Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website security detection system

A security detection and website technology, applied in transmission systems, electrical components, etc., can solve the problems of lack of vulnerability verification mechanism and false positives, and achieve the effect of improving quality and efficiency, reducing false positive rate, and maintaining information security.

Active Publication Date: 2013-03-13
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In traditional website vulnerability scanning products, vulnerability testing is only performed on existing pages, and after a vulnerability is discovered, the necessary vulnerability verification mechanism is lacking, resulting in a high number of false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security detection system
  • Website security detection system
  • Website security detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0023] figure 1 A flow chart of a website security detection method 100 according to an embodiment of the present invention is schematically illustrated. Such as figure 1 As shown, in the website security detection method 100 according to the embodiment of the present invention, the method starts with step S102, and in step S102, according to the website's website address, a first detection website associated with the website is c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website security detection system which comprises a website security detection device, one or a plurality of web servers and a web crawler device. The website security detection device is suitable for receiving web addresses from the web crawler device and constructing detection web addresses correlated with the web addresses to utilize the detection web addresses to visit websites so as to judge whether leaks occur in the web addresses. The one or the plurality of web servers is suitable for responding to visit of the website security detection device to the websites and returning results to the website security detection device. The web crawler device is suitable for capturing the web addresses of the websites from the one or the plurality of web servers and sending the web addresses to the website security detection device.

Description

technical field [0001] The invention relates to computer network security, in particular to a website security detection system. Background technique [0002] A vulnerability is a weakness or flaw in a computer system. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be used intentionally or unintentionally, thereby causing adverse effects on an organization's assets or operations, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as Springboard for intrusion into other host systems. Judging from the vulnerabilities discovered so far, the vulnerabilities in application software are far more than those in the operating system, especially the vulnerabilities in WEB application systems ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 龙专赵武
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products