CN111967059A - Website tamper-proofing method and system and computer readable storage medium - Google Patents
Website tamper-proofing method and system and computer readable storage medium Download PDFInfo
- Publication number
- CN111967059A CN111967059A CN202010800366.2A CN202010800366A CN111967059A CN 111967059 A CN111967059 A CN 111967059A CN 202010800366 A CN202010800366 A CN 202010800366A CN 111967059 A CN111967059 A CN 111967059A
- Authority
- CN
- China
- Prior art keywords
- file
- monitoring
- website
- client
- locking parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开了一种网站防篡改方法、系统及计算机可读存储介质,包括:获取配置文件、且根据所述配置文件生成监测目录;获取底层文件、且监控所述底层文件以实时监控网页状态;当底层文件发生变更时,确定所述底层文件是否满足所述监测目录,若是,则不响应操作。本发明通过实时监控网页信息当中底层文件的状态,当网页信息当中底层文件的状态、属性发生改变之前,根据监测目录当中的监测规则判断这一次改变动作时候为正常操作,从而达到防止网页被篡改的效果。
The present invention discloses a website anti-tampering method, system and computer-readable storage medium, including: obtaining a configuration file and generating a monitoring directory according to the configuration file; obtaining an underlying file and monitoring the underlying file to monitor the webpage status in real time; when the underlying file changes, determining whether the underlying file satisfies the monitoring directory, and if so, not responding to the operation. The present invention monitors the status of the underlying file in the webpage information in real time, and before the status and attributes of the underlying file in the webpage information change, the monitoring rules in the monitoring directory are used to determine whether the change action is a normal operation, thereby achieving the effect of preventing the webpage from being tampered with.
Description
技术领域technical field
本发明涉及网络安全领域,特别涉及一种网站防篡改方法、实施该防篡改方法的系统、以及计算机可读存储介质。The invention relates to the field of network security, in particular to a website tamper-proof method, a system for implementing the tamper-proof method, and a computer-readable storage medium.
背景技术Background technique
随着网络信息技术的快速发展和广泛使用,网络安全面临着极大的严峻考验,网站遭受到的各种安全攻击问题也越来越频繁,其中以网页篡改最为严重。网页篡改具有以下特点:篡改网站页面传播速度快、阅读人群多、复制容易、预先检查及实时防范难,据不完全统计,我国站点都受到过不同程度的网页篡改攻击,并且攻击手段繁多,所以网络安全防范日益成为大家关注的焦点。With the rapid development and wide use of network information technology, network security is facing a severe test, and various security attacks on websites are becoming more and more frequent, among which web page tampering is the most serious. Web page tampering has the following characteristics: tampered website pages spread quickly, read by a large number of people, easy to copy, difficult to check in advance and prevent in real time. According to incomplete statistics, websites in my country have been attacked by different degrees of web page tampering, and there are many attack methods, so Network security has increasingly become the focus of attention.
面对着网站被篡改的多方面安全挑战,早期网站站点是采用备份还原机制,但是这种被动式机制只能做安全备份还原,不能达到防护效果;后来采用网络时间驱动去处理篡改网站的问题,但是这种方法篡改检测效率低,不能快速地监测网站篡改行为,也不能大范围地防护连续性网站篡改行为。In the face of the multi-faceted security challenges of website tampering, the early website site adopted the backup and restoration mechanism, but this passive mechanism can only be used for safe backup and restoration, and cannot achieve the protection effect; However, this method has low tamper detection efficiency, cannot quickly monitor website tampering behavior, and cannot protect continuous website tampering behavior on a large scale.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于,针对上述问题,提供一种网站防篡改方法、实施该防篡改方法的系统、以及计算机可读存储介质。The purpose of the present invention is to, in view of the above problems, provide a website tamper-proof method, a system for implementing the tamper-proof method, and a computer-readable storage medium.
本发明为实现上述目的所采用的技术方案为:The technical scheme that the present invention adopts for realizing the above-mentioned purpose is:
一种网站防篡改方法,包括:A website tamper-proof method, comprising:
获取配置文件、且根据所述配置文件生成监测目录;Obtain a configuration file, and generate a monitoring directory according to the configuration file;
获取底层文件、且监控所述底层文件以实时监控网页状态;Obtain the underlying file, and monitor the underlying file to monitor the status of the web page in real time;
当底层文件发生变更时,确定所述底层文件是否满足所述监测目录,若是,则不响应操作。When the underlying file is changed, it is determined whether the underlying file satisfies the monitoring directory, and if so, the operation is not responded to.
作为优选,所述获取配置文件包括:Preferably, the obtaining configuration file includes:
用户在客户端上输入监测规则,以生成集成数据;Users enter monitoring rules on the client to generate integrated data;
接收客户端发送的集成数据,所述集成数据包括身份确认标签、辨别标签及目标文件,当所述目标文件生成时,则会对应捆绑生成所述辨别标签;Receive the integrated data sent by the client, where the integrated data includes an identity confirmation label, an identification label and a target file, and when the target file is generated, the identification label will be generated in a corresponding bundle;
以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数;Generate target inspection parameters with the first locking parameter agreed with the client and the identification label;
使用所述目标检验参数对目标文件进行验证,得到检验数据;Verifying the target file using the target inspection parameters to obtain inspection data;
当所述检验数据与所述身份确认标签相同时,确认所述目标文件为常规操作文件。When the verification data is the same as the identity confirmation label, the target file is confirmed as a normal operation file.
作为优选,当确认所述目标文件为常规操作文件后,所述方法还包括:Preferably, after confirming that the target file is a conventional operation file, the method further includes:
拆解所述目标文件中包含的监测规则成若干个监测条件文件;Disassemble the monitoring rules contained in the target file into several monitoring condition files;
若干所述监测条件文件以列表或平铺的方式与上一个所述配置文件比对;Several of the monitoring condition files are compared with the previous configuration file in a list or tiled manner;
若所述监测条件文件与上一个所述配置文件不相同,则覆盖和/或增添所述监测条件文件上的监测条件至上一个配置文件中,以形成新的配置文件。If the monitoring condition file is different from the previous configuration file, the monitoring conditions on the monitoring condition file are overwritten and/or added to the previous configuration file to form a new configuration file.
作为优选,所述若干所述监测条件文件以列表或平铺的方式与上一个所述配置文件比对包括:Preferably, the comparison of the several monitoring condition files with the previous configuration file in a list or tiled manner includes:
获取所述监测条件文件上的监测条件字符串,形成第一字符单元;Obtain the monitoring condition string on the monitoring condition file to form the first character unit;
获取上一个所述配置文件的对应监测条件的监测条件字符串,形成第二字符单元;Obtain the monitoring condition string corresponding to the monitoring condition of the previous configuration file to form a second character unit;
比对所述第一字符单元和所述第二字符单元是否相同;Compare whether the first character unit and the second character unit are the same;
当所述第一字符单元和所述第二字符单元不同时,删除所述第二字符单元,且将所述第一字符单元补入被删除的所述第二字符单元的位置。When the first character unit and the second character unit are different, the second character unit is deleted, and the first character unit is added to the position of the deleted second character unit.
作为优选,所述以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数的步骤前,还包括:Preferably, before the step of generating the target inspection parameter with the first locking parameter agreed with the client and the identification label, the step further includes:
判断本地缓存中是否含有所述辨别标签;Determine whether the identification tag is contained in the local cache;
当本地缓存当中没有所述辨别标签,将所述辨别标签存入所述本地缓存当中,并执行以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数的步骤。When there is no identification tag in the local cache, the identification tag is stored in the local cache, and the step of generating target inspection parameters with the first locking parameter agreed with the client and the identification tag is performed.
作为优选,所述接收客户端发送的集成数据之前,还包括:Preferably, before receiving the integration data sent by the client, the method further includes:
接收所述客户端发送的第二锁定参数,并根据所述第二锁定参数生成第三锁定参数;receiving the second locking parameter sent by the client, and generating a third locking parameter according to the second locking parameter;
发送所述第三锁定参数至所述客户端;sending the third locking parameter to the client;
根据所述第二锁定参数和所述第三锁定参数,生成所述第一锁定参数;generating the first locking parameter according to the second locking parameter and the third locking parameter;
保存所述第一锁定参数。The first locking parameter is saved.
作为优选,所述获取底层文件包括:Preferably, the acquiring the underlying file includes:
采用单项散列单元扫描网页信息的该底层文件的属性。Attributes of the underlying file of web page information are scanned using a single-item hash unit.
作为优选,其中还包括:Preferably, it also includes:
获取非法操作行为并生成记录文件,用户可以在客户端上查看所述记录文件,以核查网页被篡改的次数;Obtain illegal operations and generate record files, users can view the record files on the client to check the number of times the webpage has been tampered with;
所述记录文件用于记录以下一个或多个内容:The record file is used to record one or more of the following:
篡改的操作类型、文件、进程、时间。Tampered operation type, file, process, time.
一种网站防篡改系统,所述装置包括:A website tamper-proof system, the device includes:
管理模块,用于获取配置文件、且根据所述配置文件生成监测目录;a management module, configured to obtain a configuration file and generate a monitoring directory according to the configuration file;
监控模块,获取底层文件、且监控所述底层文件以实时监控网页状态。The monitoring module obtains the underlying file and monitors the underlying file to monitor the status of the webpage in real time.
一种计算机可读存储介质,其存储有计算机程序,该程序被处理器执行时实现上述方法的步骤。A computer-readable storage medium storing a computer program, the program implementing the steps of the above method when executed by a processor.
本发明的有益效果为:本发明通过实时监控网页信息当中底层文件的状态,当网页信息当中底层文件的状态、属性发生改变之前,根据监测目录当中的监测规则判断这一次改变动作时候为正常操作,从而达到防止网页被篡改的效果。The beneficial effects of the present invention are as follows: the present invention monitors the state of the underlying files in the web page information in real time, and before the state and attributes of the underlying files in the web page information change, it is judged that this change is normal operation according to the monitoring rules in the monitoring directory. , so as to prevent the web page from being tampered with.
下面结合附图与实施例,对本发明进一步说明。The present invention will be further described below with reference to the accompanying drawings and embodiments.
附图说明Description of drawings
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following briefly introduces the drawings required in the embodiments or the prior art. Obviously, the drawings in the following description are only For some embodiments of the present invention, for those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.
图1是本发明中防篡改方法的流程图;Fig. 1 is the flow chart of the anti-tampering method in the present invention;
图2是本发明中底层文件与网站保护目录的比对流程图;Fig. 2 is the comparison flow chart of bottom file and website protection catalog in the present invention;
图3是本发明中底层文件与文件格式保护目录的比对流程图;Fig. 3 is the comparison flow chart of bottom layer file and file format protection directory in the present invention;
图4是本发明中底层文件与身份保护目录的比对流程图;Fig. 4 is the comparison flow chart of bottom file and identity protection directory in the present invention;
图5是本发明中客户端与WEB服务器的传输流程图;Fig. 5 is the transmission flow chart of client and WEB server in the present invention;
图6是本发明中配置文件的形成流程图A;Fig. 6 is the formation flow chart A of configuration file in the present invention;
图7是本发明中配置文件的比对流程图。FIG. 7 is a flow chart of the comparison of configuration files in the present invention.
具体实施方式Detailed ways
为使本发明的上述目的、特征和优点能够更加明显易懂,下面结合附图对本发明的具体实施方式做详细的说明。在下面的描述中阐述了很多具体细节以便于充分理解本发明。但是本发明能够以很多不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本发明内涵的情况下做类似改进,因此本发明不受下面公开的具体实施例的限制。In order to make the above objects, features and advantages of the present invention more clearly understood, the specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways different from those described herein, and those skilled in the art can make similar improvements without departing from the connotation of the present invention. Therefore, the present invention is not limited by the specific embodiments disclosed below.
在本发明的描述中,需要理解的是,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In the description of the present invention, it should be understood that the terms "first" and "second" are only used for description purposes, and cannot be interpreted as indicating or implying relative importance or the number of indicated technical features. Thus, a feature delimited with "first", "second" may expressly or implicitly include at least one of that feature. In the description of the present invention, "plurality" means at least two, such as two, three, etc., unless otherwise expressly and specifically defined.
在本实施例中,包括:WEB服务器以及备份服务器,WEB服务器主要是对外发布网页信息,提供WEB服务;本实施例中的网站防篡改方法主要实现在该WEB服务器上,主要根据监测目录中的监测条件实施监控网页状态,并在网页状态发生变更、改变时,将该网页恢复为变更之前的网页状态。具体为,将监控的核心成型安装到WEB服务器当中,并基于时间触发方式进行自动监控,对被监控网页所在文件夹的所有文件内容(其中包含:html、asp、flash、png、bmp、gif、jpeg、php、jsp)对照着上述文件的多个属性,经过内置散列快速算法,实时扫描被监控网页所在文件夹内各文件的属性,从而实现实时监控。如果发现属性变更通过非协议方式,将通过安全拷贝方式将备份路径文件夹内容拷贝到被监控网页所在文件夹相应的位置。由于是通过底层文件驱动技术,其运行的性能以及监测实时性都能达到最高水准。In this embodiment, it includes: a WEB server and a backup server. The WEB server mainly publishes web page information and provides WEB services; the website tamper-proof method in this embodiment is mainly implemented on the WEB server, and is mainly based on the information in the monitoring directory. The monitoring condition implements monitoring the state of the web page, and when the state of the web page changes or changes, the web page is restored to the state of the web page before the change. Specifically, the core of monitoring is installed into the WEB server, and automatic monitoring is performed based on the time-triggered method, and all file contents in the folder where the monitored webpage is located (including: html, asp, flash, png, bmp, gif, jpeg, php, jsp) compares the multiple attributes of the above files, and scans the attributes of each file in the folder where the monitored webpage is located in real time through the built-in fast hashing algorithm, so as to realize real-time monitoring. If it is found that the attribute change is through a non-protocol method, the content of the backup path folder will be copied to the corresponding location of the folder where the monitored web page is located through a secure copy method. Because it is driven by the underlying file technology, its running performance and monitoring real-time performance can reach the highest level.
而备份服务器,主要备份文件及其文件的属性。备份服务器解析网站信息当中的信息单元,确定信息单元中实现单向传输控制的信号变更坐标;当进行单向传输控制时,将信息单元中的信号变更坐标变为异常信号;然后将修改后的信息单元发送到WEB服务器当中。其中,通过解析网站信息的信息单元,将信息单元中的实现单向传输控制的信号变更坐标修改为异常信号,当WEB服务器识别到异常信号时,对该信息单元丢弃不处理,即可实现单向传输控制,可以解决备份服务器传输备份文件的安全性控制。The backup server mainly backs up files and their attributes. The backup server parses the information unit in the website information, and determines the signal change coordinates in the information unit to realize one-way transmission control; when the one-way transmission control is performed, the signal change coordinates in the information unit are changed into abnormal signals; then the modified coordinates are changed. The information unit is sent to the WEB server. Among them, by parsing the information unit of the website information, the change coordinate of the signal that realizes one-way transmission control in the information unit is modified into an abnormal signal. When the WEB server recognizes the abnormal signal, it discards the information unit and does not process it, so that the single-direction transmission control can be realized. To transfer control, the security control of transferring backup files to the backup server can be solved.
进一步地,rdp代理程序充当着中间层角色,由它负责接收rdp客户端发送的I/O请求,该代理服务内置协议解析模块主要负责解析与磁盘映射和剪贴板有密切关系的信息单元,代理服务内置协议设置在备份服务器当中,当备份服务器解析完成后,并且当WEB服务器监测到有非法操作,备份服务器在信息单元中插入异常信号,形成修改后的信息单元,并将修改后的信息单元请求转发到WEB服务器当中,WEB服务器接收到该信息单元请求后,rdp代理程序接收到WEB服务器对修改后的信息单元的丢弃不处理的响应后,再转发到在WEB服务器当中的客户端,从而实现单向传输控制。其中,rdp代理程序安装在WEB服务器当中,而信息单元包含着网站信息的备份文件。通过解析信息单元,在信息单元当中插入异常信号,当WEB服务器接收或识别到异常信号,当中的rdp代理程序对信息单元不处理,即实现单向传输控制。Further, the rdp agent program acts as a middle-layer role, which is responsible for receiving I/O requests sent by the rdp client. The built-in protocol parsing module of the agent service is mainly responsible for parsing information units closely related to disk mapping and clipboard. The built-in protocol of the service is set in the backup server. After the analysis of the backup server is completed, and when the WEB server detects an illegal operation, the backup server inserts an abnormal signal into the information unit to form a modified information unit. The request is forwarded to the WEB server. After the WEB server receives the information unit request, the rdp agent program receives the WEB server's response that the modified information unit is discarded and not processed, and then forwards it to the client in the WEB server. Realize one-way transmission control. Among them, the rdp agent program is installed in the WEB server, and the information unit contains the backup file of the website information. By parsing the information unit, an abnormal signal is inserted into the information unit. When the WEB server receives or recognizes the abnormal signal, the rdp agent program does not process the information unit, that is, one-way transmission control is realized.
如图1所示,在一种可选实施例中的网站防篡改方法,具体包括以下步骤:As shown in FIG. 1 , a method for preventing tampering of a website in an optional embodiment specifically includes the following steps:
步骤101,获取配置文件、且根据所述配置文件生成监测目录;
在本申请实施例当中,配置文件是响应客户在客户端上的需求而产生的文件,而配置文件当中一般包含:网站保护目录、身份保护目录、文件格式保护目录、及排除保护目录;用户可以打开客户端,然后选择点击添加网站,在添加网站栏上输入需要保护的网站字符,然后依次输入在该需要保护的网站中需要保护的身份信息、文件格式以及不需要保护的排除保护内容;输入完成后,点击防篡改开关按钮,开启对该保护网站的防篡改保护。In the embodiment of the present application, the configuration file is a file generated in response to a client's requirement on the client, and the configuration file generally includes: a website protection directory, an identity protection directory, a file format protection directory, and an exclusion protection directory; the user can Open the client, then select and click Add Website, enter the characters of the website to be protected in the Add Website column, and then enter the identity information to be protected in the website to be protected, the file format and the excluded protection content that does not need to be protected in turn; enter When done, click the tamper-proof switch button to turn on tamper-proof protection for the protected website.
进一步地,身份保护目录,主要添加例如ftp、mysql、www等用户,用户将需要保护的用户ID填入需要保护用户ID栏即可。Further, in the identity protection directory, mainly add users such as ftp, mysql, www, etc., and the user can fill in the user ID to be protected in the column of the user ID to be protected.
文件格式保护目录,主要添加需要保护的文件类型,例如html、asp、flash、png、bmp、gif、jpeg、php、jsp等类型的文件。The file format protection directory mainly adds the file types that need to be protected, such as html, asp, flash, png, bmp, gif, jpeg, php, jsp and other types of files.
排除保护目录,主要添加需要保护网站下的不需要保护的内容,例如网站信息中的评论功能、留言功能等,设置排出保护目录可以本防篡改系统的可控扩展性,能针对性地对网站需要保护的部分进行保护。Excluding the protection directory, mainly adding content that needs to be protected under the website that does not need to be protected, such as the comment function, message function, etc. in the website information, setting the exclusion protection directory can control the scalability of the anti-tampering system, and can target the website. Protect the parts that need to be protected.
步骤102,获取底层文件、且监控所述底层文件以实时监控网页状态;
其中,采用单项散列单元扫描网页信息的该底层文件的属性,而单项散列单元实时扫描被监控网页所在文件夹内各文件的属性,从而实现实时监控。另外,单项散列单元即为单项散列算法。Wherein, a single-item hash unit is used to scan the attributes of the underlying file of the web page information, and the single-item hash unit scans the attributes of each file in the folder where the monitored web page is located in real time, thereby realizing real-time monitoring. In addition, a single-item hash unit is a single-item hash algorithm.
当有网页请求时,并且在网页请求当中带有非法操作,该非法操作改变了网页文件的属性,此时单向散列单元能快速地扫描并监测到文件属性发生变化。When there is a web page request and there is an illegal operation in the web page request, the illegal operation changes the attributes of the web page file, and the one-way hash unit can quickly scan and monitor the change of the file attributes.
而其中,非法操作包含:创建文件夹、删除文件夹、重命名、删除文件、写文件、创建文件等行为。Among them, illegal operations include: creating a folder, deleting a folder, renaming, deleting a file, writing a file, creating a file, etc.
步骤103,当底层文件发生变更时,确定所述底层文件是否满足所述监测目录,若是,则不响应操作。
如图2所示,步骤103a0,当底层文件发生变更(即底层文件属性发生变化),则底层文件与监测目录中的网站保护目录进行比较;As shown in Figure 2, in step 103a0, when the underlying file changes (that is, the underlying file attribute changes), the underlying file is compared with the website protection directory in the monitoring directory;
步骤103a1,按顺序获取变更的底层文件中的网站字符串;Step 103a1, obtaining the website strings in the changed underlying files in sequence;
步骤103a2,将网站字符串的第一个字符在监测目录中的网站保护目录中搜索,并获取第一检索网站目录;若没有获取第一检索网站目录,则为正常操作,可以继续进行操作。Step 103a2: Search the website protection directory in the monitoring directory for the first character of the website string, and obtain the first retrieval website directory; if the first retrieval website directory is not obtained, it is a normal operation and the operation can continue.
步骤103a3,获取步骤103a1中的网站字符串的第二个字符,并在步骤103a2中的第一检索网站目录进行检索,获得第二检索网站目录;若没有获取第二检索网站目录,则为正常操作,可以继续进行操作。In step 103a3, the second character of the website string in step 103a1 is obtained, and the first retrieval website directory in step 103a2 is retrieved to obtain the second retrieval website directory; if the second retrieval website directory is not obtained, it is normal operation, you can continue the operation.
以此类推,便可得出发生变更的底层文件所属的网站是否在监测目录当中。如果当发生变更的底层文件属于监测目录当中的其中一个网站,则进行下一步骤,下一步骤具体为步骤103b0、103c0。By analogy, it can be concluded whether the website to which the underlying file that has changed belongs is in the monitoring directory. If the changed underlying file belongs to one of the websites in the monitoring directory, the next step is performed, and the next step is specifically steps 103b0 and 103c0.
如图3所示,步骤103b0,通过单项散列算法扫描得出底层文件变更的文件格式;As shown in Figure 3, in step 103b0, the file format of the underlying file change is obtained by scanning the single-item hash algorithm;
步骤103b1,将获取到的发生变更的文件格式与监测目录中的文件格式保护目录进行比较;Step 103b1, comparing the acquired changed file format with the file format protection directory in the monitoring directory;
步骤103b2,若不同,则此变更为正常操作,若为相同,则为非法操作。Step 103b2, if they are different, the change is a normal operation, and if they are the same, it is an illegal operation.
如图4所示,步骤103c0,通过单项散列算法扫描得出底层文件变更的用户身份ID;As shown in Figure 4, in step 103c0, the user identity ID of the underlying file change is obtained by scanning through a single-item hash algorithm;
步骤103c1,将获取到的发生变更的用户身份ID与监测目录中的身份保护目录进行比较;Step 103c1, compare the obtained changed user identity ID with the identity protection directory in the monitoring directory;
步骤103c2,若不同,则此变更为正常操作,若为相同,则为非法操作。Step 103c2, if they are different, the change is a normal operation, and if they are the same, it is an illegal operation.
在一种可选实施例中的网站防篡改方法,所述获取配置文件包括:In a website tamper-proof method in an optional embodiment, the obtaining a configuration file includes:
如图5所示,步骤1010,用户在客户端上输入监测规则,以生成集成数据;As shown in Figure 5, in
具体地,用户在客户端面板上对应各个监测条件输入栏输入网站保护目录、身份保护目录、文件格式保护目录等。Specifically, the user inputs a website protection directory, an identity protection directory, a file format protection directory, etc. on the client panel corresponding to each monitoring condition input field.
步骤1011,接收客户端发送的集成数据,所述集成数据包括身份确认标签、辨别标签及目标文件,当所述目标文件生成时,则会对应捆绑生成所述辨别标签;其中,目标文件可以是任何类型、格式的文件数据,在本实施例当中,目标文件是带有监测条件的数据文件。此外,当用户在客户端面板上输入监测目录完成后,点击确定按钮同时,则会生成辨别标签。而该辨别标签可以使随机生成的数字和/或英文字母组合,并且生成的组合可以是四位数,也可以是五位数,又或者是多位数,通过该捆绑生成的辨别标签,能够进一步增强数据传递的安全性。
步骤1012,以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数;在本实施例中,客户端与WEB服务器约定的第一锁定参数可以是两者预先设定的固定参数。此外,客户端可以与WEB服务器设定一次第一锁定参数,在客户端上点击设定参数按钮,并在弹出的输入框中输入即可,通过设定在以后数据传输时都可以利用这次设定的第一锁定参数与客户端生成的辨别标签而生成身份确认标签。另外,用户也可以在每一次输入监测规则前设定第一锁定参数,通过这样设置可以降低因长期使用一个固定的第一锁定参数而导致监测目录被劫持的风险,提高客户端与WEB服务器之间的安全性。Step 1012: Generate target inspection parameters with the first locking parameter agreed with the client and the identification label; in this embodiment, the first locking parameter agreed between the client and the WEB server may be a fixed preset by the two. parameter. In addition, the client can set the first locking parameter with the WEB server once, click the set parameter button on the client, and input it in the pop-up input box. By setting this time, it can be used in future data transmission. The set first locking parameter and the identification tag generated by the client generate an identity confirmation tag. In addition, the user can also set the first lock parameter before each input of the monitoring rule. By setting this way, the risk of the monitoring directory being hijacked due to the long-term use of a fixed first lock parameter can be reduced, and the relationship between the client and the WEB server can be improved. security in between.
具体地,第一锁定参数可以是由数字、符号、以及英文组成的字符串,其中,第一锁定参数一定要包含至少一个数字、至少一个符号、至少一个英文大写字母、及至少一个英文小写字母,上述数字、符号、英文大小写字母顺序可以随意。Specifically, the first locking parameter may be a character string composed of numbers, symbols, and English, wherein the first locking parameter must contain at least one number, at least one symbol, at least one English uppercase letter, and at least one English lowercase letter , the above numbers, symbols, and uppercase and lowercase letters can be in any order.
步骤1013,使用所述目标检验参数对目标文件进行验证,得到检验数据;具体地,当WEB服务器接收到目标文件的同时,通过目标检验参数(也就是算法)对目标文件进行验证,得到检验数据。
步骤1014,当所述检验数据与所述身份确认标签相同时,确认所述目标文件为常规操作文件。具体地,WEB服务器得到检验数据与之前收到的集成数据中的身份确认标签进行比对,当两者一样时,则可以表明辨别标签及目标文件在传输过程当中并没有被劫持篡改,所以可以确认目标文件为常规操作文件。
在一种可选实施例中的网站防篡改方法,当确认所述目标文件为常规操作文件后,所述方法还包括:In a website tamper-proof method in an optional embodiment, after confirming that the target file is a regular operation file, the method further includes:
如图6、图7所示,步骤1015,拆解所述目标文件中包含的监测规则成若干个监测条件文件;具体地,将目标文件中包含的若干个监测条件文件拆解分开,目的是为了将各个监测条件分开,使各个监测条件按保护目录的不同分类好,这样就不会出现串码或串目录的情况。As shown in Figure 6 and Figure 7,
步骤1016,若干所述监测条件文件以列表或平铺的方式与上一个所述配置文件比对;
若所述监测条件文件与上一个所述配置文件不相同,则覆盖和/或增添所述监测条件文件上的监测条件至上一个配置文件中,以形成新的配置文件。If the monitoring condition file is different from the previous configuration file, the monitoring conditions on the monitoring condition file are overwritten and/or added to the previous configuration file to form a new configuration file.
在一种可选实施例中的网站防篡改方法,所述若干所述监测条件文件以列表或平铺的方式与上一个所述配置文件比对包括:In a website tamper-proof method in an optional embodiment, the comparison of the several monitoring condition files with the previous configuration file in a list or tile manner includes:
如图6、图7所示,步骤1016a,获取所述监测条件文件上的监测条件字符串,形成第一字符单元;具体地,若是网站保护目录的监测条件文件,则第一字符单元则是一串网站字符;若是身份保护目录的监测条件文件,则第一字符单元则是身份ID字符;若是文件格式保护目录的监测条件文件,则第一字符单元则是文件格式字符。As shown in Figure 6 and Figure 7, in
步骤1016b,获取上一个所述配置文件的对应监测条件的监测条件字符串,形成第二字符单元;具体地,此处获取的第二字符单元,是上一个配置文件中监测条件的监测条件字符串,通过获取第二字符单元,从而获取上一个配置文件中的监测条件内容,并与步骤1016b中的第一字符单元作比对。
步骤1016c,比对所述第一字符单元和所述第二字符单元是否相同;
当所述第一字符单元和所述第二字符单元不同时,删除所述第二字符单元,且将所述第一字符单元补入被删除的所述第二字符单元的位置。具体地,当比对时,第二字符单元不同于第一字符单元时,第二字符单元被擦拭或删除,然后将第一字符单元填充入第二字符单元的位置,从而完成配置新的监测条件。When the first character unit and the second character unit are different, the second character unit is deleted, and the first character unit is added to the position of the deleted second character unit. Specifically, when comparing, when the second character unit is different from the first character unit, the second character unit is wiped or deleted, and then the first character unit is filled into the position of the second character unit, thereby completing the configuration of new monitoring condition.
在一种可选实施例中的网站防篡改方法,所述以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数的步骤前,还包括:In an optional embodiment of the method for preventing tampering of a website, before the step of generating the target verification parameter with the first locking parameter agreed with the client and the identification label, the method further includes:
判断本地缓存中是否含有所述辨别标签;Determine whether the identification tag is contained in the local cache;
当本地缓存当中没有所述辨别标签,将所述辨别标签存入所述本地缓存当中,并执行以与客户端约定的第一锁定参数与所述辨别标签,生成目标检验参数的步骤。具体地,WEB服务器可以根据辨别标签确认在本地缓存当中是否存在辨别标签从而确定客户端的集成数据是不是重放攻击。当WEB服务器接收到集成数据时,而集成数据当中包含有辨别标签,WEB服务器从集成数据当中解析出辨别标签,WEB服务器开始在本地缓存当中搜索是否存在与该辨别标签相同的标签。如果WEB服务器当中没有找到辨别标签,可以说明来自客户端的数据请求为正常请求。与此同时,如果WEB服务器当中没有辨别标签,则将辨别标签存放入WEB的临时文件夹当中,并设定删除时间,当每经过一段删除时间后,WEB服务器便将临时文件夹中的文件清空;通过设置临时文件夹保存辨别标签的设置,从而在删除时间当中可以确认有无受到重放攻击,还不会占用缓存。When there is no identification tag in the local cache, the identification tag is stored in the local cache, and the step of generating target inspection parameters with the first locking parameter agreed with the client and the identification tag is performed. Specifically, the WEB server can confirm whether the identification tag exists in the local cache according to the identification tag, so as to determine whether the integrated data of the client is a replay attack. When the WEB server receives the integrated data, and the integrated data contains the identification tag, the WEB server parses the identification tag from the integrated data, and the WEB server starts to search the local cache for the existence of the same tag as the identification tag. If the identification tag is not found in the WEB server, it can indicate that the data request from the client is a normal request. At the same time, if there is no identification tag in the WEB server, the identification tag will be stored in the temporary folder of the WEB, and the deletion time will be set. After a period of deletion, the WEB server will clear the files in the temporary folder. ; By setting the temporary folder to save the setting of the identification tag, you can confirm whether there is a replay attack during the deletion time, and it will not occupy the cache.
重放攻击又称重播攻击、回放攻击,是指攻击者发送一个目的主机已接收过的包,来达到欺骗系统的目的,主要用于身份认证过程,破坏认证的正确性。重放攻击可以由发起者,也可以由拦截并重发该数据的敌方进行。攻击者利用网络监听或者其他方式盗取认证凭据,之后再把它重新发给认证服务器。重放攻击在任何网络通过程中都可能发生,是计算机世界黑客常用的攻击方式之一。Replay attack, also known as replay attack and playback attack, means that the attacker sends a packet that the destination host has received to deceive the system. It is mainly used in the identity authentication process and destroys the correctness of the authentication. A replay attack can be carried out by the initiator or by an adversary who intercepts and retransmits the data. Attackers use network snooping or other means to steal authentication credentials and then re-send them to the authentication server. Replay attacks may occur in any network communication process, and are one of the commonly used attack methods by hackers in the computer world.
在一种可选实施例中的网站防篡改方法,所述接收客户端发送的集成数据之前,还包括:In an optional embodiment of the method for preventing tampering of a website, before receiving the integration data sent by the client, the method further includes:
步骤a1011,接收所述客户端发送的第二锁定参数,并根据所述第二锁定参数生成第三锁定参数;具体地,第二锁定参数可以是随机数字字母串,也可以是设定的数字字母串,第二锁定参数的数字位数可以是16位也可以是32位。Step a1011: Receive the second locking parameter sent by the client, and generate a third locking parameter according to the second locking parameter; specifically, the second locking parameter may be a random alphanumeric string, or a set number Alphabet string, the number of digits of the second locking parameter can be 16 or 32.
步骤b1011,发送所述第三锁定参数至所述客户端;具体地,WEB服务器收到第二锁定参数,然后经过解析解密得到第二锁定参数,WEB服务器在接收到第二锁定参数后然后生成第三锁定参数,而第三锁定参数为随机生成的数字字母组合,可以是16位又或是32位的数字字母组合。Step b1011, sending the third locking parameter to the client; specifically, the WEB server receives the second locking parameter, and then obtains the second locking parameter through parsing and decryption, and the WEB server generates the second locking parameter after receiving the second locking parameter The third locking parameter, and the third locking parameter is a randomly generated combination of numbers and letters, which may be a combination of 16-bit or 32-bit numbers and letters.
步骤c1011,根据所述第二锁定参数和所述第三锁定参数,生成所述第一锁定参数;示例地,如果第二锁定参数为16位数,第三锁定参数为16位数,则第一锁定参数则为由第二锁定参数与第三锁定参数组合的32位数组合;如果第二锁定参数为32位数,第三锁定参数为32位数,则第一锁定参数则为第二锁定参数与第三锁定参数组合的64位数;Step c1011, generate the first locking parameter according to the second locking parameter and the third locking parameter; for example, if the second locking parameter is 16 digits and the third locking parameter is 16 digits, then the A locking parameter is a 32-digit combination of the second locking parameter and the third locking parameter; if the second locking parameter is 32 digits and the third locking parameter is 32 digits, then the first locking parameter is the second 64 digits of the combination of the lock parameter and the third lock parameter;
步骤d1011,保存所述第一锁定参数。通过客户端与WEB服务器交换第二锁定参数以及第三锁定参数,从而增加第一锁定参数的安全性,因为第一锁定参数是要通过第二锁定参数、第三锁定参数共同组合而成的,而第二锁定参数、第三锁定参数分别是由客户端以及WEB服务器生成,能有效地增加第一锁定参数的随机性,从而有效地增加第一锁定参数的安全性。Step d1011, save the first locking parameter. By exchanging the second locking parameter and the third locking parameter between the client and the WEB server, the security of the first locking parameter is increased, because the first locking parameter is formed by the combination of the second locking parameter and the third locking parameter, The second locking parameter and the third locking parameter are respectively generated by the client and the WEB server, which can effectively increase the randomness of the first locking parameter, thereby effectively increasing the security of the first locking parameter.
在一种可选实施例中的网站防篡改方法,其中还包括:In an optional embodiment, the website tamper-proof method further includes:
获取非法操作行为并生成记录文件,用户可以在客户端上查看所述记录文件,以核查网页被篡改的次数;Obtain illegal operations and generate record files, users can view the record files on the client to check the number of times the webpage has been tampered with;
所述记录文件用于记录以下一个或多个内容:The record file is used to record one or more of the following:
篡改的操作类型、文件、进程、时间。Tampered operation type, file, process, time.
一种网站防篡改系统,所述装置包括:A website tamper-proof system, the device includes:
管理模块,用于获取配置文件、且根据所述配置文件生成监测目录;a management module, configured to obtain a configuration file and generate a monitoring directory according to the configuration file;
监控模块,获取底层文件、且监控所述底层文件以实时监控网页状态。The monitoring module obtains the underlying file and monitors the underlying file to monitor the status of the webpage in real time.
一种计算机可读存储介质,其存储有计算机程序,该程序被处理器执行时实现上述方法的步骤。A computer-readable storage medium storing a computer program, the program implementing the steps of the above method when executed by a processor.
内存可能包括计算机可读介质中的非永久性存储器,随机存储存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flashRAM)。内存是计算机可读介质的示例。Memory may include non-persistent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read only memory (ROM) or flash memory (flashRAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitorymedia),如调制的数据信号和载波。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape-disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, excludes non-transitory computer-readable media, such as modulated data signals and carrier waves.
本发明通过实时监控网页信息当中底层文件的状态,当网页信息当中底层文件的状态、属性发生改变之前,根据监测目录当中的监测规则判断这一次改变动作时候为正常操作,从而达到防止网页被篡改的效果。The present invention monitors the state of the underlying files in the web page information in real time. Before the state and attributes of the underlying files in the web page information are changed, it is judged that this change is a normal operation according to the monitoring rules in the monitoring directory, so as to prevent the web page from being tampered with. Effect.
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above-described embodiments can be combined arbitrarily. For the sake of brevity, all possible combinations of the technical features in the above-described embodiments are not described. However, as long as there is no contradiction between the combinations of these technical features, All should be regarded as the scope described in this specification.
以上所述,仅是本发明的较佳实施例而已,并非对本发明作任何形式上的限制。任何熟悉本领域的技术人员,在不脱离本发明技术方案范围情况下,都可利用上述揭示的方法和技术内容对本发明技术方案做出许多可能的变动和修饰,或修改为等同变化的等效实施例。故凡是未脱离本发明技术方案的内容,依据本发明之形状、构造及原理所作的等效变化,均应涵盖于本发明的保护范围内。The above descriptions are only preferred embodiments of the present invention, and do not limit the present invention in any form. Any person skilled in the art, without departing from the scope of the technical solution of the present invention, can make many possible changes and modifications to the technical solution of the present invention by using the methods and technical contents disclosed above, or modify them into equivalents of equivalent changes. Example. Therefore, all equivalent changes made according to the shape, structure and principle of the present invention without departing from the technical solution of the present invention shall be covered within the protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010800366.2A CN111967059A (en) | 2020-08-11 | 2020-08-11 | Website tamper-proofing method and system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010800366.2A CN111967059A (en) | 2020-08-11 | 2020-08-11 | Website tamper-proofing method and system and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111967059A true CN111967059A (en) | 2020-11-20 |
Family
ID=73365560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010800366.2A Pending CN111967059A (en) | 2020-08-11 | 2020-08-11 | Website tamper-proofing method and system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111967059A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343312A (en) * | 2021-06-25 | 2021-09-03 | 工银科技有限公司 | Page tamper-proofing method and system based on front-end point burying technology |
CN113364808A (en) * | 2021-06-30 | 2021-09-07 | 北京天融信网络安全技术有限公司 | Industrial control firewall testing method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101778137A (en) * | 2010-01-15 | 2010-07-14 | 蓝盾信息安全技术股份有限公司 | System and method for preventing webpage from being falsified |
CN103679002A (en) * | 2013-12-12 | 2014-03-26 | 小米科技有限责任公司 | Method and device for monitoring file change and server |
CN105871819A (en) * | 2016-03-23 | 2016-08-17 | 上海上讯信息技术股份有限公司 | Transmission control method and device |
CN106650492A (en) * | 2016-12-14 | 2017-05-10 | 北京大学 | Multi-device file protection method and device based on security catalog |
CN107423639A (en) * | 2017-04-21 | 2017-12-01 | 深圳前海微众银行股份有限公司 | webpage tamper monitoring method and device |
CN110008392A (en) * | 2019-03-07 | 2019-07-12 | 北京华安普特网络科技有限公司 | A kind of webpage tamper detection method based on web crawlers technology |
-
2020
- 2020-08-11 CN CN202010800366.2A patent/CN111967059A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101778137A (en) * | 2010-01-15 | 2010-07-14 | 蓝盾信息安全技术股份有限公司 | System and method for preventing webpage from being falsified |
CN103679002A (en) * | 2013-12-12 | 2014-03-26 | 小米科技有限责任公司 | Method and device for monitoring file change and server |
CN105871819A (en) * | 2016-03-23 | 2016-08-17 | 上海上讯信息技术股份有限公司 | Transmission control method and device |
CN106650492A (en) * | 2016-12-14 | 2017-05-10 | 北京大学 | Multi-device file protection method and device based on security catalog |
CN107423639A (en) * | 2017-04-21 | 2017-12-01 | 深圳前海微众银行股份有限公司 | webpage tamper monitoring method and device |
CN110008392A (en) * | 2019-03-07 | 2019-07-12 | 北京华安普特网络科技有限公司 | A kind of webpage tamper detection method based on web crawlers technology |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113343312A (en) * | 2021-06-25 | 2021-09-03 | 工银科技有限公司 | Page tamper-proofing method and system based on front-end point burying technology |
CN113364808A (en) * | 2021-06-30 | 2021-09-07 | 北京天融信网络安全技术有限公司 | Industrial control firewall testing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10841320B2 (en) | Identifying command and control endpoint used by domain generation algorithm (DGA) malware | |
CN109074452B (en) | System and method for generating tripwire files | |
CN110268406B (en) | Password security | |
CN104766009B (en) | A kind of system distorted based on the anti-web page files of operating system bottom | |
JP2020511059A (en) | Information authentication method and system | |
CN1829225B (en) | Method and system for securely revealing identity over the internet | |
US12063246B2 (en) | Security mechanisms for preventing retry or replay attacks | |
KR20090019451A (en) | Phishing and pharming notification methods and devices | |
Wang et al. | Verilogo: Proactive phishing detection via logo recognition | |
CN101473314B (en) | Entering confidential information on untrusted machines | |
CN111967059A (en) | Website tamper-proofing method and system and computer readable storage medium | |
US20040260968A1 (en) | Server with file verification | |
Hajiali et al. | Preventing phishing attacks using text and image watermarking | |
Muniswamaiah et al. | IoT-based Big Data Storage Systems Challenges | |
KR101710918B1 (en) | Method for monitoring malwares which encrypt user files | |
Tiwari et al. | A novel watermarking scheme for secure relational databases | |
US11853454B1 (en) | Systems and methods for preparing a secure search index for securely detecting personally identifiable information | |
CN114091122A (en) | Website tamper-proof method and device, computer equipment and storage medium | |
Tian et al. | A trusted control model of cloud storage | |
CN112307519B (en) | Hierarchical verifiable query system based on selective leakage | |
CN117708878B (en) | ORAM (object oriented authentication and privacy preserving) function-based copyright information trusted retrieval method | |
RU2811375C1 (en) | System and method for generating classifier for detecting phishing sites using dom object hashes | |
CN119945678B (en) | Distributed key recovery method, system and medium | |
JP7656234B2 (en) | Determination method, information processing device, and determination program | |
KR20140108779A (en) | Apparatus and method for secure cloud system using dummy authentification key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201120 |
|
RJ01 | Rejection of invention patent application after publication |