Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Horizontal unauthorized vulnerability detection method and device and computer readable storage medium

A vulnerability detection, level technology, applied in the Internet field to ensure flexibility and comprehensiveness

Active Publication Date: 2020-05-29
CHINA MERCHANTS BANK
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a level of unauthorized vulnerability detection method, equipment and computer-readable storage medium, aiming to solve how to improve the web application level of unauthorized Vulnerabilities for flexibility and comprehensiveness of technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Horizontal unauthorized vulnerability detection method and device and computer readable storage medium
  • Horizontal unauthorized vulnerability detection method and device and computer readable storage medium
  • Horizontal unauthorized vulnerability detection method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The present invention provides a horizontal unauthorized vulnerability detection device, referring to figure 1 , figure 1 It is a schematic structural diagram of the hardware operating environment of the device involved in the embodiment of the horizontal unauthorized vulnerability detection device of the present invention.

[0046] Such as figure 1 As shown, the horizontal unauthorized vulnerability detection device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a horizontal unauthorized vulnerability detection method and device and a computer readable storage medium, and the method comprises the following steps: traversing access requests in a preset resource library, filtering the access requests, and generating to-be-detected access requests and to-be-detected parameters of the to-be-detected access requests; generating a to-be-verified access request according to each to-be-detected parameter, and initiating access based on the to-be-verified access request; and determining whether a web application corresponding to the access request has a horizontal unauthorized vulnerability or not according to a response result generated by access. The response result used for determining whether the web application has the horizontal unauthorized vulnerability or not is generated according to the to-be-detected parameter, and the to-be-detected parameter comes from the access request, so that the access request for each function in the web application can be triggered to be detected, and the detection flexibility and comprehensiveness are ensured.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a method, device and computer-readable storage medium for detecting horizontal unauthorized loopholes. Background technique [0002] With the development of Internet technology, web (World Wide Web, global wide area network, also called World Wide Web) applications are becoming more and more popular. A web application is an application program accessed through the web. It only needs to install a browser in the terminal to realize access to various application software, which facilitates the access requirements for the application software. [0003] However, while the Internet brings convenience to people's lives, it also increases the number of cyber attacks on the Internet by criminals. In web applications, the horizontal overreach vulnerability is a common security vulnerability. Attackers exploiting this vulnerability may cause a large number of user sensitive da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55
Inventor 章二林姚旺寇相礼
Owner CHINA MERCHANTS BANK
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More