embodiment, the referer identifier and the entry identifier corresponding to the access request may be used to generate first fingerprint information, and correspondingly, the referer identifier and the entry identifier corresponding to the access behavior may be used. The second fingerprint information is generated, that is, the related information of the access request may include a referer identifier and an entry identifier corresponding to the access request. Correspondingly, the related information of the access behavior may include a referer identifier and an entry identifier corresponding to the access behavior. Among them, the referer can also be called the source page, and the entry can also be called the current page. For an access request, the user requests access to the entry when accessing the referer; for an access behavior, the webpage currently accessed by the user is an entry, and the webpage accessed by the user before the current webpage is a referer. In addition, in order to facilitate the use of the referer identifier and the entry identifier for generating fingerprint information, the referer identifier may be a hash value of the referer address url, and the entry identifier may be a hash value of the entry address url. Specifically, the referer identifier corresponding to the access request may be a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request may be a hash value of the entry address corresponding to the access request. Correspondingly, the referer identifier corresponding to the access behavior may be a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior may specifically be a hash of the entry address corresponding to the access behavior. value.

可以理解的是,所述第一指纹信息和所述第二指纹信息可以由上述提及的任意一种或多种信息生成,也即,所述访问请求的相关信息和所述访问行为的相关信息可以包括上述提及的任意一种或多种信息。例如,所述第一指纹信息可以由所述访问请求对应的用户IP地址、访问时间、referer标识和entry标识生成,即所述访问请求的相关信息可以包括所述访问请求对应的用户IP地址、访问时间、referer标识和entry标识,相应地,所述第二指纹信息可以由所述访问行为对应的用户IP地址、访问时间、referer标识和entry标识生成,即所述访问行为的相关信息可以包括所述访问行为对应的用户IP地址、访问时间、referer标识和entry标识。进一步而言,在所述第一指纹信息包括所述访问请求的多种相关信息的情况下,所述访问请求的多种相关信息例如可以通过锚点符号等方式连接成一个字符串,该字符串即是所述第一指纹信息。例如,所述访问请求对应的用户IP地址、访问时间、referer地址的哈希值和entry地址的哈希值可以通过锚点符号等方式连接成所述第一指纹信息。相应地,在所述第二指纹信息包括所述访问行为的多种相关信息的情况下,所述访问行为的多种相关信息例如可以通过锚点符号等方式连接成一个字符串,该字符串即是所述第二指纹信息。例如,所述访问行为对应的用户IP地址、访问时间、referer地址的哈希值和entry地址的哈希值可以通过锚点符号等方式连接成所述第二指纹信息。It can be understood that the first fingerprint information and the second fingerprint information may be generated by any one or more kinds of information mentioned above, that is, related information of the access request and the access behavior are related. The information may include any one or more of the information mentioned above. For example, the first fingerprint information may be generated by the user IP address, the access time, the referer identifier, and the entry identifier corresponding to the access request, that is, the related information of the access request may include a user IP address corresponding to the access request, The access time, the referer identifier, and the entry identifier, and the second fingerprint information may be generated by the user IP address, the access time, the referer identifier, and the entry identifier corresponding to the access behavior, that is, the related information of the access behavior may include The user IP address, access time, referer identifier, and entry identifier corresponding to the access behavior. Further, in a case where the first fingerprint information includes a plurality of related information of the access request, the plurality of related information of the access request may be connected to a character string, for example, by an anchor symbol or the like. The string is the first fingerprint information. For example, the user IP address, the access time, the hash value of the referer address, and the hash value of the entry address corresponding to the access request may be connected to the first fingerprint information by means of an anchor symbol or the like. Correspondingly, in the case that the second fingerprint information includes a plurality of related information of the access behavior, the plurality of related information of the access behavior may be connected to a character string, for example, by an anchor symbol or the like. That is, the second fingerprint information. For example, the user IP address, the access time, the hash value of the referer address, and the hash value of the entry address corresponding to the access behavior may be connected to the second fingerprint information by means of an anchor symbol or the like.

在本实施例的一些实施方式中,在指纹校验的基础上,还可以进一步通过其他的校验方式对日志记录请求进行校验,以进一步识别日志记录请求所请求记录的访问行为是否真实发生过。In some embodiments of the present embodiment, on the basis of the fingerprint verification, the log record request may be further verified by other verification methods to further identify whether the access behavior requested by the log record request is actually generated. Over.

例如,服务器系统除了验证日志记录请求中是否携带有所述标识信息以及所述第一指纹信息与所述第二指纹信息是否相同之外,还可以验证所述访问行为对应的referer、entry是否与所述访问请求对应的referer、entry相同。具体地,所述标识信息除了携带有所述第一指纹信息之外,还可以携带有referer标识和entry标识。所述记录条件具体可以包括:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。在这种情况下,在上述记录条件完全被满足的情况下执行306,在上述记录条件没有被完全满足的情况下执行307。例如,若所述第一指纹信息与所述第二指纹信息不相同,即使所述访问请求对应的referer标识、entry标识与所述访问行为对应的referer标识、entry标识均相同, 也会执行307。又如,若所述访问请求对应的referer标识、entry标识与所述访问行为对应的referer标识、entry标识不相同,即使所述第一指纹信息与所述第二指纹信息相同,也会执行307。For example, the server system can verify whether the referer and the entry corresponding to the access behavior are related to whether the identifier information is carried in the log request and whether the first fingerprint information and the second fingerprint information are the same. The referer and entry corresponding to the access request are the same. Specifically, the identifier information may carry a referer identifier and an entry identifier in addition to the first fingerprint information. The recording condition may include: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry identifier corresponding to the access request identifies an entry identifier corresponding to the access behavior. In this case, 306 is performed 306 in the case where the above-described recording condition is completely satisfied, and 307 is performed in the case where the above-described recording condition is not completely satisfied. For example, if the first fingerprint information and the second fingerprint information are different, the referer identifier and the entry identifier corresponding to the access request are the same as the referer identifier and the entry identifier corresponding to the access behavior, and 307 is executed. . For example, if the referer identifier and the entry identifier corresponding to the access request are different from the referer identifier and the entry identifier corresponding to the access behavior, even if the first fingerprint information is the same as the second fingerprint information, 307 is performed. .

又如,服务器系统除了验证日志记录请求中是否携带有所述标识信息以及所述第一指纹信息与所述第二指纹信息是否相同之外,还可以要求客户端在访问请求发生之后一定的有效时间内发起日志记录请求,也即,服务器系统还可以验证所述访问请求对应的访问时间距离当前时间是否在有效时间阈值内。具体地,所述标识信息除了携带有所述第一指纹信息之外,还可以携带有所述访问请求对应的访问时间。所述记录条件具体可以包括:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。在这种情况下,在上述记录条件完全被满足的情况下执行306,在上述记录条件没有被完全满足的情况下执行307。例如,若所述第一指纹信息与所述第二指纹信息不相同,即使当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值,也会执行307。又如,若当前时间与所述访问请求对应的访问时间之间的时间差超过了有效时间阈值,即使所述第一指纹信息与所述第二指纹信息相同,也会执行307。For another example, the server system may require the client to be effective after the access request occurs, in addition to verifying whether the identifier information is carried in the log request and whether the first fingerprint information and the second fingerprint information are the same. The log request is initiated within the time, that is, the server system can also verify whether the access time corresponding to the access request is within the valid time threshold. Specifically, the identifier information may carry the access time corresponding to the access request in addition to the first fingerprint information. The recording condition may include: the log record request carrying the identifier information, the first fingerprint information being the same as the second fingerprint information, and an access time corresponding to the access request at a current time The time difference between them does not exceed the effective time threshold. In this case, 306 is performed 306 in the case where the above-described recording condition is completely satisfied, and 307 is performed in the case where the above-described recording condition is not completely satisfied. For example, if the first fingerprint information is different from the second fingerprint information, 307 is performed even if the time difference between the current time and the access time corresponding to the access request does not exceed the effective time threshold. For another example, if the time difference between the current time and the access time corresponding to the access request exceeds the effective time threshold, even if the first fingerprint information is the same as the second fingerprint information, 307 is performed.

在本实施例中,所述客户端可以是运行在用户终端上的浏览器,或者也可以是运行在用户终端上的网络应用的客户端程序。在客户端为浏览器的情况下,所述标识信息具体可以是通过JS代码的形式由服务器系统发送给客户端并指示客户端发送日志记录请求。具体地,在服务器系统中,所述标识信息中要携带的各种信息可以通过锚点符号等方式生成一个字符串,并用BASE64对标识信息进行编码,编码后生成的特征串可以记为SIGNATURE,该SIGNATURE即可以作为所述标识信息。SIGNATURE可以作为参数sig插入到BEACON模块的JS代码中。服务器系统可以将该JS代码发送给客户端。客户端在执行JS代码的过程中可以收集访问行为的相关信息并基于访问行为的相关信息向服务器系统发送携带有参数sig的日志记录请求。服务器系统可以在接收到日志记录请求之后,通过解析参数sig可以获得SIGNATURE,再用BASE64对SIGNATURE进行解码并使用锚点符号进行分解,可以得到所述标识信息中携带的各种信息。In this embodiment, the client may be a browser running on the user terminal, or may be a client program of a web application running on the user terminal. In the case that the client is a browser, the identification information may be specifically sent by the server system to the client in the form of a JS code and instructing the client to send a log record request. Specifically, in the server system, various information to be carried in the identification information may generate a character string by means of an anchor symbol, and encode the identification information by using BASE64, and the generated feature string may be recorded as SIGNATURE. The SIGNATURE can be used as the identification information. SIGNATURE can be inserted as a parameter sig into the JS code of the BEACON module. The server system can send the JS code to the client. The client may collect information about the access behavior during the execution of the JS code and send a log record request carrying the parameter sig to the server system based on the related information of the access behavior. After receiving the log record request, the server system can obtain the SIGNATURE by parsing the parameter sig, and then decode the SIGNATURE with the BASE64 and decompose it using the anchor symbol to obtain various information carried in the identifier information.

可以理解的是,本实施例提及的服务器系统具体可以包括用于处理用户访问的网络应用服务器(Web Server)和用于处理访问行为记录的日志服务器(Log Server)。其中,网络应用服务器用于处理客户端的访问请求,即网络应用服务器用于执行301、302和303。日志服务器用于处理客户端的日志记录请求,即日志服务器用于执行304、305、 306和307。It can be understood that the server system mentioned in this embodiment may specifically include a web application server (Web Server) for processing user access and a log server (Log Server) for processing access behavior records. The network application server is configured to process an access request of the client, that is, the network application server is used to execute 301, 302, and 303. The log server is used to process the client's logging request, ie the log server is used to execute 304, 305, 306, and 307.

在本实施例中,网站的服务器系统可以在记录访问行为的过程中增加访问请求的指纹校验。通过指纹校验的结果服务器系统可以确定请求记录的访问行为是否对应于服务器系统曾经接收到过的访问请求,从而能够准确地区分用户请求记录的访问行为是否真实发生过。具体地,网站的服务器系统在接收到客户端发送的访问请求的情况下,可以基于访问请求的相关信息生成第一指纹信息并返回给客户端。网站的服务器系统在接收到日志记录请求的情况下,可以基于访问行为的相关信息生成第二指纹信息并判断第二指纹信息是否与该日志记录请求中携带的第一指纹信息相同,从而确定是否按照该日志请求记录将该访问行为记录到网站访问日志。可以理解的是,若日志记录请求没有携带标识信息或者第二指纹信息与日志记录请求携带的第一指纹信息不相同,则网站的服务器系统没有接收到过该访问行为对应的访问请求,可见,该访问行为是没有真实发生过的,而是用户在实际上没有对网站信息进行访问的情况下伪造出来的。若日志记录请求携带有标识信息且第二指纹信息与日志记录请求携带的第一指纹信息相同,则网站的服务器系统接收到过该日志记录请求所请求记录的访问行为对应的访问请求,可见,该访问行为是真实发生过的。由此可见,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, the server system of the website may increase the fingerprint verification of the access request during the process of recording the access behavior. Through the result of the fingerprint verification, the server system can determine whether the access behavior of the request record corresponds to the access request that the server system has received, thereby being able to accurately distinguish whether the access behavior of the user request record has actually occurred. Specifically, if the server system of the website receives the access request sent by the client, the first fingerprint information may be generated and returned to the client based on the related information of the access request. The server system of the website, when receiving the log record request, may generate the second fingerprint information based on the related information of the access behavior and determine whether the second fingerprint information is the same as the first fingerprint information carried in the log record request, thereby determining whether The access behavior is logged to the website access log in accordance with the log request record. It can be understood that, if the log record request does not carry the identifier information or the second fingerprint information is different from the first fingerprint information carried by the log record request, the server system of the website does not receive the access request corresponding to the access behavior, and is visible. The access behavior was not actually happened, but the user falsified without actually accessing the website information. If the log record request carries the identification information and the second fingerprint information is the same as the first fingerprint information carried by the log record request, the server system of the website receives the access request corresponding to the access behavior requested by the log record request, and is visible. This access behavior has actually happened. It can be seen that the server of the website can accurately distinguish whether the access behavior of the user request record actually occurs when receiving the user's log record request, so that the user access behavior that has not actually occurred can be prevented from being recorded to the website access log.

参见图4,示出了本申请实施例中一种记录网站访问日志的方法的流程示意图。本实施例的方法可以应用于客户端。所述方法例如具体可以包括以下步骤:Referring to FIG. 4, a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown. The method of this embodiment can be applied to a client. The method may specifically include the following steps, for example:

401、向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;401. Send an access request to the server system, so that the server system acquires related information of the access request, and generates, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information.

402、接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;The receiving, by the server system, the identifier information, where the identifier information carries the first fingerprint information;

403、将所述标识信息携带在用于请求对访问行为进行记录的日志记录请求中向所述服务器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;403. The identifier information is sent to the server system in a log record request for requesting to record the access behavior, so that the server system generates the second fingerprint information by using a fingerprint algorithm to generate information about the access behavior. And logging the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, and rejecting the log record if the log record does not satisfy the record condition Requesting to record the access behavior to a website access log;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹 信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

可选的,Optional,

所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;

所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.

可选的,Optional,

所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;

所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.

可选的,Optional,

所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;

所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.

在本实施例中,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.

为了使得本领域技术人员更容易理解本申请实施例在实际场景中的实现方式,下面以一个场景为例进行介绍。在该场景中,网站的服务器系统包括网络应用服务器和日志服务器,网络应用服务器用于处理用户对网站的访问,日志服务器用于处理用户访问行为的记录。与服务器系统进行交互的客户端为用户终端上的浏览器。参见图5,示出了本申请实施例中一种记录网站访问日志的方法的流程示意图。所述方法例如具体可以包括以下步骤:In order to make it easier for a person skilled in the art to understand the implementation manner of the embodiment of the present application in an actual scenario, a scenario is taken as an example. In this scenario, the server system of the website includes a web application server and a log server, the web application server is used to process user access to the website, and the log server is used to process the record of user access behavior. The client that interacts with the server system is the browser on the user terminal. Referring to FIG. 5, a schematic flowchart of a method for recording a website access log in the embodiment of the present application is shown. The method may specifically include the following steps, for example:

501、用户浏览器向网络应用服务器发送访问请求。501. A user browser sends an access request to a web application server.

502、网络应用服务器获取所述访问请求对应的referer url和entry url,并通过hash算法分别对referer url和entry url进行计算,生成所述访问请求对应的referer url哈希值和entry url哈希值。502. The network application server obtains a referer url and an entry url corresponding to the access request, and calculates a referer url and an entry url respectively by using a hash algorithm, and generates a referer url hash value and an entry url hash value corresponding to the access request. .

503、获取所述访问请求对应的用户IP地址和访问时间,将所述访问请求对应的用户IP地址、访问时间、referer url哈希值和entry url哈希值连接成一个字符串。503. Acquire a user IP address and an access time corresponding to the access request, and connect the user IP address, the access time, the referer url hash value, and the entry url hash value corresponding to the access request into a character string.

其中,连接的方式例如可以是锚点符号。The manner of connection may be, for example, an anchor symbol.

504、网络应用服务器通过指纹算法,将503中生成的字符串生成第一指纹信息。504. The network application server generates a first fingerprint information by using a fingerprint algorithm to generate a character string generated in 503.

505、网络应用服务器将503中生成的字符串与第一指纹信息里连接成一个字符串,并用BASE64编码生成特征串SIGNATURE。505. The network application server connects the string generated in 503 with the first fingerprint information into a character string, and generates a feature string SIGNATURE by using BASE64 encoding.

其中,连接的方式例如可以是锚点符号。特征串SIGNATURE即是前述实施例提及的所述标识信息。The manner of connection may be, for example, an anchor symbol. The feature string SIGNATURE is the identification information mentioned in the foregoing embodiment.

506、网络应用服务器将SIGNATURE作为参数sig插入到BEACON模块的JS代码中发送给用户浏览器。506. The web application server inserts the SIGNATURE as a parameter sig into the JS code of the BEACON module and sends it to the user browser.

507、用户浏览器通过解析和执行JS代码,收集访问行为的相关信息并向日志服务器发送携带有SIGNATURE的日志记录请求。507. The user browser collects related information of the access behavior by parsing and executing the JS code, and sends a log record request carrying the SIGNATURE to the log server.

其中,所述日志记录请求中还携带有所述访问行为的相关信息。所述访问行为的相关信息可以包括所述访问行为对应的用户IP地址、访问时间、referer url和entry url。The log record request further carries related information about the access behavior. The information related to the access behavior may include a user IP address, an access time, a referer url, and an entry url corresponding to the access behavior.

508、日志服务器验证所述日志记录请求中携带的SIGNATURE。508. The log server verifies the SIGNATURE carried in the log record request.

其中,若日志记录请求中携带的SIGNATURE为空值或非法的BASE64字符串,则进入516。若日志记录请求中不存在SIGNATURE,则进入516。若日志记录请求中携带有SIGNATURE且SIGNATURE是合法的BASE64字符串,则进入509。If the SIGNATURE carried in the log request is null or an illegal BASE64 string, enter 516. If there is no SIGNATURE in the log request, go to 516. If the log request contains SIGNATURE and SIGNATURE is a legal BASE64 string, go to 509.

509、日志服务器对所述日志记录请求中携带的SIGNATURE进行BASE64解码,生成一个字符串,并将该字符串分解成所述第一指纹信息以及所述访问请求对应的用户 IP地址、访问时间、referer url哈希值和entry url哈希值。509. The log server performs BASE64 decoding on the SIGNATURE carried in the log record request, generates a character string, and decomposes the string into the first fingerprint information and a user IP address, an access time, and an access time corresponding to the access request. Referer url hash value and entry url hash value.

其中,分解的方式例如可以是锚点符号。The manner of decomposition may be, for example, an anchor symbol.

510、日志服务器验证当前时间与所述访问请求对应的访问时间之间的时间差是否超过有效时间阈值。510. The log server verifies whether the time difference between the current time and the access time corresponding to the access request exceeds a valid time threshold.

若该时间差超过有效时间阈值,则进入516。若该时间差未超过有效时间阈值,则进入511。If the time difference exceeds the effective time threshold, then 516 is entered. If the time difference does not exceed the effective time threshold, then 511 is entered.

511、日志服务器获取所述访问行为对应的referer url和entry url,并通过hash算法分别对referer url和entry url进行计算,生成所述访问行为对应的referer url哈希值和entry url哈希值。511. The log server obtains a referer url and an entry url corresponding to the access behavior, and calculates a referer url and an entry url respectively by using a hash algorithm, and generates a referer url hash value and an entry url hash value corresponding to the access behavior.

512、日志服务器验证所述访问请求对应的referer url哈希值与所述访问行为对应的referer url哈希值是否相同以及所述访问请求对应的entry url哈希值与所述访问行为对应的entry url哈希值是否相同。512. The log server verifies whether the referer url hash value corresponding to the access request is the same as the referer url hash value corresponding to the access behavior, and the entry url hash value corresponding to the access request and the entry corresponding to the access behavior. Whether the url hash value is the same.

若所述访问请求对应的referer url哈希值与所述访问行为对应的referer url哈希值相同且所述访问请求对应的entry url哈希值与所述访问行为对应的entry url哈希值相同,则进入513。若所述访问请求对应的referer url哈希值与所述访问行为对应的referer url哈希值不相同和/或所述访问请求对应的entry url哈希值与所述访问行为对应的entry url哈希值不相同,则进入516。If the referer url hash value corresponding to the access request is the same as the referer url hash value corresponding to the access behavior, and the entry url hash value corresponding to the access request is the same as the entry url hash value corresponding to the access behavior Then go to 513. If the referer url hash value corresponding to the access request is different from the referer url hash value corresponding to the access behavior, and/or the entry url hash value corresponding to the access request and the entry url corresponding to the access behavior If the Greek values are different, go to 516.

513、日志服务器将所述访问行为对应的用户IP地址、访问时间、referer url哈希值和entry url哈希值连接成一个字符串,并通过指纹算法将该字符串生成第二指纹信息。513. The log server concatenates the user IP address, the access time, the referer url hash value, and the entry url hash value corresponding to the access behavior into a character string, and generates a second fingerprint information by using a fingerprint algorithm.

514、日志服务器验证第一指纹信息与第二指纹信息是否相同。514. The log server verifies whether the first fingerprint information and the second fingerprint information are the same.

若第一指纹信息与第二指纹信息相同,进入515。若第一指纹信息与第二指纹信息不相同,进入516。If the first fingerprint information is the same as the second fingerprint information, go to 515. If the first fingerprint information is different from the second fingerprint information, go to 516.

515、日志服务器按照所述日志记录请求将所述访问行为记录到网站访问日志。515. The log server records the access behavior to a website access log according to the log record request.

516、日志服务器拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志。516. The log server refuses to record the access behavior to the website access log according to the log record request.

在本实施例中,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.

示例性设备Exemplary device

参见图6,示出了本申请实施例中一种记录网站访问日志的装置的结构示意图。本 实施例的装置可以配置于服务器系统,所述装置例如可以包括:Referring to FIG. 6, a schematic structural diagram of an apparatus for recording a website access log in the embodiment of the present application is shown. The device of this embodiment may be configured in a server system, and the device may include, for example:

第一接收单元601,用于接收客户端发送的访问请求;The first receiving unit 601 is configured to receive an access request sent by the client.

第一获取单元602,用于获取所述访问请求的相关信息;The first obtaining unit 602 is configured to acquire related information of the access request.

第一生成单元603,用于通过指纹算法,将所述访问请求的相关信息生成第一指纹信息;The first generating unit 603 is configured to generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information;

发送单元604,用于向所述客户端发送携带有所述第一指纹信息的标识信息;The sending unit 604 is configured to send, to the client, identifier information that carries the first fingerprint information.

第二接收单元605,用于接收日志记录请求,所述日志记录请求用于请求对访问行为进行记录;a second receiving unit 605, configured to receive a log record request, where the log record request is used to request to record an access behavior;

第二获取单元606,用于获取所述访问行为的相关信息;The second obtaining unit 606 is configured to acquire related information about the access behavior.

第二生成单元607,用于通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息;a second generating unit 607, configured to generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information;

记录单元608,用于若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志;The recording unit 608 is configured to record the access behavior to the website access log according to the log record request if the log record request satisfies the record condition;

拒绝单元609,用于若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;The rejecting unit 609 is configured to refuse to record the access behavior to the website access log according to the log record request if the log record request does not satisfy the record condition;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

可选的,Optional,

所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;

所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.

可选的,Optional,

所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;

所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.

可选的,Optional,

所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;

所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值, 所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.

在本实施例中,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.

参见图7,示出了本申请实施例中一种记录网站访问日志的装置的结构示意图。本实施例的装置可以配置于客户端,所述装置例如可以包括:Referring to FIG. 7, a schematic structural diagram of an apparatus for recording a website access log in an embodiment of the present application is shown. The device in this embodiment may be configured on a client, and the device may include, for example:

第一发送单元701,用于向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;a first sending unit 701, configured to send an access request to the server system, so that the server system acquires related information of the access request, and generates, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information;

接收单元702,用于接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;The receiving unit 702 is configured to receive the identifier information that is sent by the server system, where the identifier information carries the first fingerprint information.

第二发送单元703,用于将所述标识信息携带在用于请求对访问行为进行记录的日志记录请求中向所述服务器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;a second sending unit 703, configured to: send the identifier information to a server system for requesting to record an access behavior, so that the server system associates the access behavior by using a fingerprint algorithm The information generates second fingerprint information, and records the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, if the log record does not satisfy the record condition Refusing to record the access behavior to the website access log according to the log record request;

其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.

可选的,Optional,

所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request;

所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior.

可选的,Optional,

所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier;

所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior.

可选的,Optional,

所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request;

所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior.

可选的,Optional,

所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request;

所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold.

在本实施例中,网站的服务器在接收到用户的日志记录请求时能够准确地区分用户请求记录的访问行为是否真实发生过,从而就可以避免没有真实发生过的用户访问行为被记录到网站访问日志。In this embodiment, when the server of the website receives the log request of the user, it can accurately distinguish whether the access behavior requested by the user has actually occurred, thereby avoiding that the user access behavior that has not actually occurred is recorded to the website. Log.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存 在任何这种实际的关系或者顺序。术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that, in this context, relational terms such as first and second are used merely to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply such entities or operations. There is any such actual relationship or order between them. The terms "including", "comprising" or "comprising" or "comprising" are intended to include a non-exclusive inclusion, such that a process, method, article, or device that comprises a plurality of elements includes not only those elements but also other items not specifically listed Elements, or elements that are inherent to such a process, method, item, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.

对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的设备实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。For the device embodiment, since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment. The device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the embodiment. Those of ordinary skill in the art can understand and implement without any creative effort.

以上所述仅是本申请的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。The above description is only a specific embodiment of the present application, and it should be noted that those skilled in the art can also make several improvements and retouchings without departing from the principles of the present application. It should be considered as the scope of protection of this application.

Claims (20)

一种记录网站访问日志的系统,其特征在于,包括客户端和服务器系统;A system for recording website access logs, characterized by comprising a client and a server system; 所述服务器系统,用于接收所述客户端发送的访问请求并获取所述访问请求的相关信息,通过指纹算法将所述访问请求的相关信息生成第一指纹信息,向所述客户端发送携带有所述第一指纹信息的标识信息,接收用于请求对访问行为进行记录的日志记录请求并获取所述访问行为的相关信息,通过所述指纹算法将所述访问行为的相关信息生成第二指纹信息,若所述日志记录满足记录条件则按照所述日志记录请求将所述访问行为记录到网站访问日志,若所述日志记录不满足记录条件则拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;The server system is configured to receive an access request sent by the client, and obtain related information of the access request, generate a first fingerprint information by using a fingerprint algorithm, and send the first fingerprint information to the client. The identifier information of the first fingerprint information is received, and a log record request for requesting the record of the access behavior is received, and related information of the access behavior is obtained, and the information about the access behavior is generated by the fingerprint algorithm. Fingerprint information, if the log record satisfies the recording condition, the access behavior is recorded to the website access log according to the log record request, and if the log record does not satisfy the record condition, the access is refused according to the log record request Behavior recorded to the website access log; 所述客户端,用于向所述服务器系统发送访问请求并接收所述服务器系统针对所述访问请求返回的所述标识信息,将所述标识信息携带在所述日志访问请求中向所述服务器系统发送;The client is configured to send an access request to the server system, and receive the identifier information returned by the server system for the access request, and carry the identifier information in the log access request to the server. System sending 其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information. 根据权利要求1所述的记录网站访问日志的系统,其特征在于,A system for recording a website access log according to claim 1, wherein 所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request; 所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior. 根据权利要求2所述的记录网站访问日志的系统,其特征在于,A system for recording a website access log according to claim 2, wherein 所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier; 所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior. 根据权利要求3所述的记录网站访问日志的系统,其特征在于,A system for recording a website access log according to claim 3, characterized in that 所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request; 所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior. 根据权利要求1、3或4所述的记录网站访问日志的系统,其特征在于,A system for recording a website access log according to claim 1, 3 or 4, characterized in that 所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior. 根据权利要求1或2所述的记录网站访问日志的系统,其特征在于,A system for recording a website access log according to claim 1 or 2, characterized in that 所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold. 一种记录网站访问日志的方法,其特征在于,应用于服务器系统,包括:A method for recording a website access log, which is characterized by being applied to a server system, including: 接收客户端发送的访问请求并获取所述访问请求的相关信息;Receiving an access request sent by the client and acquiring related information of the access request; 通过指纹算法,将所述访问请求的相关信息生成第一指纹信息;Generating, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information; 向所述客户端发送携带有所述第一指纹信息的标识信息;Sending, to the client, identifier information carrying the first fingerprint information; 接收日志记录请求并获取访问行为的相关信息,所述日志记录请求用于请求对所述访问行为进行记录;Receiving a log record request and obtaining related information of an access behavior, the log record request being used to request to record the access behavior; 通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息;Generating, by the fingerprint algorithm, related information of the access behavior to generate second fingerprint information; 若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志;If the log record request satisfies the record condition, the access behavior is recorded to the website access log according to the log record request; 若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;If the log record request does not satisfy the record condition, refuse to record the access behavior to the website access log according to the log record request; 其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information. 根据权利要求7所述的方法,其特征在于,The method of claim 7 wherein: 所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request; 所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior. 根据权利要求8所述的方法,其特征在于,The method of claim 8 wherein: 所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier; 所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior. 根据权利要求9所述的方法,其特征在于,The method of claim 9 wherein: 所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request; 所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior. 根据权利要求7、9或10所述的方法,其特征在于,A method according to claim 7, 9 or 10, characterized in that 所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior. 根据权利要求7或8所述的方法,其特征在于,Method according to claim 7 or 8, characterized in that 所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold. 一种记录网站访问日志的方法,其特征在于,应用于客户端,包括:A method for recording a website access log, which is characterized by being applied to a client, including: 向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;Sending an access request to the server system, so that the server system acquires related information of the access request and generates first fingerprint information by using a fingerprint algorithm to generate related information of the access request; 接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;Receiving the identifier information sent by the server system, where the identifier information carries the first fingerprint information; 将所述标识信息携带在用于请求对访问行为进行记录的日志记录请求中向所述服务器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;Carrying the identifier information in a log record request for requesting to record the access behavior, and sending the second fingerprint information to the server system by using a fingerprint algorithm to generate the second fingerprint information by using a fingerprint algorithm. If the log record request satisfies the record condition, the access behavior is recorded to the website access log according to the log record request, and if the log record does not satisfy the record condition, the request to refuse according to the log record request is rejected. The access behavior is recorded to a website access log; 其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information. 根据权利要求13所述的方法,其特征在于,The method of claim 13 wherein: 所述访问请求的相关信息包括所述访问请求对应的用户IP地址和/或所述访问请求 对应的访问时间;The related information of the access request includes a user IP address corresponding to the access request and/or an access time corresponding to the access request; 所述访问行为的相关信息包括所述访问行为对应的用户IP地址和/或所述访问行为对应的访问时间。The related information of the access behavior includes a user IP address corresponding to the access behavior and/or an access time corresponding to the access behavior. 根据权利要求14所述的方法,其特征在于,The method of claim 14 wherein: 所述访问请求的相关信息还包括所述访问请求对应的引用页referer标识和进入页entry标识;The related information of the access request further includes a reference page referer identifier corresponding to the access request and an entry page entry identifier; 所述访问行为的相关信息还包括所述访问行为对应的referer标识和entry标识。The related information of the access behavior further includes a referer identifier and an entry identifier corresponding to the access behavior. 根据权利要求15所述的方法,其特征在于,The method of claim 15 wherein: 所述访问请求对应的referer标识具体为所述访问请求对应的referer地址的哈希值,所述访问请求对应的entry标识具体为所述访问请求对应的entry地址的哈希值;The referer identifier corresponding to the access request is specifically a hash value of the referer address corresponding to the access request, and the entry identifier corresponding to the access request is specifically a hash value of the entry address corresponding to the access request; 所述访问行为对应的referer标识具体为所述访问行为对应的referer地址的哈希值,所述访问行为对应的entry标识具体为所述访问行为对应的entry地址的哈希值。The referer identifier corresponding to the access behavior is specifically a hash value of the referer address corresponding to the access behavior, and the entry identifier corresponding to the access behavior is specifically a hash value of the entry address corresponding to the access behavior. 根据权利要求13、15或16所述的方法,其特征在于,A method according to claim 13, 15 or 16, wherein 所述标识信息还携带有所述访问请求对应的referer标识和entry标识;The identifier information further carries a referer identifier and an entry identifier corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,所述访问请求对应的referer标识与所述访问行为对应的referer标识相同,以及,所述访问请求对应的entry标识与所述访问行为对应的entry标识。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the referer identifier corresponding to the access request corresponds to the access behavior The referer identifier is the same, and the entry corresponding to the access request identifies an entry identifier corresponding to the access behavior. 根据权利要求13或14所述的方法,其特征在于,Method according to claim 13 or 14, characterized in that 所述标识信息还携带有所述访问请求对应的访问时间;The identifier information also carries an access time corresponding to the access request; 所述记录条件具体为:所述日志记录请求中携带有所述标识信息,所述第一指纹信息与所述第二指纹信息相同,以及,当前时间与所述访问请求对应的访问时间之间的时间差不超过有效时间阈值。The recording condition is specifically: the log record request carries the identifier information, the first fingerprint information is the same as the second fingerprint information, and the current time is between the access time corresponding to the access request The time difference does not exceed the effective time threshold. 一种记录网站访问日志的装置,其特征在于,配置于服务器系统,包括:An apparatus for recording a website access log, configured to be configured in a server system, including: 第一接收单元,用于接收客户端发送的访问请求;a first receiving unit, configured to receive an access request sent by the client; 第一获取单元,用于获取所述访问请求的相关信息;a first acquiring unit, configured to acquire related information of the access request; 第一生成单元,用于通过指纹算法,将所述访问请求的相关信息生成第一指纹信息;a first generating unit, configured to generate, by using a fingerprint algorithm, related information of the access request to generate first fingerprint information; 发送单元,用于向所述客户端发送携带有所述第一指纹信息的标识信息;a sending unit, configured to send, to the client, identifier information that carries the first fingerprint information; 第二接收单元,用于接收日志记录请求,所述日志记录请求用于请求对访问行为进行记录;a second receiving unit, configured to receive a log record request, where the log record request is used to request to record an access behavior; 第二获取单元,用于获取所述访问行为的相关信息;a second obtaining unit, configured to acquire related information about the access behavior; 第二生成单元,用于通过所述指纹算法,将所述访问行为的相关信息生成第二指纹信息;a second generating unit, configured to generate, by using the fingerprint algorithm, related information of the access behavior to generate second fingerprint information; 记录单元,用于若所述日志记录请求满足记录条件,按照所述日志记录请求将所述访问行为记录到网站访问日志;a recording unit, configured to record the access behavior to a website access log according to the log record request if the log record request satisfies a record condition; 拒绝单元,用于若所述日志记录请求不满足记录条件,拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;a rejecting unit, configured to refuse to record the access behavior to a website access log according to the log record request if the log record request does not satisfy the record condition; 其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information. 一种记录网站访问日志的装置,其特征在于,配置于客户端,包括:An apparatus for recording a website access log, which is configured on a client, and includes: 第一发送单元,用于向服务器系统发送访问请求,以便所述服务器系统获取所述访问请求的相关信息并通过指纹算法将所述访问请求的相关信息生成第一指纹信息;a first sending unit, configured to send an access request to the server system, so that the server system acquires related information of the access request and generates first fingerprint information by using a fingerprint algorithm to generate related information of the access request; 接收单元,用于接收所述服务器系统发送的标识信息,所述标识信息中携带有所述第一指纹信息;a receiving unit, configured to receive the identifier information sent by the server system, where the identifier information carries the first fingerprint information; 第二发送单元,用于将所述标识信息携带在用于请求对访问行为进行记录的日志记录请求中向所述服务器系统发送,以便所述服务器系统通过指纹算法将所述访问行为的相关信息生成第二指纹信息,在所述日志记录请求满足记录条件的情况下按照所述日志记录请求将所述访问行为记录到网站访问日志,在所述日志记录不满足所述记录条件的情况下拒绝按照所述日志记录请求将所述访问行为记录到网站访问日志;a second sending unit, configured to: send the identifier information to a server system for requesting to record an access behavior, so that the server system uses the fingerprint algorithm to perform information about the access behavior Generating second fingerprint information, recording the access behavior to the website access log according to the log record request if the log record request satisfies the record condition, and rejecting if the log record does not satisfy the record condition Recording the access behavior to a website access log according to the log record request; 其中,所述记录条件为:所述日志记录请求中携带有所述标识信息且所述第一指纹信息与所述第二指纹信息相同。The recording condition is that the log record request carries the identifier information and the first fingerprint information is the same as the second fingerprint information.
PCT/CN2018/077965 2017-03-15 2018-03-05 Method and device for recording website access log Ceased WO2018166365A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710153803.4A CN108632050B (en) 2017-03-15 2017-03-15 Method and device for recording website access log
CN201710153803.4 2017-03-15

Publications (1)

Publication Number Publication Date
WO2018166365A1 true WO2018166365A1 (en) 2018-09-20

Family

ID=63521879

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/077965 Ceased WO2018166365A1 (en) 2017-03-15 2018-03-05 Method and device for recording website access log

Country Status (3)

Country Link
CN (1) CN108632050B (en)
TW (1) TWI750252B (en)
WO (1) WO2018166365A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115391358A (en) * 2022-07-15 2022-11-25 北京沃东天骏信息技术有限公司 Array updating method and device, electronic equipment and computer readable medium
CN115858466A (en) * 2023-02-07 2023-03-28 广州市千钧网络科技有限公司 Operation log generation method, device, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468477A (en) * 2013-09-16 2015-03-25 杭州迪普科技有限公司 WebShell detection method and system
CN104765883A (en) * 2015-04-30 2015-07-08 中电运行(北京)信息技术有限公司 Detection method used for Webshell
CN105721427A (en) * 2016-01-14 2016-06-29 湖南大学 Method for mining attack frequent sequence mode from Web log

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214899B2 (en) * 2006-03-15 2012-07-03 Daniel Chien Identifying unauthorized access to a network resource
US8767737B2 (en) * 2011-11-30 2014-07-01 Industrial Technology Research Institute Data center network system and packet forwarding method thereof
CN103166917B (en) * 2011-12-12 2016-02-10 阿里巴巴集团控股有限公司 Network equipment personal identification method and system
CN103067470B (en) * 2012-12-21 2016-08-03 北京奇虎科技有限公司 A kind of method to browser pushed information, server and system
CN104462156B (en) * 2013-09-25 2018-12-28 阿里巴巴集团控股有限公司 A kind of feature extraction based on user behavior, personalized recommendation method and system
CN103699828A (en) * 2013-12-25 2014-04-02 柳州市欧博科技有限公司 Information security management method
CN105991511A (en) * 2015-01-27 2016-10-05 阿里巴巴集团控股有限公司 Method and device for detecting CC attack

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468477A (en) * 2013-09-16 2015-03-25 杭州迪普科技有限公司 WebShell detection method and system
CN104765883A (en) * 2015-04-30 2015-07-08 中电运行(北京)信息技术有限公司 Detection method used for Webshell
CN105721427A (en) * 2016-01-14 2016-06-29 湖南大学 Method for mining attack frequent sequence mode from Web log

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115391358A (en) * 2022-07-15 2022-11-25 北京沃东天骏信息技术有限公司 Array updating method and device, electronic equipment and computer readable medium
CN115858466A (en) * 2023-02-07 2023-03-28 广州市千钧网络科技有限公司 Operation log generation method, device, equipment and medium
CN115858466B (en) * 2023-02-07 2023-06-09 广州市千钧网络科技有限公司 Operation log generation method, device, equipment and medium

Also Published As

Publication number Publication date
TWI750252B (en) 2021-12-21
CN108632050A (en) 2018-10-09
CN108632050B (en) 2021-03-02
TW201835794A (en) 2018-10-01

Similar Documents

Publication Publication Date Title
US11005779B2 (en) Method of and server for detecting associated web resources
US11671448B2 (en) Phishing detection using uniform resource locators
TWI587672B (en) Login authentication method, client, server and system
US12021894B2 (en) Phishing detection based on modeling of web page content
CN103607385B (en) Method and apparatus for security detection based on browser
CN105472052B (en) Cross-domain server login method and system
CN105939326B (en) Method and device for processing message
CN111079104A (en) Authority control method, device, equipment and storage medium
WO2018188558A1 (en) Method and apparatus for identifying account permission
CN109194671B (en) A method and server for identifying abnormal access behavior
WO2015096528A1 (en) Method and device for detecting security of online shopping environment
CN107332804B (en) Method and device for detecting webpage bugs
US9021085B1 (en) Method and system for web filtering
CN108154029A (en) Intrusion detection method, electronic equipment and computer storage media
CN104580230B (en) Verification method and device are attacked in website
TWI646479B (en) Business authentication method, system and server
CN105635064B (en) CSRF attack detection method and device
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN116094808B (en) Access control vulnerability detection method and system based on RBAC mode Web application security
CN105184559A (en) System and method for payment
WO2017206605A1 (en) Method and device for preventing server from being attacked
CN111949363B (en) Business access management method, computer equipment, storage medium and system
WO2018166365A1 (en) Method and device for recording website access log
CN110955890A (en) Method and device for detecting malicious batch access behaviors and computer storage medium
CN106713114B (en) Verification information processing method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18767637

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18767637

Country of ref document: EP

Kind code of ref document: A1