A defense method and system for browser cache poisoning
A defense system and browser technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems affecting response speed, violating browser cache, affecting user experience, etc., to protect personal information security, Effectiveness against cache poisoning attacks, fast and reliable authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the purpose, features and advantages of the present invention more obvious and easy to understand, the technical core of the present invention will be further described in detail below in conjunction with the accompanying drawings and examples instruction of.
[0039] In the present invention, a set of reliable and effective browser cache poisoning defense system is designed, which can effectively solve the above-mentioned existing problems, and the system includes as follows:
[0040] Such as figure 1 As shown in , a schematic diagram of the overall flow of the browser cache poisoning defense system. The system is divided into two parts: client and server. For the client, a cache probe needs to be embedded in the browser; for the server, a cache verification plug-in needs to be installed in the server. When the client uses ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


