Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A tamper-proof processing method and device

A processing method and anti-tampering technology, which is applied in the field of communication, can solve problems such as the inability to prevent malicious tampering of web pages, the inability to prevent tampering inspections, etc., and achieve the effect of preventing leakage and preventing spread

Active Publication Date: 2018-08-14
HANGZHOU DT DREAM TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the attacker turns off the anti-tampering software on the WEB server, the anti-tampering check cannot be performed on the files configured on the WEB server, resulting in still being unable to prevent the webpage from being maliciously tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tamper-proof processing method and device
  • A tamper-proof processing method and device
  • A tamper-proof processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In view of the problems existing in the prior art, a tamper-proof processing method is proposed in the embodiment of the present invention, so as to figure 1 This is a schematic diagram of an application scenario of an embodiment of the present invention. The method can be applied to at least a cloud monitoring system deployed on a public network, an intelligent DNS (Domain Name System) system deployed on a public network, and a content identification system deployed on the public network. system, WEB website system, user equipment used by website administrators, and terminal equipment used by ordinary users.

[0038] The WEB website system may specifically include a local anti-tampering system, a WEB server, and a database server. The local tamper-proof system can be deployed on the WEB server or separately. The database server can be deployed on the WEB server, or it can be deployed separately.

[0039] In the above application scenarios, such as figure 2 As shown...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a tamper-proof processing method and device. The method comprises the steps that a cloud monitoring system acquires tampered information of an Internet WEB server; the cloud monitoring system sends the tampered information to a user device; the cloud monitoring system receives a command issued by the user device according to the tampered information; the cloud monitoring system conducts tamper-proof processing on the WEB server according to the command. By means of the technical scheme, when it is detected that the WEB page information configured on the WEB server is tampered, the tampered information can be found in time, and a webmaster is notified to conduct intervention in time. The cloud monitoring system can also find the tampered information of the WEB page information even if a local tamper-proof system of the WEB server is turned off by an attacker, the problem that malignant tampering of the webpage can not be prevented is avoided, the risk that the tampered information leaks can be prevented, and diffusion of the tampered information is effectively prevented.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a tamper-proof processing method and device. Background technique [0002] Malicious tampering of web pages is one of the more serious threats to Internet security at present. Attackers can achieve some kind of show off by tampering with web pages (for example, tampering with government web pages to declare sovereignty and human rights), or obtain access by hanging horses on web pages. User information accessing the tampered web page. [0003] Therefore, how to prevent web pages from being maliciously tampered with has become a concern of many users. In a known manner, a tamper-proof software can be deployed on a WEB (Internet) server, and the tamper-proof software is used to perform tamper-proof checking on the files configured on the WEB server. When a user modifies the file configured on the WEB server, the anti-tampering software will be triggered to aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64H04L29/08
CPCG06F21/64G06F2221/2115H04L67/025
Inventor 齐普军
Owner HANGZHOU DT DREAM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products