Security test method, device and system, equipment and storage medium

A security testing and security technology, applied in the field of information security, can solve problems such as security testing false positives

Pending Publication Date: 2019-09-06
CHINA UNIONPAY
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In practical applications, after the application system receives a specific request and executes relevant actions according to the vulnerability test logic, it does not return a specific execution res

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security test method, device and system, equipment and storage medium
  • Security test method, device and system, equipment and storage medium
  • Security test method, device and system, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]The characteristics and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only configured to explain the present invention, not to limit the present invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.

[0045] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security test method, device and system, equipment and a storage medium. The security testing method comprises the following steps: a test end sends a test request, the testrequest is used for requesting a tested application to execute a vulnerability test command and sending a communication message to an appointed server through a first channel, the first channel is located between the tested application and the appointed server, and the first channel is a data transmission channel outside a test request response channel of the tested application; and in response toreceiving processing information for the communication message from the specified server, a judgment is made that the tested application has a security vulnerability. According to the security test method provided by the embodiment of the invention, whether the tested application has security holes or not is judged, and the problem of report omission in the application security test is solved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a security testing method, device, system, equipment and storage medium. Background technique [0002] Application security testing is an important part of the testing work of the application system before it goes online. Through application security testing, the security loopholes in the application system can be found, so as to help enterprise personnel repair the security loopholes in time, and ensure that the application system put into production can be safe and stable. run. [0003] Application security testing in the prior art, such as black-box automated testing, usually builds a test environment after the system development is completed, and uses automated testing tools to simulate hacker attacks to initiate specific requests with vulnerability characteristics to the application system, and the application system receives Specific request, and after...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
CPCG06F11/3612G06F11/3688
Inventor 丁玲明周恒磊邓乐孙会林
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products