Supercharge Your Innovation With Domain-Expert AI Agents!

Software information safety protection method and device

A software information and security detection technology, applied in the Internet field, can solve the problems of low security protection efficiency, affecting business code execution process, and high cost, and achieve the effect of improving protection efficiency

Inactive Publication Date: 2017-05-10
BEIJING CHINA POWER INFORMATION TECH +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, interception in the business execution code can easily affect the process of the business execution code. At the same time, the cost of writing codes to defend against various parameter forms of loopholes is high. When there are new loopholes, the business execution code needs to be recompiled Packaging, and requires the server to go offline to load new business execution code, and then go online again to solve the vulnerability, the efficiency of its security protection is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software information safety protection method and device
  • Software information safety protection method and device
  • Software information safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0041] see figure 1 A schematic flowchart of a method for software information disclosed by an embodiment of the present invention is shown.

[0042] Depend on figure 1 It can be seen that the method includes:

[0043] S101: Obtain an access request sent by a client.

[0044] When a user needs to access a certain e-commerce platform, the client sends an access request to the server of the e-commerce platform. Optionally, the access request is in http forma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software information safety protection method and device. When a client terminal access an e-commerce platform, a server of the platform acquires an access request sent by a client terminal and performs safety detection on the access request based on a preset safety detection rule. When the access request is determined as a safe access request, the client terminal is allowed to access the e-commerce platform. If the access request is determined as a malicious request, the access is intercepted. Compared with the prior art, the protection work is separated from service codes in a modularized development method. The method can be applied to a plurality of web applications and can also save operations such as system off line or server restart during protection strategy update. Long term system service can be met and software information protection efficiency is improved.

Description

technical field [0001] This application relates to the Internet field, and more specifically, to a method and device for protecting software information. Background technique [0002] With the rapid development of information technology and the Internet, malicious users take advantage of the loopholes in web applications to maliciously access the system, thereby causing harm to the system. With the rapid growth of web attacks, software information is facing more and more security issues, and the system has also been challenged more and more. [0003] The existing security defense method is mainly to write protection code in the business execution code to intercept the attack. However, interception in the business execution code can easily affect the process of the business execution code. At the same time, the cost of writing codes to defend against various parameter forms of loopholes is high. When there are new loopholes, the business execution code needs to be recompiled...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1441
Inventor 董爱强王伟姜海东闫丹
Owner BEIJING CHINA POWER INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More