Webpage tampering monitoring method and device
A webpage tampering and monitoring device technology, applied in the network field, can solve the problem of being unable to detect tampered webpages, and achieve the effect of preventing man-in-the-middle attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0054] The invention provides a method for monitoring webpage tampering.
[0055] refer to figure 1 , figure 1 It is a schematic flowchart of a preferred embodiment of the webpage tampering monitoring method of the present invention.
[0056] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be implemented in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.
[0057] In this embodiment, the webpage tampering monitoring method includes:
[0058] Step S10, when the client's webpage monitoring program is triggered, grab the signature file, hash file and page content corresponding to the webpage to be mon...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com