Unlock instant, AI-driven research and patent intelligence for your innovation.

A vulnerability detection method, gateway device, browser and system

A gateway device and vulnerability detection technology, applied in the field of communication, can solve problems such as low efficiency, increase client security risks, limit browser functions and configure security settings, etc., to achieve the effect of improving work efficiency

Active Publication Date: 2020-09-18
SANGFOR TECH INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In practical applications, compared to Firefox, which is a highly secure browser, the security of Chrome or IE browser without Flash plug-in may be better, which shows that the current browser vulnerabilities are mainly caused by browser plug-ins , existing browsers integrate complex plug-ins such as ActiveX plug-ins, Flash Player plug-ins, Java virtual machine plug-ins, Adobe Reader plug-ins, although these plug-ins can enhance browser functions, such as image processing, user-friendly interface and various Animations, etc., but these plug-ins may contain additional flaws and loopholes, which will increase the security risk of the client
[0004] In the existing solution, the vulnerability detection for the browser can only be performed locally through the client's security software, and cannot be remotely detected in batches. This depends on the security awareness of each client user. Users with high security awareness will regularly patch and update the client. The browser or browser plug-in on the client side may also restrict browser functions and configure security settings, such as prohibiting the automatic operation of Java applets, JavaScript, VBScript, and ActiveX, so as to improve the security of the client
However, not all client users have high security awareness, and if network administrators want to ensure the security performance of internal users' browsers, they can only detect them one by one, which is too inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A vulnerability detection method, gateway device, browser and system
  • A vulnerability detection method, gateway device, browser and system
  • A vulnerability detection method, gateway device, browser and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The embodiment of the present invention provides a vulnerability detection method, a gateway device, a browser and a system, a computer device, and a readable storage medium, which are used to implement vulnerability detection on the browser on the intranet side of the gateway, so as to increase the browser's The security performance reduces the security risk of the browser and the terminal where the browser is located. At the same time, it does not require the intranet network administrator to test the browsers one by one, which is conducive to improving the work efficiency of the internal network administrator.

[0098] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention are clearly and completely described below. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all the embodiment. Based on the em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a vulnerability detection method, gateway equipment, a browser and a system, a computer device, and a readable storage medium for realizing the vulnerability detection of the browser at one side of the intranet, thereby lowering security risk. The method disclosed by the embodiment of the invention comprises the following steps: acquiring HTTP request information issued by the browser; feeding back HTTP response information to the browser according to the HTTP request information so that the browser can use a detection script in the HTTP response information to perform the vulnerability detection, and return a detection result to the gateway equipment; receiving the detection result returned by the browser; judging whether the vulnerability is existent in the browser according to the detection result; and intercepting the HTTP request information if the vulnerability is existent.

Description

technical field [0001] The present invention relates to communication technology, in particular to a loophole detection method, gateway equipment, browser and system, computer device, and readable storage medium. Background technique [0002] At present, the targets of hacker attacks include not only servers, but also clients. For client-side attacks, exploiting browser vulnerabilities is an important means of intrusion. Although various manufacturers continue to strive to launch new, better-performing, and more secure Web browsers, such as Google's Chrome, attacks and vulnerabilities in Web browsers still exist. hanging by a thread. [0003] In practical applications, compared to Firefox, which is a highly secure browser, the security of Chrome or IE browser without Flash plug-in may be better, which shows that the current browser vulnerabilities are mainly caused by browser plug-ins , existing browsers integrate complex plug-ins such as ActiveX plug-ins, Flash Player plu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1433H04L67/02
Inventor 王朋涛
Owner SANGFOR TECH INC