Safety testing method, device, computer device and storage medium

A security testing and preset path technology, applied in the security field, can solve problems such as time-consuming, loss, and low security detection efficiency.

Active Publication Date: 2018-07-06
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when providing information services, defects in application software or operating system design or errors in coding, or design defects in the process of business interaction processing or unreasonable logic processes will form loopholes.
In order to prevent vulnerabilities from being exploited intentionally or unintentionally, resulting in losses, it is n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety testing method, device, computer device and storage medium
  • Safety testing method, device, computer device and storage medium
  • Safety testing method, device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0030] The security testing method provided by this application can be applied to such as figure 1shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. Middleware and application programs are set on the server 104, and the middleware is used to execute the method provided by the embodiment of the present invention. The user can send a network access request through the terminal 102. When receiving the network access request sent by the terminal 102, since the application program is set on the middleware, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application relates to a safety testing method, a safety testing device, a computer device and a storage medium. The method includes steps of receiving a current network access request, wherein the current network access request carries with a uniform resource positioning symbol and an access parameter; according to the uniform resource positioning symbol, acquiring a current code corresponding to the current network access request; inserting a probe function in the current code; when the current code is executed according to the access parameter, recording the executing order of a code sentence in the current code through the probe function, and acquiring the executing path of the current code; detecting if the executing path of the current code is consistent with the preset path; ifthe executing path is inconsistent to the preset path, confirming the safety flaw existed in the current code. By adopting the method, the detecting efficiency can be improved.

Description

technical field [0001] The present application relates to the field of security technology, in particular to a security testing method, device, computer equipment and storage medium. Background technique [0002] With the development of Internet technology and the growth of network information, more and more enterprises or individuals provide information services through the Internet. However, when providing information services, defects in application software or operating system design or errors in coding, or design defects in the process of business interaction processing or unreasonable logic processes will form loopholes. In order to prevent vulnerabilities from being exploited intentionally or unintentionally, resulting in losses, it is necessary to conduct vulnerability detection. At present, when detecting vulnerabilities, it is usually necessary to understand the internal structure of the code before performing security testing on the code. However, the amount of d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554G06F2221/033G06F21/577
Inventor 林嘉思
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products