Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webpage tampering monitoring method and device

A webpage tampering and monitoring device technology, applied in the network field, can solve the problem of being unable to detect tampered webpages, and achieve the effect of preventing man-in-the-middle attacks

Active Publication Date: 2017-12-01
WEBANK (CHINA)
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a method and device for monitoring webpage tampering, aiming to solve the technical problem of being unable to detect tampered webpages during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage tampering monitoring method and device
  • Webpage tampering monitoring method and device
  • Webpage tampering monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0054] The invention provides a method for monitoring webpage tampering.

[0055] refer to figure 1 , figure 1 It is a schematic flowchart of a preferred embodiment of the webpage tampering monitoring method of the present invention.

[0056] It should be noted that the steps shown in the flowcharts of the accompanying drawings may be implemented in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0057] In this embodiment, the webpage tampering monitoring method includes:

[0058] Step S10, when the client's webpage monitoring program is triggered, grab the signature file, hash file and page content corresponding to the webpage to be mon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a webpage tampering monitoring method, which comprises the following steps that: when the webpage monitoring program of a client side is triggered, capturing a signature file, a Hash file and page contents corresponding to a webpage to be monitored; monitoring whether the signature file and the Hash file are tampered or not; if the signature file and the Hash file not tampered, calculating the Hash value of the page content, and recording the Hash value as a first Hash value; obtaining the Hash value corresponding to the Hash file, and recording the Hash value as a second Hash value; and comparing the first Hash value with the second Hash value, and confirming that the webpage to be monitored is tampered or not according to a comparison result obtained by comparison. The invention also discloses a webpage tampering monitoring device. By use of the method and the device, whether a webpage is tampered or not in a transmission process is monitored in the client side is confirmed, and a lawbreaker is prevented from carrying out intermediary attacking on websites.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method and device for monitoring webpage tampering. Background technique [0002] Existing monitoring of whether a web page has been tampered with is to use the core embedded (digital watermark) technology in the server. The principle of the core embedded (digital watermark) technology is: digital watermark (that is, HASH hash) for each outgoing web page of the server Check, if it is found that the current watermark is different from the previously recorded watermark, it can be concluded that the webpage has been tampered with and prevent it from continuing to flow out. However, due to the complex network environment, the webpage may be tampered with during transmission, and at this time, it is impossible to detect the tampered webpage during transmission. Contents of the invention [0003] The main purpose of the present invention is to provide a method and device for moni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/55G06F17/30
CPCG06F21/552G06F21/64G06F16/958
Inventor 封伟城向非能冯庆磊
Owner WEBANK (CHINA)
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More