Unlock instant, AI-driven research and patent intelligence for your innovation.

A security hardening method based on javaee application system

An application system and security technology, applied in the direction of transmission system, electrical components, platform integrity maintenance, etc., can solve the problems of application programs unable to encrypt network traffic, lack of security loophole prevention, insufficient transmission layer protection, etc.

Active Publication Date: 2016-01-20
北京用友政务软件股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] A10 - Insufficient Transport Layer Protection: Applications often fail to encrypt network traffic when sensitive information transmission must be protected
[0013] JavaEE application systems such as A++ application systems lack security loopholes in the implementation process, and the above security loopholes also exist

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security hardening method based on javaee application system
  • A security hardening method based on javaee application system
  • A security hardening method based on javaee application system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0044] Main ideas of the present invention: the present invention provides a security reinforcement method based on the JavaEE application system. Since the A++ application system is an application extension system based on the platform, it only needs to be expanded on the platform to achieve the purpose of security reinforcement. The invention encapsulates the security reinforcement method as a security verification service, and only passing the security verification service is a legal request. Through this method, the security of the system is strengthened, and the problem of system security loopholes is effectively prevented.

[0045] figure 1 and figure 2 Shown is a flow chart of a security hardening method based on the JavaEE application system of the present invention, as can be seen from the figure, the method mainly includes ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety reinforcing method based on a JavaEE application system. The safety reinforcing method reinforces safety of the system through the fact that expansion and deployment of safety authentication service are conducted on a system application platform. Firstly, a client sends a request to a server according to business requirements; then the server conducts the safety authentication service for the received request, and if the safety authentication service is passed, the request of the client is processed and a processed result is sent back to the client; and if the safety authentication service is not passed, the processed result of authentication failure is sent back to the client. The safety reinforcing method can resolve the problem that security flaws exist in the system, and improves safety of the system.

Description

technical field [0001] The invention relates to the field of computer application system security protection, in particular to a security reinforcement method based on JavaEE application system. Background technique [0002] A security breach is an inadvertently left unprotected entry point to a restricted computer, component, application, or other online resource. Vulnerabilities are flaws in hardware, software or usage strategies that expose computers to virus and hacker attacks. The security attack mainly comes from "sending malicious information to the web server". Because of some security holes, the execution of these malicious information poses a threat to the security of the web server or the client. The ten key risks of web applications are as follows: [0003] A1-Injection Attacks: Injection attacks, such as SQL, OS and LDAP injection, occur when untrusted data is sent to a handler as part of a command or query. Malicious data sent by an attacker can trick a hand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/54G06F21/57
Inventor 左冬发刘小勇
Owner 北京用友政务软件股份有限公司