Unlock instant, AI-driven research and patent intelligence for your innovation.

Source code power overriding detection method and device based on parameters and information flow

An information flow, source code technology, applied in the computer field, can solve the problem that source code cannot be used safely, open source software and commercial software cannot detect unauthorized access, etc.

Active Publication Date: 2017-09-05
MINSHENG BANKING CORP
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a source code unauthorized detection method and device based on parameters and information flow, which solves the loophole that open source software and commercial software for source code detection in the prior art cannot detect unauthorized based on business logic , a technical problem that prevents the source code of the application platform from being safely used in industries with a wide range of business scenarios such as banks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code power overriding detection method and device based on parameters and information flow
  • Source code power overriding detection method and device based on parameters and information flow
  • Source code power overriding detection method and device based on parameters and information flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] It should be understood that the term "and / or" used herein is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean that A exists alone, and A and B exist simultaneously. B, there are three situations of B alone. In addition, the chara...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a source code power overriding detection method and device based on parameters and information flow. The method comprises the steps: analyzing an application platform source code, and representing the analyzed source code information with a syntax tree; carrying out the information flow analysis on the syntax tree to obtain information flow information; carrying out the power overriding detection on the application platform source code according to a preset power overriding detection strategy and the information flow information; outputting the parameters with high-risk power overriding and related information. Because the power overriding detection is conducted on the parameters by adopting the information flow, which is closely related to application platform service logic, the logic of the source code can be deeply analyzed, false alarm rate can be reduced, and detection accuracy rate is improved. And the detection on the power overriding loophole based on the service logic can be realized, so that the application platform source code can be used safely in the bank and other industries, which have wide range business scenes.

Description

technical field [0001] The embodiment of the present invention relates to the field of computer technology, in particular to a method and device for detecting source code unauthorized access based on parameters and information flow. Background technique [0002] With the rapid development of network technology and application platform, information security is facing unprecedented challenges. The interconnection of information systems with the Internet or other networks increases the probability of information systems being attacked. [0003] In recent years, the frequent occurrence of major security incidents reveals the seriousness of the current form of information system security. The source code of the application platform is the basic component for building information, and the existence of security holes in the source code of the application platform is the root cause of frequent security incidents. Therefore, a variety of application platform source code security de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 张磊高晓梦吕晓强李吉慧
Owner MINSHENG BANKING CORP