A url mimic method for protecting web application security
A web application and security technology, applied in electrical components, transmission systems, etc., can solve problems such as web security threats, difficult attack methods, tampering of web page content, etc., and achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] specific implementation plan
[0017] The purpose and effects of the present invention will become more apparent by describing the present invention in detail below in conjunction with the accompanying drawings.
[0018] The present invention is a url mimic method for protecting the safety of Web applications, such as figure 1 As shown, this method is implemented in the gateway, where the gateway with URL mimicry function uses nginx as a reverse proxy. The URL mimicry function can be implemented with the http module of nginx. Specifically include the following steps:
[0019] Step 1: If figure 2 As shown in (a), when the client sends a Web request to the background Web server, the gateway dynamically transforms the url in the Web page returned by the background Web server to the client, specifically including the following sub-steps:
[0020] (1.1) Find all the links in the returned web page, and find out the url links with parameters passed to the background serve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


