Browser service data processing method and apparatus

A technology of business data and processing methods, applied in the field of network communication, can solve the problems of being immediately exploited by attackers, the client is attacked, the client user is lost, etc., to achieve the effect of defense against cross-site scripting vulnerability attacks

Active Publication Date: 2014-01-22
CHINA TELECOM CORP LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Although the above-mentioned defense technologies can prevent cross-site scripting vulnerability attacks to a certain extent, these methods require the provider of web application services to check whether there are vulnerabilities in the server-side web application in a timely manner, especially when new web applications appear. In the application, once a cross-site scripting vulnerability occurs and is not fixed, it may be immediately exploited by the attacker, causing the client con

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Browser service data processing method and apparatus
  • Browser service data processing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangement of components and steps set forth in these embodiments does not limit the scope of the invention unless specifically stated otherwise.

[0025] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0026] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0027] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authorized Specification.

[0028] In all examples shown and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a browser service data processing method and apparatus. The method comprises: monitoring an operation request emitted by a client browser through a browser helper object (BHO) plug-in; when the BHO plug-in monitors the operation request emitted by the client browser, identifying the type of the operation request; in response to the operation request with an identification result being loading the service data of a far-end server, the BHO plug-in identifying whether the service data of the far-end server accords with a preset safety rule; in response to accordance with the preset safety rule, the BHO plug-in acquiring the service data from the far-end server; and the browser loading the service data of the far-end server. By using the browser service data processing method and apparatus, client-based cross site script vulnerability attack defense is realized.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and device for processing browser service data. Background technique [0002] With the development of network technology, various applications in the network application layer provide users with more and more rich experience, especially various web applications, including the currently popular applications based on web2.0 technology. These web applications usually contain a large amount of dynamic content, which greatly improves the user experience. However, in the complex network application environment, security issues for web applications are also receiving more and more attention. [0003] Cross Site Scripting (Cross Site Scripting, also known as XSS) vulnerability attack is a common attack method for web applications. Cross-site scripting vulnerabilities are vulnerabilities in server-side web applications. Attackers take advantage of this vulnerability in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 肖丽
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products