Webpage tampering monitoring method and device
A webpage tampering and monitoring device technology, applied in the network field, can solve the problem of being unable to detect tampered webpages, and achieve the effect of preventing man-in-the-middle attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0054] The invention provides a method for monitoring webpage tampering.
[0055] refer to figure 1 , figure 1 It is a schematic flowchart of a preferred embodiment of the webpage tampering monitoring method of the present invention.
[0056] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be implemented in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.
[0057] In this embodiment, the webpage tampering monitoring method includes:
[0058] Step S10, when the client's webpage monitoring program is triggered, grab the signature file, hash file and page content corresponding to the webpage to be mon...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


