Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website bug examination method and device

A website vulnerability and loophole technology, applied in the Internet field, can solve the problems of high false positives, interruption by website managers, lack of vulnerability verification mechanism for loopholes, etc., and achieve the effect of reducing false positive rate and ensuring information security

Inactive Publication Date: 2015-05-13
BEIJING QIANXIN TECH
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in order to improve the security of the website, the website vulnerabilities sent by some professional users are usually sent to the website manager. Because these vulnerabilities lack the necessary vulnerability verification mechanism, the false positives are high, which brings the website manager Certainly bother

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website bug examination method and device
  • Website bug examination method and device
  • Website bug examination method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0048] Figure 1A It shows a website vulnerability warning method provided by the embodiment of the present invention, such as Figure 1A As shown, the website vulnerability warning method includes the following steps:

[0049] 101. Receive website vulnerability information sent through a vulnerability detection webpage, where the website vulnerability information includes: URLs of websites with vulnerabilities, vulnerability test parameters, and vulnerability test results;

[0050] For example, the above website vulnerability information is the vulnerability information submitted by some professional users such as white hats through the vulnerability detection webpage. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website bug examination method and device. The method comprises receiving website bug information sent by bug detection webpage, wherein the website bug information comprises uniform resource locators with bug websites, bug test parameters and bug test results; generating bug test links according to the uniform resource locators and the bug test parameters and performing requirement according to the bug test links to obtain uniform resource locator response information; extracting bug characteristic information from the response information, comparing the characteristic information with the bug test results and determining whether the received bug information passes the examination. By the aid of the method and the device, the bug information is received, bugs mentioned in the bug information are subjected to bug test verification, the bug information is sent to website managers, and accordingly, the bug false alarm rate is reduced, and the website information security is guaranteed.

Description

technical field [0001] The invention relates to Internet technology, in particular to a method and device for auditing website loopholes. Background technique [0002] With the application of Internet technology more and more widely, a lot of people's daily work and entertainment are carried out on the Internet, and the Internet is closely related to people's life. Therefore, the security of the website has been paid more and more attention by people. However, there are various hidden dangers in the network, such as: COOKIE poisoning, application buffer overflow, cross-site scripting attack, various security holes and so on. [0003] Vulnerability discovery is a key process in the confrontation between the attacker and the defender. If the defender cannot discover exploitable vulnerabilities earlier than the attacker, the attacker may use the vulnerability to launch an attack. The sooner vulnerabilities are found and fixed, the less likely an information security incident ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L12/24
Inventor 计东吴辉
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products