Supercharge Your Innovation With Domain-Expert AI Agents!

Data security detection method and terminal

A technology for data security and detection methods, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as narrow applicability, inconvenient operation, inability to capture data packets of other protocols, etc. The effect of wide applicability

Active Publication Date: 2017-10-20
福建省天奕网络科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method is an indirect simulation method, which can only be used on the PC side, and cannot be directly run on the mobile phone side, which is inconvenient to operate, and the Fiddler packet capture tool can only capture and modify HTTP / HTTPS data packets, and Cannot capture data packets of other protocols, narrow applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security detection method and terminal
  • Data security detection method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] A data security detection method, comprising the steps of:

[0052] S1. Record the protocol for interaction between the mobile phone and each application server;

[0053] Described agreement comprises HTTP / HTTPS agreement, websockets agreement etc. mobile phone and each application server carry out the commonly used agreement of interaction;

[0054] S2. Analyzing the protocols, and analyzing the network interfaces adopted by each protocol;

[0055] For example, analyze the protocol status when posting, and analyze the network interface it uses; analyze the protocol status during live broadcast, and analyze the network interface it uses;

[0056] S3. Grab the network interface and build a corresponding simulated network interface;

[0057] In order to improve the efficiency of data security detection, the working mode of each simulated network interface can be set to parallel working mode;

[0058] S4. Construct a corresponding simulated data packet according to the ...

Embodiment 2

[0065] Apply the method described in Embodiment 1 to a specific scene, such as posting a talk on the AR community.

[0066] Locally limit the published comment to no more than 256 characters; analyze the protocol used to interact with the business server in the AR community, obtain the network interface used by it, capture the network interface, and build the corresponding Simulate the network interface; then construct a simulated data packet, which is used to simulate the talk published by the user on the AR community, and the said talk contains 257 characters; after the construction is completed, pass the constructed talk through the simulated network interface Said to be sent to the corresponding business server, if you get a successfully sent message fed back by the server after submission, it means that the server does not limit the number of characters published by the user, the limit only exists locally, if you get the server feedback after submission For failed message...

Embodiment 3

[0068] Apply the method described in Embodiment 1 to specific scenarios, such as checking teammate information on the Hero Blade mobile assistant and participating in activities.

[0069] It is restricted locally that only the teammate can view each other’s information and participate in activities; analyze the protocol adopted by the hero blade mobile assistant to interact with the business server, obtain the network interface used by it, grab the network interface, and build Corresponding simulated network interface; Then construct the simulated data packet, be used for simulating the user to check teammate information, participate in the activity, and described user is not the teammate of the team member who will check information; After constructing, pass described simulated network interface The constructed team member information viewing request is sent to the corresponding business server. If you get the corresponding team member information fed back by the server after ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security detection method and a terminal. The method comprises the following steps: recording interaction protocols of a mobile phone and application servers; analyzing the protocols, and analyzing network interfaces adopted by the protocols; gabbing the network interfaces, and constructing corresponding analog network interfaces; and constructing corresponding analog data packets according to the protocols, and sending the analog data packets to the application servers through the analog network interfaces corresponding to the protocols, and verifying the application servers. No PC terminal is used, thereby being convenient to operate, the data packets of the protocols can be grabbed, and the adaptability is high.

Description

technical field [0001] The invention relates to the testing field, in particular to a data security detection method and a terminal. Background technique [0002] With the development of technology, more and more applications are running on the mobile phone, and different applications have different application servers to interact with them. In order to ensure the safe interaction of data, it is necessary to detect data security, one of which is to verify the response of the application server to various types of data, for example, to verify whether the application server will respond to the error packet sent by the mobile phone, If the error packet sent by the mobile phone is received by the server, and the server does not return an error message, there will be a security risk. [0003] At present, the commonly used data security detection method is to use the Fiddler packet capture tool. The Fiddler packet capture tool is to capture and modify the data packets interactin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/18H04L63/12H04L63/30H04L69/06H04L69/22
Inventor 刘德建丁迪锋周小白林陶钧曾捷
Owner 福建省天奕网络科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More