A method and device for testing vulnerabilities
A technology of loopholes and protocol data, applied in the field of data processing, can solve problems such as damage to the interests of live broadcast platforms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] This embodiment provides a method for testing vulnerabilities, and the method is applied in live applications, such as figure 1 As shown, the method includes:
[0037] S101. The server acquires the communication protocol data reported by the client.
[0038] In this step, when obtaining the communication protocol data reported by the client, it is necessary to obtain all the protocol data reported by the client, and then filter out the communication protocol with revenue or the preset rule communication protocol based on keywords; The communication protocol refers to the agreement involving money or privileges, etc.; the rule communication protocol generally refers to the agreement used to restrict the user's behavior and operation.
[0039] For example, the communication protocol with benefits may include: an agreement to complete a task, an agreement to win a prize, an agreement to receive a prize, etc.; a regular communication protocol may include: an agreement to s...
Embodiment 2
[0062] Corresponding to Embodiment 1, this embodiment provides a device for testing vulnerabilities, such as figure 2 As shown, the device includes: an acquisition unit 21, a modification unit 22, and a judgment unit 23; wherein,
[0063] When the acquisition unit 21 acquires the communication protocol data reported by the client, it needs to acquire all the protocol data reported by the client, and then filter out the communication protocol with income or the preset rule communication protocol based on keywords; The income communication protocol refers to the agreement involving money or privileges; the rule communication protocol generally refers to the agreement used to restrict the user's behavior and operation.
[0064] For example, the communication protocol with benefits may include: an agreement to complete a task, an agreement to win a prize, an agreement to receive a prize, etc.; a regular communication protocol may include: an agreement to send barrage, etc.
[00...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


