Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for testing vulnerabilities

A technology of loopholes and protocol data, applied in the field of data processing, can solve problems such as damage to the interests of live broadcast platforms

Active Publication Date: 2020-05-12
WUHAN DOUYU NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problems existing in the prior art, the embodiment of the present invention provides a method and device for testing loopholes, which are used to solve the problems in the prior art during the live broadcast process, due to loopholes in the live broadcast application, third parties can use these loopholes to obtain Functions that need to be paid to obtain, resulting in technical problems that damage the interests of the live broadcast platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for testing vulnerabilities
  • A method and device for testing vulnerabilities
  • A method and device for testing vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides a method for testing vulnerabilities, and the method is applied in live applications, such as figure 1 As shown, the method includes:

[0037] S101. The server acquires the communication protocol data reported by the client.

[0038] In this step, when obtaining the communication protocol data reported by the client, it is necessary to obtain all the protocol data reported by the client, and then filter out the communication protocol with revenue or the preset rule communication protocol based on keywords; The communication protocol refers to the agreement involving money or privileges, etc.; the rule communication protocol generally refers to the agreement used to restrict the user's behavior and operation.

[0039] For example, the communication protocol with benefits may include: an agreement to complete a task, an agreement to win a prize, an agreement to receive a prize, etc.; a regular communication protocol may include: an agreement to s...

Embodiment 2

[0062] Corresponding to Embodiment 1, this embodiment provides a device for testing vulnerabilities, such as figure 2 As shown, the device includes: an acquisition unit 21, a modification unit 22, and a judgment unit 23; wherein,

[0063] When the acquisition unit 21 acquires the communication protocol data reported by the client, it needs to acquire all the protocol data reported by the client, and then filter out the communication protocol with income or the preset rule communication protocol based on keywords; The income communication protocol refers to the agreement involving money or privileges; the rule communication protocol generally refers to the agreement used to restrict the user's behavior and operation.

[0064] For example, the communication protocol with benefits may include: an agreement to complete a task, an agreement to win a prize, an agreement to receive a prize, etc.; a regular communication protocol may include: an agreement to send barrage, etc.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for testing vulnerability. The method comprises the steps that a server obtains communication protocol data reported by a client; the protocol data is modified in a preset modification mode and whether corresponding logic judgment results are output or not is judged; and if the logic judgment results are output, it is determined that communication protocols are in a security mode, wherein the communication protocols comprise the communication protocols with profits. Whether the server is about to carry out logic judgment or not is detected by modifying some protocol data with profits reported by the client, so whether the vulnerability exists in the control logic of the server or not can be determined rapidly, the vulnerability can be repaired timely, the vulnerability is prevented from being used by a third party to obtain some functions which can be obtained only through payment, and the profits of a live broadcast platform are ensured.

Description

technical field [0001] The invention belongs to the technical field of data processing, in particular to a method and device for testing loopholes. Background technique [0002] At present, with the advancement of network communication technology and the speed-up of broadband network, webcasting has been more and more developed and applied. Especially in the field of game live broadcast, more and more viewers will watch the live broadcast of game anchors. At the same time, with the development of barrage, it can make the live broadcast more interactive and interesting. [0003] With the development of the live broadcast platform, its functions are becoming more and more abundant. For example, there are some paid functions that can increase the sense of superiority of the audience. However, there will inevitably be some small loopholes in the program development process. If these loopholes are exploited by a third party, it will damage the revenue of the live broadcast plat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06H04N21/431
CPCH04L43/18H04L43/50H04L63/14H04L63/1433H04N21/431
Inventor 周志刚张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD