Unlock instant, AI-driven research and patent intelligence for your innovation.

Application protection method, device, system and storage medium

An application server and legal technology, applied in the computer field, can solve problems such as poor application security protection effect, and achieve the effect of reducing application security risks, ensuring correctness, and improving application security protection level.

Active Publication Date: 2021-10-01
CHINA MOBILE GROUP JIANGSU +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using automated attack tools to exploit vulnerabilities, simulate legitimate business operations, bypass verification codes, etc., traditional application security protection technologies can be easily bypassed, and the application security protection effect is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application protection method, device, system and storage medium
  • Application protection method, device, system and storage medium
  • Application protection method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0026] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application protection method, device, system and storage medium. The method includes: for the access request after load distribution by the load balancer, by calling the interface of the client to which the access request belongs, verifying whether the client to which the access request belongs is a legitimate client; Whether the business logic of the requested access content is correct; when the business logic of the access content of the access request is correct, send the access request to the application server corresponding to the access request after load distribution; for the access content corresponding to the access request, encapsulate the access according to the business logic it belongs to content, and send the encapsulated access content to the load balancer to protect the client's access to the application server. According to the method provided by the embodiment of the present invention, the attack of the automation tool can be dealt with, the application security risk can be reduced, and the application security protection level can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an application protection method, device, system and storage medium. Background technique [0002] With the rapid development of Internet-based business systems of operators, a large number of emerging security risks from the Internet have also brought great challenges to operators. Taking business applications such as online business halls, mobile phone business halls, and online shopping malls as examples, while providing convenience for business handling, it also provides opportunities for attackers to spy on vulnerabilities and dig attack entrances. Customer information has become an attractive bargaining chip and target for attackers to gain benefits. The leakage of these customer information also plays a role in the risk of telecom fraud to some extent, and even triggers social problems and incidents. [0003] Existing application security protection technologies...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 王建宏徐杨张臻郭建波
Owner CHINA MOBILE GROUP JIANGSU