Background technique
With the fast development of information age, so that user is obtained message context from internet very convenient, but also gives
Office Network brings pressure, while also bringing higher Dangerous Internet.
Currently, when the user accesses a web page, only record user logs in, exits, accessing the major issues such as content, not in access
Whether appearance, which closes the specifying informations such as rule, is recorded, also can not be complete simultaneously for the ciphertext transferring content started with HTTPS agreement
Acquisition specifically access content, Office Network administrator can only know sometime point some logged webpage of user, but nothing
Method obtains detailed access information, brings very big difficulty for the efficient management of Office Network, also gives the general safety of Office Network
Very big security risk is brought, once going wrong quickly can not timely navigate to problem.
Therefore, it is necessary to a kind of general method for auditing webpage to solve the above problems, no matter user pass through it is in plain text or close
Any information of text access Office Network can intercept one by one, and provide response results after comparing analysis according to violation list, simultaneously
Whole process is completely recorded, administrator is facilitated quickly timely to position to problem.
Summary of the invention
The main purpose of the present invention is to provide a kind of general method for auditing webpage, fundamentally facilitate routine office work net
The O&M of network and management not only promote O&M efficiency, moreover it is possible to ensure that the operation in office network all meets the requirements.
In order to achieve the above object, the technical solution adopted in the present invention is as follows:
A kind of general method for auditing webpage comprising the steps of:
A. server-side configures violation Keyword List;
The violation Keyword List includes violation keyword;
B. violation Keyword List is handed down to terminal computer by server-side;
C. violation Keyword List is saved in application program by terminal computer, and forbids other browsings other than application program
Device operation;
D. terminal computer issues web access requests by application program;
E. Internet Server receives the web access requests of terminal computer sending, by terminal computer web access requests
It is parsed into corresponding resource, and the resource parsed is replied into application program;
The resource includes html file, CSS file, JavaScript file, picture, video, audio;
F. application program will receive resource analysis and compare and analyze at after text file with violation Keyword List, if literary
It include the violation keyword in violation Keyword List in this document, then application program is refused to terminal computer displayed web page
Information in access request;If not comprising the violation keyword in violation Keyword List, application program in text file
Information into terminal computer displayed web page access request;
G. the comparative analysis result of text file and violation Keyword List is sent to server-side by application program;
The analysis result includes request time, request account, IP address, request number of times, request results, webpage title;
H. server-side receives comparative analysis result and backs up.
The beneficial effects of the present invention are:
The present invention provides a kind of general method for auditing webpage, only need to conveniently be configured by server-side and be handed down to end
End subscriber by the detailed analysis of application program and can provide later whenever any web access requests of terminal user's sending
Analysis is as a result, ensure that the normalization of safety, the end-user access operation of data in net, so that realization accesses behaviour to user
The safety management and monitoring of work, while being convenient for the accurate positionin and inquiry of everyday problem, convenience is provided for administrator.
Specific embodiment
With reference to the accompanying drawings and examples, the method for auditing webpage general to one kind of the invention is done further retouches in detail
It states.
The technical solution of the general method for auditing webpage of one kind of the invention is to configure violation Keyword List in server-side,
And violation Keyword List is handed down to terminal computer, terminal computer by violation Keyword List be saved in application program it
Afterwards, forbid running the browser other than application program on terminal computer, when terminal computer issues web access requests, first
It is received by Internet Server and replys resource to application program, then application program is by resource analysis at after text file and separated
Rule Keyword List compare and analyze, when analyze in text file include violation keyword when, refuse to terminal calculate
Machine shows the specifying information requested access to;It include violation keyword as do not analyzed in text file, then to terminal computer
It shows the specifying information requested access to, and complete access record is sent to server-side, backed up by server-side, facilitate pipe
Reason person quickly consults and positioning problems, improves network O&M efficiency, improves internet security.
For example, have 100 terminal computers in a local area network, and terminal computer PC1, PC2 ..., PC100, terminal meter
The corresponding IP address of calculation machine PC1, PC2 ..., PC100 be 192.168.0.1,192.168.0.2 ..., 192.168.0.100, one
Platform server computer (SERVER) carries out the configuration of violation Keyword List to this 100 terminal computers and issues to it
Web access requests be monitored and manage, general method for auditing webpage of the invention specifically comprises the following steps:
A. server-side configures violation Keyword List;
Violation keyword in the violation Keyword List of server computer configuration is baidu, tianya, discussion bar, qq;
The violation Keyword List includes violation keyword;
B. violation Keyword List is handed down to terminal user by server-side;
Violation Keyword List configured with baidu, tianya, discussion bar, qq violation keyword is handed down to by server computer
100 terminal computers in netting;
C. violation Keyword List is saved in application program by terminal computer, and forbids other browsings other than application program
Device operation 103;
100 terminal computers save the violation Keyword List configured with baidu, tianya, discussion bar, qq violation keyword
Into the application program of the machine, this 100 terminal computers will be unable to other browsers other than operation application program later;
D. terminal computer issues web access requests by application program;
Terminal computer PC2 issues web access requests by the application program of the machine in 2018/12/6 10:30, requests access to
Web page address be https: //qzone.qq.com/index.html;
E. Internet Server receives the web access requests of terminal computer sending, is asked according to terminal computer web page access
It asks and finds out corresponding resource, and the resource is replied into application program 105;
Internet Server receives the https: //qzone.qq.com/index.html webpage of terminal computer PC2 sending
After access request, according to the web page address https requested access to: //qzone.qq.com/index.html finds out corresponding
Resource, and the resource is replied into application program;
F. application program will receive resource analysis and compare and analyze at after text file with violation Keyword List, if literary
It include the violation keyword in violation Keyword List in this document, then application program is refused to terminal computer displayed web page
Information in access request;If not comprising the violation keyword in violation Keyword List, application program in text file
Information into terminal computer displayed web page access request;
Application program compares point according to the violation keyword in the character information and violation Keyword List in text file
Analysis is violation access request due to including violation keyword qq in character information, and application program is refused to calculate to terminal
Machine PC2 shows https: the content of //qzone.qq.com/index.html webpage;
G. the comparative analysis result of text file and violation Keyword List is sent to server-side by application program;
It is request time: 2018/12/6 10:30 that application program, which will analyze result, requests account: PC2, IP address:
192.168.0.2, request number of times: 1, request results: refusal, webpage title: https: //qzone.qq.com/index.html
Complete information be sent to server-side;
The analysis result includes request time, request account, IP address, request number of times, request results, webpage title;
H. server-side receives comparative analysis result and backs up;
After server-side receives the analysis result of application program transmission, by request time: 2018/12/6 10:30 requests account:
PC2, IP address: 192.168.0.2, request number of times: 1, request results: refusal, webpage title: https: //
The complete information of qzone.qq.com/index.html backs up in server database.
Method of the invention disposably configures violation Keyword List and is handed down to all terminals in net and calculates in server-side
Machine is disposed convenient and efficient;When netting interior terminal computer has web access requests, application program passes through Internet Server is anti-
The resource analysis of feedback uses terminal in netting at the mode for whether closing rule after text file out with the comparative analysis of violation Keyword List
The web page access behavior at family carries out unified monitoring and management, makes the web page access behavioural norm for netting interior terminal user;Prison every time
The analysis result of control and management is all sent completely to server-side backup, it is ensured that the integrality and network of access behavior record in net
Safety, while being provided a great convenience to the daily O&M and management work of administrative staff.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.