Unlock instant, AI-driven research and patent intelligence for your innovation.

Website security detection method, website security detection device and cloud monitoring system

A security and security evaluation technology, applied in the field of network security, can solve problems such as false fraud, website sidenotes, website loopholes, etc., and achieve the effect of eliminating potential safety hazards, protecting information security, and ensuring website security

Inactive Publication Date: 2015-11-25
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of Internet technology, the relationship between the network and people's work, life and entertainment is becoming increasingly close. While enjoying the convenience brought by the network, people also need to face the hidden dangers of network security. Typical examples are , a website with security issues will put the safety of viewers at risk
At present, the security problems of the website include: the website is linked to the horse, the false and fraudulent website, the website is searched and blocked, the website is marginalized, the website is tampered with abnormally, and the website has loopholes, etc.
[0003] However, in the prior art, when the website administrator operates and maintains the designated website, he is often unable to know the security situation of the designated website in a timely and effective manner. Security issues are eventually reported, blocked, etc., which not only damages the interests of ordinary netizens browsing the designated website, but also damages the interests of the website administrator, which does not meet the needs of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website security detection method, website security detection device and cloud monitoring system
  • Website security detection method, website security detection device and cloud monitoring system
  • Website security detection method, website security detection device and cloud monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0052] figure 1 A flow chart of a method for detecting website security according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0053] Step S110, receiving a request to detect the security of a specified website.

[0054] Step S120, by invoking the API interface provided by the network security application, to obtain the security evaluation information of the designated web...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website security detection method, a website security detection device and a cloud monitoring system. The website security detection method comprises the following steps: receiving a request for detecting the security of an appointed website; obtaining security evaluation information of the appointed website by a network security application by transferring an application program interface (API) provided by the network security application; and returning the security evaluation information to a requester. By means of the technical scheme provided by the invention, according to requirements of a website manager, a service for obtaining the security evaluation information of the appointed website is provided for the website manager by transferring the API provided by the network security application, so that the website manager can obtain the security conditions and the security problems of the appointed website in time effectively; therefore, targeted adjustment and maintenance of the appointed website are carried out; potential safety hazards are eliminated; the benefits of the website manager can be protected; furthermore, the information security of ordinary netizens browsing the website can be protected; and thus, user requirements are met.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and cloud monitoring system for detecting the security of a website. Background technique [0002] With the continuous development of Internet technology, the relationship between the network and people's work, life and entertainment is becoming increasingly close. While enjoying the convenience brought by the network, people also need to face the hidden dangers of network security. Typical examples are , Web sites with security issues will cause the safety of viewers to be compromised. At present, the security problems of the website include: the website is linked to a horse, a fake and fraudulent website, the website is searched and blocked, the website is marginalized, the website is tampered with abnormally, and the website has loopholes, etc. [0003] However, in the prior art, when the website administrator operates and maintains the designated we...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/14
Inventor 鲍坤夫刘浩
Owner BEIJING QIHOO TECH CO LTD